https://catalogartifact.azureedge.net/publicartifacts/data443riskmitigationinc1761580347231.azure-sentinel-solution-cyren-s1-ioc-automation-9896ac4b-b2de-4a91-b96c-fd858bd918cc/9e1acaf0-bc8f-43c0-a1e5-97b361fad760_LogolargeCyren.png

Cyren SentinelOne IOC Automation

by Data443

Cyren IP reputation threat intelligence for Microsoft Sentinel with SentinelOne IOC automation.

The Cyren SentinelOne IOC Automation solution integrates Cyren's IP reputation threat intelligence feed with Microsoft Sentinel. It automatically retrieves known malicious IP addresses from Cyren and pushes them to SentinelOne as threat IOCs for automated blocking and detection.

This solution includes:

  • Logic App playbook for automated Cyren IP reputation IOC retrieval
  • Automated threat IOC submission to SentinelOne via API
  • Scheduled execution for continuous threat intelligence updates

Prerequisites:

  • Microsoft Sentinel workspace
  • Cyren API credentials (IP Reputation feed access)
  • SentinelOne management console with API access