Skip to main content

Setup Guide

This guide walks you through connecting Microsoft Sentinel to the ELLIO Threat Intelligence TAXII feed.

Step 1: Get Your TAXII Credentials

  1. Log in to the ELLIO Platform
  2. Navigate to Settings > Integrations > Microsoft Sentinel
  3. Generate TAXII credentials - you will receive a username and password
  4. Note your assigned collection ID

Step 2: Enable the TAXII Data Connector in Sentinel

  1. In the Azure portal, navigate to your Microsoft Sentinel workspace
  2. Go to Content Hub and search for Threat Intelligence
  3. Install the Threat Intelligence solution if not already installed
  4. Go to Data connectors and find Threat Intelligence - TAXII
  5. Click Open connector page

Step 3: Configure the TAXII Connection

Click Add new and fill in the following fields:

FieldValue
Friendly nameELLIO Deception Network
API root URLhttps://taxii-sentinel.integrations.ellio.tech/ellio/
Collection IDYour assigned collection ID from Step 1
UsernameYour TAXII username from Step 1
PasswordYour TAXII password from Step 1
Import indicatorsAt most one month old (recommended) or All available for initial import
Polling frequencyOnce an hour or Once a day

Step 4: Verify Indicator Ingestion

After the first polling cycle (up to 1 hour depending on your frequency setting), verify that indicators are flowing into Sentinel.

Open Logs in your Sentinel workspace and run:

ThreatIntelIndicators
| where Data has "ELLIO"
| summarize Count = count()

You should see a non-zero count. To inspect individual indicators:

ThreatIntelIndicators
| where Data has "ELLIO"
| project TimeGenerated, ObservableValue, Confidence, Tags, ValidUntil
| order by TimeGenerated desc
| take 10

Step 5: Enable Analytics Rules

Sentinel includes built-in analytics rules that match threat indicators against your log sources. To enable them:

  1. Go to Analytics in your Sentinel workspace
  2. Search for rules containing "TI map" (e.g., "TI map IP entity to SigninLogs")
  3. Enable the rules relevant to your data sources

These rules automatically create incidents when traffic from or to ELLIO-flagged IPs is detected in your environment.