Microsoft Sentinel · Capability

Microsoft Sentinel REST API — ThreatIntelligence

Microsoft Sentinel REST API — ThreatIntelligence. 1 operations. Lead operation: List threat intelligence indicators. Self-contained Naftiko capability covering one Microsoft Sentinel business surface.

Run with Naftiko Microsoft SentinelThreatIntelligence

What You Can Do

GET
Listthreatintelligenceindicators — List threat intelligence indicators
/v1/subscriptions/{subscriptionid}/resourcegroups/{resourcegroupname}/providers/microsoft-operationalinsights/workspaces/{workspacename}/providers/microsoft-securityinsights/threatintelligence/main/indicators

MCP Tools

list-threat-intelligence-indicators

List threat intelligence indicators

read-only idempotent

Capability Spec

microsoft-sentinel-threatintelligence.yaml Raw ↑
naftiko: 1.0.0-alpha2
info:
  label: Microsoft Sentinel REST API — ThreatIntelligence
  description: 'Microsoft Sentinel REST API — ThreatIntelligence. 1 operations. Lead operation: List threat intelligence indicators.
    Self-contained Naftiko capability covering one Microsoft Sentinel business surface.'
  tags:
  - Microsoft Sentinel
  - ThreatIntelligence
  created: '2026-05-19'
  modified: '2026-05-19'
binds:
- namespace: env
  keys:
    MICROSOFT_SENTINEL_API_KEY: MICROSOFT_SENTINEL_API_KEY
capability:
  consumes:
  - type: http
    namespace: microsoft-sentinel-threatintelligence
    baseUri: https://management.azure.com
    description: Microsoft Sentinel REST API — ThreatIntelligence business capability. Self-contained, no shared references.
    resources:
    - name: subscriptions-subscriptionId-resourceGroups-resourceGroupName-providers-Microsof
      path: /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/threatIntelligence/main/indicators
      operations:
      - name: listthreatintelligenceindicators
        method: GET
        description: List threat intelligence indicators
        outputRawFormat: json
        outputParameters:
        - name: result
          type: object
          value: $.
    authentication:
      type: bearer
      token: '{{env.MICROSOFT_SENTINEL_API_KEY}}'
  exposes:
  - type: rest
    namespace: microsoft-sentinel-threatintelligence-rest
    port: 8080
    description: REST adapter for Microsoft Sentinel REST API — ThreatIntelligence. One Spectral-compliant resource per consumed
      operation, prefixed with /v1.
    resources:
    - path: /v1/subscriptions/{subscriptionid}/resourcegroups/{resourcegroupname}/providers/microsoft-operationalinsights/workspaces/{workspacename}/providers/microsoft-securityinsights/threatintelligence/main/indicators
      name: subscriptions-subscriptionid-resourcegroups-resourcegroupname-providers-microsof
      description: REST surface for subscriptions-subscriptionId-resourceGroups-resourceGroupName-providers-Microsof.
      operations:
      - method: GET
        name: listthreatintelligenceindicators
        description: List threat intelligence indicators
        call: microsoft-sentinel-threatintelligence.listthreatintelligenceindicators
        outputParameters:
        - type: object
          mapping: $.
  - type: mcp
    namespace: microsoft-sentinel-threatintelligence-mcp
    port: 9090
    transport: http
    description: MCP adapter for Microsoft Sentinel REST API — ThreatIntelligence. One tool per consumed operation, routed
      inline through this capability's consumes block.
    tools:
    - name: list-threat-intelligence-indicators
      description: List threat intelligence indicators
      hints:
        readOnly: true
        destructive: false
        idempotent: true
      call: microsoft-sentinel-threatintelligence.listthreatintelligenceindicators
      outputParameters:
      - type: object
        mapping: $.