We recommend using Azure Native.
azure.sentinel.ThreatIntelligenceIndicator
Explore with Pulumi AI
Manages a Sentinel Threat Intelligence Indicator.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const example = new azure.core.ResourceGroup("example", {
    name: "example-rg",
    location: "east us",
});
const exampleAnalyticsWorkspace = new azure.operationalinsights.AnalyticsWorkspace("example", {
    name: "example-law",
    location: example.location,
    resourceGroupName: example.name,
    sku: "PerGB2018",
    retentionInDays: 30,
});
const exampleLogAnalyticsWorkspaceOnboarding = new azure.sentinel.LogAnalyticsWorkspaceOnboarding("example", {
    resourceGroupName: example.name,
    workspaceName: exampleAnalyticsWorkspace.name,
});
const exampleThreatIntelligenceIndicator = new azure.sentinel.ThreatIntelligenceIndicator("example", {
    workspaceId: exampleAnalyticsWorkspace.id,
    patternType: "domain-name",
    pattern: "http://example.com",
    source: "Microsoft Sentinel",
    validateFromUtc: "2022-12-14T16:00:00Z",
    displayName: "example-indicator",
}, {
    dependsOn: [test],
});
import pulumi
import pulumi_azure as azure
example = azure.core.ResourceGroup("example",
    name="example-rg",
    location="east us")
example_analytics_workspace = azure.operationalinsights.AnalyticsWorkspace("example",
    name="example-law",
    location=example.location,
    resource_group_name=example.name,
    sku="PerGB2018",
    retention_in_days=30)
example_log_analytics_workspace_onboarding = azure.sentinel.LogAnalyticsWorkspaceOnboarding("example",
    resource_group_name=example.name,
    workspace_name=example_analytics_workspace.name)
example_threat_intelligence_indicator = azure.sentinel.ThreatIntelligenceIndicator("example",
    workspace_id=example_analytics_workspace.id,
    pattern_type="domain-name",
    pattern="http://example.com",
    source="Microsoft Sentinel",
    validate_from_utc="2022-12-14T16:00:00Z",
    display_name="example-indicator",
    opts=pulumi.ResourceOptions(depends_on=[test]))
package main
import (
	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/core"
	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/operationalinsights"
	"github.com/pulumi/pulumi-azure/sdk/v5/go/azure/sentinel"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
			Name:     pulumi.String("example-rg"),
			Location: pulumi.String("east us"),
		})
		if err != nil {
			return err
		}
		exampleAnalyticsWorkspace, err := operationalinsights.NewAnalyticsWorkspace(ctx, "example", &operationalinsights.AnalyticsWorkspaceArgs{
			Name:              pulumi.String("example-law"),
			Location:          example.Location,
			ResourceGroupName: example.Name,
			Sku:               pulumi.String("PerGB2018"),
			RetentionInDays:   pulumi.Int(30),
		})
		if err != nil {
			return err
		}
		_, err = sentinel.NewLogAnalyticsWorkspaceOnboarding(ctx, "example", &sentinel.LogAnalyticsWorkspaceOnboardingArgs{
			ResourceGroupName: example.Name,
			WorkspaceName:     exampleAnalyticsWorkspace.Name,
		})
		if err != nil {
			return err
		}
		_, err = sentinel.NewThreatIntelligenceIndicator(ctx, "example", &sentinel.ThreatIntelligenceIndicatorArgs{
			WorkspaceId:     exampleAnalyticsWorkspace.ID(),
			PatternType:     pulumi.String("domain-name"),
			Pattern:         pulumi.String("http://example.com"),
			Source:          pulumi.String("Microsoft Sentinel"),
			ValidateFromUtc: pulumi.String("2022-12-14T16:00:00Z"),
			DisplayName:     pulumi.String("example-indicator"),
		}, pulumi.DependsOn([]pulumi.Resource{
			test,
		}))
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Azure = Pulumi.Azure;
return await Deployment.RunAsync(() => 
{
    var example = new Azure.Core.ResourceGroup("example", new()
    {
        Name = "example-rg",
        Location = "east us",
    });
    var exampleAnalyticsWorkspace = new Azure.OperationalInsights.AnalyticsWorkspace("example", new()
    {
        Name = "example-law",
        Location = example.Location,
        ResourceGroupName = example.Name,
        Sku = "PerGB2018",
        RetentionInDays = 30,
    });
    var exampleLogAnalyticsWorkspaceOnboarding = new Azure.Sentinel.LogAnalyticsWorkspaceOnboarding("example", new()
    {
        ResourceGroupName = example.Name,
        WorkspaceName = exampleAnalyticsWorkspace.Name,
    });
    var exampleThreatIntelligenceIndicator = new Azure.Sentinel.ThreatIntelligenceIndicator("example", new()
    {
        WorkspaceId = exampleAnalyticsWorkspace.Id,
        PatternType = "domain-name",
        Pattern = "http://example.com",
        Source = "Microsoft Sentinel",
        ValidateFromUtc = "2022-12-14T16:00:00Z",
        DisplayName = "example-indicator",
    }, new CustomResourceOptions
    {
        DependsOn =
        {
            test,
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.operationalinsights.AnalyticsWorkspace;
import com.pulumi.azure.operationalinsights.AnalyticsWorkspaceArgs;
import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboarding;
import com.pulumi.azure.sentinel.LogAnalyticsWorkspaceOnboardingArgs;
import com.pulumi.azure.sentinel.ThreatIntelligenceIndicator;
import com.pulumi.azure.sentinel.ThreatIntelligenceIndicatorArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var example = new ResourceGroup("example", ResourceGroupArgs.builder()
            .name("example-rg")
            .location("east us")
            .build());
        var exampleAnalyticsWorkspace = new AnalyticsWorkspace("exampleAnalyticsWorkspace", AnalyticsWorkspaceArgs.builder()
            .name("example-law")
            .location(example.location())
            .resourceGroupName(example.name())
            .sku("PerGB2018")
            .retentionInDays(30)
            .build());
        var exampleLogAnalyticsWorkspaceOnboarding = new LogAnalyticsWorkspaceOnboarding("exampleLogAnalyticsWorkspaceOnboarding", LogAnalyticsWorkspaceOnboardingArgs.builder()
            .resourceGroupName(example.name())
            .workspaceName(exampleAnalyticsWorkspace.name())
            .build());
        var exampleThreatIntelligenceIndicator = new ThreatIntelligenceIndicator("exampleThreatIntelligenceIndicator", ThreatIntelligenceIndicatorArgs.builder()
            .workspaceId(exampleAnalyticsWorkspace.id())
            .patternType("domain-name")
            .pattern("http://example.com")
            .source("Microsoft Sentinel")
            .validateFromUtc("2022-12-14T16:00:00Z")
            .displayName("example-indicator")
            .build(), CustomResourceOptions.builder()
                .dependsOn(test)
                .build());
    }
}
resources:
  example:
    type: azure:core:ResourceGroup
    properties:
      name: example-rg
      location: east us
  exampleAnalyticsWorkspace:
    type: azure:operationalinsights:AnalyticsWorkspace
    name: example
    properties:
      name: example-law
      location: ${example.location}
      resourceGroupName: ${example.name}
      sku: PerGB2018
      retentionInDays: 30
  exampleLogAnalyticsWorkspaceOnboarding:
    type: azure:sentinel:LogAnalyticsWorkspaceOnboarding
    name: example
    properties:
      resourceGroupName: ${example.name}
      workspaceName: ${exampleAnalyticsWorkspace.name}
  exampleThreatIntelligenceIndicator:
    type: azure:sentinel:ThreatIntelligenceIndicator
    name: example
    properties:
      workspaceId: ${exampleAnalyticsWorkspace.id}
      patternType: domain-name
      pattern: http://example.com
      source: Microsoft Sentinel
      validateFromUtc: 2022-12-14T16:00:00Z
      displayName: example-indicator
    options:
      dependson:
        - ${test}
Create ThreatIntelligenceIndicator Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ThreatIntelligenceIndicator(name: string, args: ThreatIntelligenceIndicatorArgs, opts?: CustomResourceOptions);@overload
def ThreatIntelligenceIndicator(resource_name: str,
                                args: ThreatIntelligenceIndicatorArgs,
                                opts: Optional[ResourceOptions] = None)
@overload
def ThreatIntelligenceIndicator(resource_name: str,
                                opts: Optional[ResourceOptions] = None,
                                pattern: Optional[str] = None,
                                workspace_id: Optional[str] = None,
                                validate_from_utc: Optional[str] = None,
                                display_name: Optional[str] = None,
                                source: Optional[str] = None,
                                pattern_type: Optional[str] = None,
                                external_references: Optional[Sequence[ThreatIntelligenceIndicatorExternalReferenceArgs]] = None,
                                revoked: Optional[bool] = None,
                                language: Optional[str] = None,
                                object_marking_refs: Optional[Sequence[str]] = None,
                                granular_markings: Optional[Sequence[ThreatIntelligenceIndicatorGranularMarkingArgs]] = None,
                                confidence: Optional[int] = None,
                                pattern_version: Optional[str] = None,
                                kill_chain_phases: Optional[Sequence[ThreatIntelligenceIndicatorKillChainPhaseArgs]] = None,
                                extension: Optional[str] = None,
                                tags: Optional[Sequence[str]] = None,
                                threat_types: Optional[Sequence[str]] = None,
                                description: Optional[str] = None,
                                validate_until_utc: Optional[str] = None,
                                created_by: Optional[str] = None)func NewThreatIntelligenceIndicator(ctx *Context, name string, args ThreatIntelligenceIndicatorArgs, opts ...ResourceOption) (*ThreatIntelligenceIndicator, error)public ThreatIntelligenceIndicator(string name, ThreatIntelligenceIndicatorArgs args, CustomResourceOptions? opts = null)
public ThreatIntelligenceIndicator(String name, ThreatIntelligenceIndicatorArgs args)
public ThreatIntelligenceIndicator(String name, ThreatIntelligenceIndicatorArgs args, CustomResourceOptions options)
type: azure:sentinel:ThreatIntelligenceIndicator
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
 - The unique name of the resource.
 - args ThreatIntelligenceIndicatorArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- resource_name str
 - The unique name of the resource.
 - args ThreatIntelligenceIndicatorArgs
 - The arguments to resource properties.
 - opts ResourceOptions
 - Bag of options to control resource's behavior.
 
