integration-service
latest
false
UiPath logo, featuring letters U and I in white

Integration Service user guide

Last updated Mar 16, 2026

About the Microsoft Sentinel Threat Intelligence connector

The Microsoft Sentinel Threat Intelligence connector integrates UiPath with Microsoft's threat intelligence platform, allowing the automation to publish threat indicators whenever malicious data is identified. Each harmful item results in a new intelligence indicator, which may include additional details gathered during the process. By contributing these indicators to the organization's TI dataset, the connector supports correlation across other security events, enhances detection rules, and strengthens the organization's overall defensive posture.

Note:

This connector is built by UiPath and receives official support selectively. The connector supports a limited set of commonly used APIs for the target application and may cover most typical use cases. Also, they are retained in a stable state until the requirements for a new version release are met. Learn more

Authentication

Before automating processes, you need to establish a connection with your Microsoft Sentinel Threat Intelligence instance. Step-by-step instructions are available in the Azure Threat Intelligence authentication page.

Events

The Microsoft Sentinel Threat Intelligence connector does not currently support events.

Activity package

You can use the connection to enable the Microsoft Sentinel Threat Intelligence activities in UiPath® Studio and build automations for the entire Azure Threat Intelligence capabilities suite.

API Documentation

You can read more on the Microsoft Sentinel Threat Intelligence API by accessing the Microsoft documentation. The connector was tested with API version 2024-02-01-preview.

  • Authentication
  • Events
  • Activity package
  • API Documentation

Was this page helpful?

Connect

Need help? Support

Want to learn? UiPath Academy

Have questions? UiPath Forum

Stay updated