- ctx Context
 - Context object for the current deployment.
 - name string
 - The unique name of the resource.
 - args ThreatIntelligenceIndicatorArgs
 - The arguments to resource properties.
 - opts ResourceOption
 - Bag of options to control resource's behavior.
 
- name string
 - The unique name of the resource.
 - args ThreatIntelligenceIndicatorArgs
 - The arguments to resource properties.
 - opts CustomResourceOptions
 - Bag of options to control resource's behavior.
 
- name String
 - The unique name of the resource.
 - args ThreatIntelligenceIndicatorArgs
 - The arguments to resource properties.
 - options CustomResourceOptions
 - Bag of options to control resource's behavior.
 
Constructor example
The following reference example uses placeholder values for all input properties.
var threatIntelligenceIndicatorResource = new Azure.Sentinel.ThreatIntelligenceIndicator("threatIntelligenceIndicatorResource", new()
{
    Pattern = "string",
    WorkspaceId = "string",
    ValidateFromUtc = "string",
    DisplayName = "string",
    Source = "string",
    PatternType = "string",
    ExternalReferences = new[]
    {
        new Azure.Sentinel.Inputs.ThreatIntelligenceIndicatorExternalReferenceArgs
        {
            Description = "string",
            Hashes = 
            {
                { "string", "string" },
            },
            Id = "string",
            SourceName = "string",
            Url = "string",
        },
    },
    Revoked = false,
    Language = "string",
    ObjectMarkingRefs = new[]
    {
        "string",
    },
    GranularMarkings = new[]
    {
        new Azure.Sentinel.Inputs.ThreatIntelligenceIndicatorGranularMarkingArgs
        {
            Language = "string",
            MarkingRef = "string",
            Selectors = new[]
            {
                "string",
            },
        },
    },
    Confidence = 0,
    PatternVersion = "string",
    KillChainPhases = new[]
    {
        new Azure.Sentinel.Inputs.ThreatIntelligenceIndicatorKillChainPhaseArgs
        {
            Name = "string",
        },
    },
    Extension = "string",
    Tags = new[]
    {
        "string",
    },
    ThreatTypes = new[]
    {
        "string",
    },
    Description = "string",
    ValidateUntilUtc = "string",
    CreatedBy = "string",
});
example, err := sentinel.NewThreatIntelligenceIndicator(ctx, "threatIntelligenceIndicatorResource", &sentinel.ThreatIntelligenceIndicatorArgs{
	Pattern:         pulumi.String("string"),
	WorkspaceId:     pulumi.String("string"),
	ValidateFromUtc: pulumi.String("string"),
	DisplayName:     pulumi.String("string"),
	Source:          pulumi.String("string"),
	PatternType:     pulumi.String("string"),
	ExternalReferences: sentinel.ThreatIntelligenceIndicatorExternalReferenceArray{
		&sentinel.ThreatIntelligenceIndicatorExternalReferenceArgs{
			Description: pulumi.String("string"),
			Hashes: pulumi.StringMap{
				"string": pulumi.String("string"),
			},
			Id:         pulumi.String("string"),
			SourceName: pulumi.String("string"),
			Url:        pulumi.String("string"),
		},
	},
	Revoked:  pulumi.Bool(false),
	Language: pulumi.String("string"),
	ObjectMarkingRefs: pulumi.StringArray{
		pulumi.String("string"),
	},
	GranularMarkings: sentinel.ThreatIntelligenceIndicatorGranularMarkingArray{
		&sentinel.ThreatIntelligenceIndicatorGranularMarkingArgs{
			Language:   pulumi.String("string"),
			MarkingRef: pulumi.String("string"),
			Selectors: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	Confidence:     pulumi.Int(0),
	PatternVersion: pulumi.String("string"),
	KillChainPhases: sentinel.ThreatIntelligenceIndicatorKillChainPhaseArray{
		&sentinel.ThreatIntelligenceIndicatorKillChainPhaseArgs{
			Name: pulumi.String("string"),
		},
	},
	Extension: pulumi.String("string"),
	Tags: pulumi.StringArray{
		pulumi.String("string"),
	},
	ThreatTypes: pulumi.StringArray{
		pulumi.String("string"),
	},
	Description:      pulumi.String("string"),
	ValidateUntilUtc: pulumi.String("string"),
	CreatedBy:        pulumi.String("string"),
})
var threatIntelligenceIndicatorResource = new ThreatIntelligenceIndicator("threatIntelligenceIndicatorResource", ThreatIntelligenceIndicatorArgs.builder()
    .pattern("string")
    .workspaceId("string")
    .validateFromUtc("string")
    .displayName("string")
    .source("string")
    .patternType("string")
    .externalReferences(ThreatIntelligenceIndicatorExternalReferenceArgs.builder()
        .description("string")
        .hashes(Map.of("string", "string"))
        .id("string")
        .sourceName("string")
        .url("string")
        .build())
    .revoked(false)
    .language("string")
    .objectMarkingRefs("string")
    .granularMarkings(ThreatIntelligenceIndicatorGranularMarkingArgs.builder()
        .language("string")
        .markingRef("string")
        .selectors("string")
        .build())
    .confidence(0)
    .patternVersion("string")
    .killChainPhases(ThreatIntelligenceIndicatorKillChainPhaseArgs.builder()
        .name("string")
        .build())
    .extension("string")
    .tags("string")
    .threatTypes("string")
    .description("string")
    .validateUntilUtc("string")
    .createdBy("string")
    .build());
threat_intelligence_indicator_resource = azure.sentinel.ThreatIntelligenceIndicator("threatIntelligenceIndicatorResource",
    pattern="string",
    workspace_id="string",
    validate_from_utc="string",
    display_name="string",
    source="string",
    pattern_type="string",
    external_references=[azure.sentinel.ThreatIntelligenceIndicatorExternalReferenceArgs(
        description="string",
        hashes={
            "string": "string",
        },
        id="string",
        source_name="string",
        url="string",
    )],
    revoked=False,
    language="string",
    object_marking_refs=["string"],
    granular_markings=[azure.sentinel.ThreatIntelligenceIndicatorGranularMarkingArgs(
        language="string",
        marking_ref="string",
        selectors=["string"],
    )],
    confidence=0,
    pattern_version="string",
    kill_chain_phases=[azure.sentinel.ThreatIntelligenceIndicatorKillChainPhaseArgs(
        name="string",
    )],
    extension="string",
    tags=["string"],
    threat_types=["string"],
    description="string",
    validate_until_utc="string",
    created_by="string")
const threatIntelligenceIndicatorResource = new azure.sentinel.ThreatIntelligenceIndicator("threatIntelligenceIndicatorResource", {
    pattern: "string",
    workspaceId: "string",
    validateFromUtc: "string",
    displayName: "string",
    source: "string",
    patternType: "string",
    externalReferences: [{
        description: "string",
        hashes: {
            string: "string",
        },
        id: "string",
        sourceName: "string",
        url: "string",
    }],
    revoked: false,
    language: "string",
    objectMarkingRefs: ["string"],
    granularMarkings: [{
        language: "string",
        markingRef: "string",
        selectors: ["string"],
    }],
    confidence: 0,
    patternVersion: "string",
    killChainPhases: [{
        name: "string",
    }],
    extension: "string",
    tags: ["string"],
    threatTypes: ["string"],
    description: "string",
    validateUntilUtc: "string",
    createdBy: "string",
});
type: azure:sentinel:ThreatIntelligenceIndicator
properties:
    confidence: 0
    createdBy: string
    description: string
    displayName: string
    extension: string
    externalReferences:
        - description: string
          hashes:
            string: string
          id: string
          sourceName: string
          url: string
    granularMarkings:
        - language: string
          markingRef: string
          selectors:
            - string
    killChainPhases:
        - name: string
    language: string
    objectMarkingRefs:
        - string
    pattern: string
    patternType: string
    patternVersion: string
    revoked: false
    source: string
    tags:
        - string
    threatTypes:
        - string
    validateFromUtc: string
    validateUntilUtc: string
    workspaceId: string
ThreatIntelligenceIndicator Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The ThreatIntelligenceIndicator resource accepts the following input properties:
- Display
Name string - The display name of the Threat Intelligence Indicator.
 - Pattern string
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - Pattern
Type string - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - Source string
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - Validate
From stringUtc  - The start of validate date in RFC3339.
 - Workspace
Id string - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 - Confidence int
 - Confidence levels of the Threat Intelligence Indicator.
 - Created
By string - The creator of the Threat Intelligence Indicator.
 - Description string
 - The description of the Threat Intelligence Indicator.
 - Extension string
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - External
References List<ThreatIntelligence Indicator External Reference>  - One or more 
external_referenceblocks as defined below. - Granular
Markings List<ThreatIntelligence Indicator Granular Marking>  - One or more 
granular_markingblocks as defined below. - Kill
Chain List<ThreatPhases Intelligence Indicator Kill Chain Phase>  - One or more 
kill_chain_phaseblocks as defined below. - Language string
 - The language of the Threat Intelligence Indicator.
 - Object
Marking List<string>Refs  - Specifies a list of Threat Intelligence marking references.
 - Pattern
Version string - The version of a Threat Intelligence entity.
 - Revoked bool
 - Whether the Threat Intelligence entity revoked.
 - List<string>
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - Threat
Types List<string> - Specifies a list of threat types of this Threat Intelligence Indicator.
 - Validate
Until stringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 
- Display
Name string - The display name of the Threat Intelligence Indicator.
 - Pattern string
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - Pattern
Type string - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - Source string
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - Validate
From stringUtc  - The start of validate date in RFC3339.
 - Workspace
Id string - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 - Confidence int
 - Confidence levels of the Threat Intelligence Indicator.
 - Created
By string - The creator of the Threat Intelligence Indicator.
 - Description string
 - The description of the Threat Intelligence Indicator.
 - Extension string
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - External
References []ThreatIntelligence Indicator External Reference Args  - One or more 
external_referenceblocks as defined below. - Granular
Markings []ThreatIntelligence Indicator Granular Marking Args  - One or more 
granular_markingblocks as defined below. - Kill
Chain []ThreatPhases Intelligence Indicator Kill Chain Phase Args  - One or more 
kill_chain_phaseblocks as defined below. - Language string
 - The language of the Threat Intelligence Indicator.
 - Object
Marking []stringRefs  - Specifies a list of Threat Intelligence marking references.
 - Pattern
Version string - The version of a Threat Intelligence entity.
 - Revoked bool
 - Whether the Threat Intelligence entity revoked.
 - []string
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - Threat
Types []string - Specifies a list of threat types of this Threat Intelligence Indicator.
 - Validate
Until stringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 
- display
Name String - The display name of the Threat Intelligence Indicator.
 - pattern String
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern
Type String - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - source String
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - validate
From StringUtc  - The start of validate date in RFC3339.
 - workspace
Id String - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 - confidence Integer
 - Confidence levels of the Threat Intelligence Indicator.
 - created
By String - The creator of the Threat Intelligence Indicator.
 - description String
 - The description of the Threat Intelligence Indicator.
 - extension String
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external
References List<ThreatIntelligence Indicator External Reference>  - One or more 
external_referenceblocks as defined below. - granular
Markings List<ThreatIntelligence Indicator Granular Marking>  - One or more 
granular_markingblocks as defined below. - kill
Chain List<ThreatPhases Intelligence Indicator Kill Chain Phase>  - One or more 
kill_chain_phaseblocks as defined below. - language String
 - The language of the Threat Intelligence Indicator.
 - object
Marking List<String>Refs  - Specifies a list of Threat Intelligence marking references.
 - pattern
Version String - The version of a Threat Intelligence entity.
 - revoked Boolean
 - Whether the Threat Intelligence entity revoked.
 - List<String>
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat
Types List<String> - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate
Until StringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 
- display
Name string - The display name of the Threat Intelligence Indicator.
 - pattern string
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern
Type string - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - source string
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - validate
From stringUtc  - The start of validate date in RFC3339.
 - workspace
Id string - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 - confidence number
 - Confidence levels of the Threat Intelligence Indicator.
 - created
By string - The creator of the Threat Intelligence Indicator.
 - description string
 - The description of the Threat Intelligence Indicator.
 - extension string
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external
References ThreatIntelligence Indicator External Reference[]  - One or more 
external_referenceblocks as defined below. - granular
Markings ThreatIntelligence Indicator Granular Marking[]  - One or more 
granular_markingblocks as defined below. - kill
Chain ThreatPhases Intelligence Indicator Kill Chain Phase[]  - One or more 
kill_chain_phaseblocks as defined below. - language string
 - The language of the Threat Intelligence Indicator.
 - object
Marking string[]Refs  - Specifies a list of Threat Intelligence marking references.
 - pattern
Version string - The version of a Threat Intelligence entity.
 - revoked boolean
 - Whether the Threat Intelligence entity revoked.
 - string[]
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat
Types string[] - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate
Until stringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 
- display_
name str - The display name of the Threat Intelligence Indicator.
 - pattern str
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern_
type str - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - source str
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - validate_
from_ strutc  - The start of validate date in RFC3339.
 - workspace_
id str - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 - confidence int
 - Confidence levels of the Threat Intelligence Indicator.
 - created_
by str - The creator of the Threat Intelligence Indicator.
 - description str
 - The description of the Threat Intelligence Indicator.
 - extension str
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external_
references Sequence[ThreatIntelligence Indicator External Reference Args]  - One or more 
external_referenceblocks as defined below. - granular_
markings Sequence[ThreatIntelligence Indicator Granular Marking Args]  - One or more 
granular_markingblocks as defined below. - kill_
chain_ Sequence[Threatphases Intelligence Indicator Kill Chain Phase Args]  - One or more 
kill_chain_phaseblocks as defined below. - language str
 - The language of the Threat Intelligence Indicator.
 - object_
marking_ Sequence[str]refs  - Specifies a list of Threat Intelligence marking references.
 - pattern_
version str - The version of a Threat Intelligence entity.
 - revoked bool
 - Whether the Threat Intelligence entity revoked.
 - Sequence[str]
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat_
types Sequence[str] - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate_
until_ strutc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 
- display
Name String - The display name of the Threat Intelligence Indicator.
 - pattern String
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern
Type String - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - source String
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - validate
From StringUtc  - The start of validate date in RFC3339.
 - workspace
Id String - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 - confidence Number
 - Confidence levels of the Threat Intelligence Indicator.
 - created
By String - The creator of the Threat Intelligence Indicator.
 - description String
 - The description of the Threat Intelligence Indicator.
 - extension String
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external
References List<Property Map> - One or more 
external_referenceblocks as defined below. - granular
Markings List<Property Map> - One or more 
granular_markingblocks as defined below. - kill
Chain List<Property Map>Phases  - One or more 
kill_chain_phaseblocks as defined below. - language String
 - The language of the Threat Intelligence Indicator.
 - object
Marking List<String>Refs  - Specifies a list of Threat Intelligence marking references.
 - pattern
Version String - The version of a Threat Intelligence entity.
 - revoked Boolean
 - Whether the Threat Intelligence entity revoked.
 - List<String>
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat
Types List<String> - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate
Until StringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 
Outputs
All input properties are implicitly available as output properties. Additionally, the ThreatIntelligenceIndicator resource produces the following output properties:
- Created
On string - The date of this Threat Intelligence Indicator created.
 - Defanged bool
 - Whether the Threat Intelligence entity is defanged?
 - External
Id string - The external ID of the Threat Intelligence Indicator.
 - External
Last stringUpdated Time Utc  - the External last updated time in UTC.
 - Guid string
 - The guid of this Sentinel Threat Intelligence Indicator.
 - Id string
 - The provider-assigned unique ID for this managed resource.
 - Indicator
Types List<string> - A list of indicator types of this Threat Intelligence Indicator.
 - Last
Updated stringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - Parsed
Patterns List<ThreatIntelligence Indicator Parsed Pattern>  - A 
parsed_patternblock as defined below. 
- Created
On string - The date of this Threat Intelligence Indicator created.
 - Defanged bool
 - Whether the Threat Intelligence entity is defanged?
 - External
Id string - The external ID of the Threat Intelligence Indicator.
 - External
Last stringUpdated Time Utc  - the External last updated time in UTC.
 - Guid string
 - The guid of this Sentinel Threat Intelligence Indicator.
 - Id string
 - The provider-assigned unique ID for this managed resource.
 - Indicator
Types []string - A list of indicator types of this Threat Intelligence Indicator.
 - Last
Updated stringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - Parsed
Patterns []ThreatIntelligence Indicator Parsed Pattern  - A 
parsed_patternblock as defined below. 
- created
On String - The date of this Threat Intelligence Indicator created.
 - defanged Boolean
 - Whether the Threat Intelligence entity is defanged?
 - external
Id String - The external ID of the Threat Intelligence Indicator.
 - external
Last StringUpdated Time Utc  - the External last updated time in UTC.
 - guid String
 - The guid of this Sentinel Threat Intelligence Indicator.
 - id String
 - The provider-assigned unique ID for this managed resource.
 - indicator
Types List<String> - A list of indicator types of this Threat Intelligence Indicator.
 - last
Updated StringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - parsed
Patterns List<ThreatIntelligence Indicator Parsed Pattern>  - A 
parsed_patternblock as defined below. 
- created
On string - The date of this Threat Intelligence Indicator created.
 - defanged boolean
 - Whether the Threat Intelligence entity is defanged?
 - external
Id string - The external ID of the Threat Intelligence Indicator.
 - external
Last stringUpdated Time Utc  - the External last updated time in UTC.
 - guid string
 - The guid of this Sentinel Threat Intelligence Indicator.
 - id string
 - The provider-assigned unique ID for this managed resource.
 - indicator
Types string[] - A list of indicator types of this Threat Intelligence Indicator.
 - last
Updated stringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - parsed
Patterns ThreatIntelligence Indicator Parsed Pattern[]  - A 
parsed_patternblock as defined below. 
- created_
on str - The date of this Threat Intelligence Indicator created.
 - defanged bool
 - Whether the Threat Intelligence entity is defanged?
 - external_
id str - The external ID of the Threat Intelligence Indicator.
 - external_
last_ strupdated_ time_ utc  - the External last updated time in UTC.
 - guid str
 - The guid of this Sentinel Threat Intelligence Indicator.
 - id str
 - The provider-assigned unique ID for this managed resource.
 - indicator_
types Sequence[str] - A list of indicator types of this Threat Intelligence Indicator.
 - last_
updated_ strtime_ utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - parsed_
patterns Sequence[ThreatIntelligence Indicator Parsed Pattern]  - A 
parsed_patternblock as defined below. 
- created
On String - The date of this Threat Intelligence Indicator created.
 - defanged Boolean
 - Whether the Threat Intelligence entity is defanged?
 - external
Id String - The external ID of the Threat Intelligence Indicator.
 - external
Last StringUpdated Time Utc  - the External last updated time in UTC.
 - guid String
 - The guid of this Sentinel Threat Intelligence Indicator.
 - id String
 - The provider-assigned unique ID for this managed resource.
 - indicator
Types List<String> - A list of indicator types of this Threat Intelligence Indicator.
 - last
Updated StringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - parsed
Patterns List<Property Map> - A 
parsed_patternblock as defined below. 
Look up Existing ThreatIntelligenceIndicator Resource
Get an existing ThreatIntelligenceIndicator resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ThreatIntelligenceIndicatorState, opts?: CustomResourceOptions): ThreatIntelligenceIndicator@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        confidence: Optional[int] = None,
        created_by: Optional[str] = None,
        created_on: Optional[str] = None,
        defanged: Optional[bool] = None,
        description: Optional[str] = None,
        display_name: Optional[str] = None,
        extension: Optional[str] = None,
        external_id: Optional[str] = None,
        external_last_updated_time_utc: Optional[str] = None,
        external_references: Optional[Sequence[ThreatIntelligenceIndicatorExternalReferenceArgs]] = None,
        granular_markings: Optional[Sequence[ThreatIntelligenceIndicatorGranularMarkingArgs]] = None,
        guid: Optional[str] = None,
        indicator_types: Optional[Sequence[str]] = None,
        kill_chain_phases: Optional[Sequence[ThreatIntelligenceIndicatorKillChainPhaseArgs]] = None,
        language: Optional[str] = None,
        last_updated_time_utc: Optional[str] = None,
        object_marking_refs: Optional[Sequence[str]] = None,
        parsed_patterns: Optional[Sequence[ThreatIntelligenceIndicatorParsedPatternArgs]] = None,
        pattern: Optional[str] = None,
        pattern_type: Optional[str] = None,
        pattern_version: Optional[str] = None,
        revoked: Optional[bool] = None,
        source: Optional[str] = None,
        tags: Optional[Sequence[str]] = None,
        threat_types: Optional[Sequence[str]] = None,
        validate_from_utc: Optional[str] = None,
        validate_until_utc: Optional[str] = None,
        workspace_id: Optional[str] = None) -> ThreatIntelligenceIndicatorfunc GetThreatIntelligenceIndicator(ctx *Context, name string, id IDInput, state *ThreatIntelligenceIndicatorState, opts ...ResourceOption) (*ThreatIntelligenceIndicator, error)public static ThreatIntelligenceIndicator Get(string name, Input<string> id, ThreatIntelligenceIndicatorState? state, CustomResourceOptions? opts = null)public static ThreatIntelligenceIndicator get(String name, Output<String> id, ThreatIntelligenceIndicatorState state, CustomResourceOptions options)Resource lookup is not supported in YAML- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- resource_name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- name
 - The unique name of the resulting resource.
 - id
 - The unique provider ID of the resource to lookup.
 - state
 - Any extra arguments used during the lookup.
 - opts
 - A bag of options that control this resource's behavior.
 
- Confidence int
 - Confidence levels of the Threat Intelligence Indicator.
 - Created
By string - The creator of the Threat Intelligence Indicator.
 - Created
On string - The date of this Threat Intelligence Indicator created.
 - Defanged bool
 - Whether the Threat Intelligence entity is defanged?
 - Description string
 - The description of the Threat Intelligence Indicator.
 - Display
Name string - The display name of the Threat Intelligence Indicator.
 - Extension string
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - External
Id string - The external ID of the Threat Intelligence Indicator.
 - External
Last stringUpdated Time Utc  - the External last updated time in UTC.
 - External
References List<ThreatIntelligence Indicator External Reference>  - One or more 
external_referenceblocks as defined below. - Granular
Markings List<ThreatIntelligence Indicator Granular Marking>  - One or more 
granular_markingblocks as defined below. - Guid string
 - The guid of this Sentinel Threat Intelligence Indicator.
 - Indicator
Types List<string> - A list of indicator types of this Threat Intelligence Indicator.
 - Kill
Chain List<ThreatPhases Intelligence Indicator Kill Chain Phase>  - One or more 
kill_chain_phaseblocks as defined below. - Language string
 - The language of the Threat Intelligence Indicator.
 - Last
Updated stringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - Object
Marking List<string>Refs  - Specifies a list of Threat Intelligence marking references.
 - Parsed
Patterns List<ThreatIntelligence Indicator Parsed Pattern>  - A 
parsed_patternblock as defined below. - Pattern string
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - Pattern
Type string - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - Pattern
Version string - The version of a Threat Intelligence entity.
 - Revoked bool
 - Whether the Threat Intelligence entity revoked.
 - Source string
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - List<string>
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - Threat
Types List<string> - Specifies a list of threat types of this Threat Intelligence Indicator.
 - Validate
From stringUtc  - The start of validate date in RFC3339.
 - Validate
Until stringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 - Workspace
Id string - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 
- Confidence int
 - Confidence levels of the Threat Intelligence Indicator.
 - Created
By string - The creator of the Threat Intelligence Indicator.
 - Created
On string - The date of this Threat Intelligence Indicator created.
 - Defanged bool
 - Whether the Threat Intelligence entity is defanged?
 - Description string
 - The description of the Threat Intelligence Indicator.
 - Display
Name string - The display name of the Threat Intelligence Indicator.
 - Extension string
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - External
Id string - The external ID of the Threat Intelligence Indicator.
 - External
Last stringUpdated Time Utc  - the External last updated time in UTC.
 - External
References []ThreatIntelligence Indicator External Reference Args  - One or more 
external_referenceblocks as defined below. - Granular
Markings []ThreatIntelligence Indicator Granular Marking Args  - One or more 
granular_markingblocks as defined below. - Guid string
 - The guid of this Sentinel Threat Intelligence Indicator.
 - Indicator
Types []string - A list of indicator types of this Threat Intelligence Indicator.
 - Kill
Chain []ThreatPhases Intelligence Indicator Kill Chain Phase Args  - One or more 
kill_chain_phaseblocks as defined below. - Language string
 - The language of the Threat Intelligence Indicator.
 - Last
Updated stringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - Object
Marking []stringRefs  - Specifies a list of Threat Intelligence marking references.
 - Parsed
Patterns []ThreatIntelligence Indicator Parsed Pattern Args  - A 
parsed_patternblock as defined below. - Pattern string
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - Pattern
Type string - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - Pattern
Version string - The version of a Threat Intelligence entity.
 - Revoked bool
 - Whether the Threat Intelligence entity revoked.
 - Source string
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - []string
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - Threat
Types []string - Specifies a list of threat types of this Threat Intelligence Indicator.
 - Validate
From stringUtc  - The start of validate date in RFC3339.
 - Validate
Until stringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 - Workspace
Id string - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 
- confidence Integer
 - Confidence levels of the Threat Intelligence Indicator.
 - created
By String - The creator of the Threat Intelligence Indicator.
 - created
On String - The date of this Threat Intelligence Indicator created.
 - defanged Boolean
 - Whether the Threat Intelligence entity is defanged?
 - description String
 - The description of the Threat Intelligence Indicator.
 - display
Name String - The display name of the Threat Intelligence Indicator.
 - extension String
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external
Id String - The external ID of the Threat Intelligence Indicator.
 - external
Last StringUpdated Time Utc  - the External last updated time in UTC.
 - external
References List<ThreatIntelligence Indicator External Reference>  - One or more 
external_referenceblocks as defined below. - granular
Markings List<ThreatIntelligence Indicator Granular Marking>  - One or more 
granular_markingblocks as defined below. - guid String
 - The guid of this Sentinel Threat Intelligence Indicator.
 - indicator
Types List<String> - A list of indicator types of this Threat Intelligence Indicator.
 - kill
Chain List<ThreatPhases Intelligence Indicator Kill Chain Phase>  - One or more 
kill_chain_phaseblocks as defined below. - language String
 - The language of the Threat Intelligence Indicator.
 - last
Updated StringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - object
Marking List<String>Refs  - Specifies a list of Threat Intelligence marking references.
 - parsed
Patterns List<ThreatIntelligence Indicator Parsed Pattern>  - A 
parsed_patternblock as defined below. - pattern String
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern
Type String - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - pattern
Version String - The version of a Threat Intelligence entity.
 - revoked Boolean
 - Whether the Threat Intelligence entity revoked.
 - source String
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - List<String>
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat
Types List<String> - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate
From StringUtc  - The start of validate date in RFC3339.
 - validate
Until StringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 - workspace
Id String - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 
- confidence number
 - Confidence levels of the Threat Intelligence Indicator.
 - created
By string - The creator of the Threat Intelligence Indicator.
 - created
On string - The date of this Threat Intelligence Indicator created.
 - defanged boolean
 - Whether the Threat Intelligence entity is defanged?
 - description string
 - The description of the Threat Intelligence Indicator.
 - display
Name string - The display name of the Threat Intelligence Indicator.
 - extension string
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external
Id string - The external ID of the Threat Intelligence Indicator.
 - external
Last stringUpdated Time Utc  - the External last updated time in UTC.
 - external
References ThreatIntelligence Indicator External Reference[]  - One or more 
external_referenceblocks as defined below. - granular
Markings ThreatIntelligence Indicator Granular Marking[]  - One or more 
granular_markingblocks as defined below. - guid string
 - The guid of this Sentinel Threat Intelligence Indicator.
 - indicator
Types string[] - A list of indicator types of this Threat Intelligence Indicator.
 - kill
Chain ThreatPhases Intelligence Indicator Kill Chain Phase[]  - One or more 
kill_chain_phaseblocks as defined below. - language string
 - The language of the Threat Intelligence Indicator.
 - last
Updated stringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - object
Marking string[]Refs  - Specifies a list of Threat Intelligence marking references.
 - parsed
Patterns ThreatIntelligence Indicator Parsed Pattern[]  - A 
parsed_patternblock as defined below. - pattern string
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern
Type string - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - pattern
Version string - The version of a Threat Intelligence entity.
 - revoked boolean
 - Whether the Threat Intelligence entity revoked.
 - source string
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - string[]
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat
Types string[] - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate
From stringUtc  - The start of validate date in RFC3339.
 - validate
Until stringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 - workspace
Id string - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 
- confidence int
 - Confidence levels of the Threat Intelligence Indicator.
 - created_
by str - The creator of the Threat Intelligence Indicator.
 - created_
on str - The date of this Threat Intelligence Indicator created.
 - defanged bool
 - Whether the Threat Intelligence entity is defanged?
 - description str
 - The description of the Threat Intelligence Indicator.
 - display_
name str - The display name of the Threat Intelligence Indicator.
 - extension str
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external_
id str - The external ID of the Threat Intelligence Indicator.
 - external_
last_ strupdated_ time_ utc  - the External last updated time in UTC.
 - external_
references Sequence[ThreatIntelligence Indicator External Reference Args]  - One or more 
external_referenceblocks as defined below. - granular_
markings Sequence[ThreatIntelligence Indicator Granular Marking Args]  - One or more 
granular_markingblocks as defined below. - guid str
 - The guid of this Sentinel Threat Intelligence Indicator.
 - indicator_
types Sequence[str] - A list of indicator types of this Threat Intelligence Indicator.
 - kill_
chain_ Sequence[Threatphases Intelligence Indicator Kill Chain Phase Args]  - One or more 
kill_chain_phaseblocks as defined below. - language str
 - The language of the Threat Intelligence Indicator.
 - last_
updated_ strtime_ utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - object_
marking_ Sequence[str]refs  - Specifies a list of Threat Intelligence marking references.
 - parsed_
patterns Sequence[ThreatIntelligence Indicator Parsed Pattern Args]  - A 
parsed_patternblock as defined below. - pattern str
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern_
type str - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - pattern_
version str - The version of a Threat Intelligence entity.
 - revoked bool
 - Whether the Threat Intelligence entity revoked.
 - source str
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - Sequence[str]
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat_
types Sequence[str] - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate_
from_ strutc  - The start of validate date in RFC3339.
 - validate_
until_ strutc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 - workspace_
id str - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 
- confidence Number
 - Confidence levels of the Threat Intelligence Indicator.
 - created
By String - The creator of the Threat Intelligence Indicator.
 - created
On String - The date of this Threat Intelligence Indicator created.
 - defanged Boolean
 - Whether the Threat Intelligence entity is defanged?
 - description String
 - The description of the Threat Intelligence Indicator.
 - display
Name String - The display name of the Threat Intelligence Indicator.
 - extension String
 - The extension config of the Threat Intelligence Indicator in JSON format.
 - external
Id String - The external ID of the Threat Intelligence Indicator.
 - external
Last StringUpdated Time Utc  - the External last updated time in UTC.
 - external
References List<Property Map> - One or more 
external_referenceblocks as defined below. - granular
Markings List<Property Map> - One or more 
granular_markingblocks as defined below. - guid String
 - The guid of this Sentinel Threat Intelligence Indicator.
 - indicator
Types List<String> - A list of indicator types of this Threat Intelligence Indicator.
 - kill
Chain List<Property Map>Phases  - One or more 
kill_chain_phaseblocks as defined below. - language String
 - The language of the Threat Intelligence Indicator.
 - last
Updated StringTime Utc  - The last updated time of the Threat Intelligence Indicator in UTC.
 - object
Marking List<String>Refs  - Specifies a list of Threat Intelligence marking references.
 - parsed
Patterns List<Property Map> - A 
parsed_patternblock as defined below. - pattern String
 - The pattern used by the Threat Intelligence Indicator. When 
pattern_typeset tofile,patternmust be specified with<HashName>:<Value>format, such asMD5:78ecc5c05cd8b79af480df2f8fba0b9d. - pattern
Type String - The type of pattern used by the Threat Intelligence Indicator. Possible values are 
domain-name,file,ipv4-addr,ipv6-addrandurl. - pattern
Version String - The version of a Threat Intelligence entity.
 - revoked Boolean
 - Whether the Threat Intelligence entity revoked.
 - source String
 - Source of the Threat Intelligence Indicator. Changing this forces a new resource to be created.
 - List<String>
 - Specifies a list of tags of the Threat Intelligence Indicator.
 - threat
Types List<String> - Specifies a list of threat types of this Threat Intelligence Indicator.
 - validate
From StringUtc  - The start of validate date in RFC3339.
 - validate
Until StringUtc  - The end of validate date of the Threat Intelligence Indicator in RFC3339 format.
 - workspace
Id String - The ID of the Log Analytics Workspace. Changing this forces a new Sentinel Threat Intelligence Indicator to be created.
 
Supporting Types
ThreatIntelligenceIndicatorExternalReference, ThreatIntelligenceIndicatorExternalReferenceArgs          
- Description string
 - The description of the external reference of the Threat Intelligence Indicator.
 - Hashes Dictionary<string, string>
 - The list of hashes of the external reference of the Threat Intelligence Indicator.
 - Id string
 - The ID of the Sentinel Threat Intelligence Indicator.
 - Source
Name string - The source name of the external reference of the Threat Intelligence Indicator.
 - Url string
 - The url of the external reference of the Threat Intelligence Indicator.
 
- Description string
 - The description of the external reference of the Threat Intelligence Indicator.
 - Hashes map[string]string
 - The list of hashes of the external reference of the Threat Intelligence Indicator.
 - Id string
 - The ID of the Sentinel Threat Intelligence Indicator.
 - Source
Name string - The source name of the external reference of the Threat Intelligence Indicator.
 - Url string
 - The url of the external reference of the Threat Intelligence Indicator.
 
- description String
 - The description of the external reference of the Threat Intelligence Indicator.
 - hashes Map<String,String>
 - The list of hashes of the external reference of the Threat Intelligence Indicator.
 - id String
 - The ID of the Sentinel Threat Intelligence Indicator.
 - source
Name String - The source name of the external reference of the Threat Intelligence Indicator.
 - url String
 - The url of the external reference of the Threat Intelligence Indicator.
 
- description string
 - The description of the external reference of the Threat Intelligence Indicator.
 - hashes {[key: string]: string}
 - The list of hashes of the external reference of the Threat Intelligence Indicator.
 - id string
 - The ID of the Sentinel Threat Intelligence Indicator.
 - source
Name string - The source name of the external reference of the Threat Intelligence Indicator.
 - url string
 - The url of the external reference of the Threat Intelligence Indicator.
 
- description str
 - The description of the external reference of the Threat Intelligence Indicator.
 - hashes Mapping[str, str]
 - The list of hashes of the external reference of the Threat Intelligence Indicator.
 - id str
 - The ID of the Sentinel Threat Intelligence Indicator.
 - source_
name str - The source name of the external reference of the Threat Intelligence Indicator.
 - url str
 - The url of the external reference of the Threat Intelligence Indicator.
 
- description String
 - The description of the external reference of the Threat Intelligence Indicator.
 - hashes Map<String>
 - The list of hashes of the external reference of the Threat Intelligence Indicator.
 - id String
 - The ID of the Sentinel Threat Intelligence Indicator.
 - source
Name String - The source name of the external reference of the Threat Intelligence Indicator.
 - url String
 - The url of the external reference of the Threat Intelligence Indicator.
 
ThreatIntelligenceIndicatorGranularMarking, ThreatIntelligenceIndicatorGranularMarkingArgs          
- Language string
 - The language of granular marking of the Threat Intelligence Indicator.
 - Marking
Ref string - The reference of the granular marking of the Threat Intelligence Indicator.
 - Selectors List<string>
 - A list of selectors of the granular marking of the Threat Intelligence Indicator.
 
- Language string
 - The language of granular marking of the Threat Intelligence Indicator.
 - Marking
Ref string - The reference of the granular marking of the Threat Intelligence Indicator.
 - Selectors []string
 - A list of selectors of the granular marking of the Threat Intelligence Indicator.
 
- language String
 - The language of granular marking of the Threat Intelligence Indicator.
 - marking
Ref String - The reference of the granular marking of the Threat Intelligence Indicator.
 - selectors List<String>
 - A list of selectors of the granular marking of the Threat Intelligence Indicator.
 
- language string
 - The language of granular marking of the Threat Intelligence Indicator.
 - marking
Ref string - The reference of the granular marking of the Threat Intelligence Indicator.
 - selectors string[]
 - A list of selectors of the granular marking of the Threat Intelligence Indicator.
 
- language str
 - The language of granular marking of the Threat Intelligence Indicator.
 - marking_
ref str - The reference of the granular marking of the Threat Intelligence Indicator.
 - selectors Sequence[str]
 - A list of selectors of the granular marking of the Threat Intelligence Indicator.
 
- language String
 - The language of granular marking of the Threat Intelligence Indicator.
 - marking
Ref String - The reference of the granular marking of the Threat Intelligence Indicator.
 - selectors List<String>
 - A list of selectors of the granular marking of the Threat Intelligence Indicator.
 
ThreatIntelligenceIndicatorKillChainPhase, ThreatIntelligenceIndicatorKillChainPhaseArgs            
- Name string
 - The name which should be used for the Lockheed Martin cyber kill chain phase.
 
- Name string
 - The name which should be used for the Lockheed Martin cyber kill chain phase.
 
- name String
 - The name which should be used for the Lockheed Martin cyber kill chain phase.
 
- name string
 - The name which should be used for the Lockheed Martin cyber kill chain phase.
 
- name str
 - The name which should be used for the Lockheed Martin cyber kill chain phase.
 
- name String
 - The name which should be used for the Lockheed Martin cyber kill chain phase.
 
ThreatIntelligenceIndicatorParsedPattern, ThreatIntelligenceIndicatorParsedPatternArgs          
- Pattern
Type stringKey  - The type key of parsed pattern.
 - Pattern
Type List<ThreatValues Intelligence Indicator Parsed Pattern Pattern Type Value>  - A 
pattern_type_valuesblock as defined below. 
- Pattern
Type stringKey  - The type key of parsed pattern.
 - Pattern
Type []ThreatValues Intelligence Indicator Parsed Pattern Pattern Type Value  - A 
pattern_type_valuesblock as defined below. 
- pattern
Type StringKey  - The type key of parsed pattern.
 - pattern
Type List<ThreatValues Intelligence Indicator Parsed Pattern Pattern Type Value>  - A 
pattern_type_valuesblock as defined below. 
- pattern
Type stringKey  - The type key of parsed pattern.
 - pattern
Type ThreatValues Intelligence Indicator Parsed Pattern Pattern Type Value[]  - A 
pattern_type_valuesblock as defined below. 
- pattern_
type_ strkey  - The type key of parsed pattern.
 - pattern_
type_ Sequence[Threatvalues Intelligence Indicator Parsed Pattern Pattern Type Value]  - A 
pattern_type_valuesblock as defined below. 
- pattern
Type StringKey  - The type key of parsed pattern.
 - pattern
Type List<Property Map>Values  - A 
pattern_type_valuesblock as defined below. 
ThreatIntelligenceIndicatorParsedPatternPatternTypeValue, ThreatIntelligenceIndicatorParsedPatternPatternTypeValueArgs                
- value str
 - The value of the parsed pattern type.
 - value_
type str - The type of the value of the parsed pattern type value.
 
Import
Sentinel Threat Intelligence Indicators can be imported using the resource id, e.g.
$ pulumi import azure:sentinel/threatIntelligenceIndicator:ThreatIntelligenceIndicator example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resourcegroup1/providers/Microsoft.OperationalInsights/workspaces/workspace1/providers/Microsoft.SecurityInsights/threatIntelligence/main/indicators/indicator1
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
 - Azure Classic pulumi/pulumi-azure
 - License
 - Apache-2.0
 - Notes
 - This Pulumi package is based on the 
azurermTerraform Provider.