Skip to content

Commit 04fe5f7

Browse files
Merge pull request #219200 from austinmccollum/austinmc-ti-update
update severity assignment explanation
2 parents 186f2c5 + 406e625 commit 04fe5f7

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ Matching analytics is configured when you enable the **Microsoft Threat Intellig
4444

4545
:::image type="content" source="media/use-matching-analytics-to-detect-threats/configure-matching-analytics-rule.png" alt-text="A screenshot showing the Microsoft Threat Intelligence Analytics rule enabled in the Active rules tab.":::
4646

47-
Alerts are grouped on a per-observable basis. For example, all alerts generated in a 24-hour time period that match the `contoso.com` domain are grouped into a single incident with the appropriate severity.
48-
4947

5048
## Data sources and indicators
5149

@@ -74,7 +72,11 @@ Use the following steps to triage through the incidents generated by the **Micro
7472

7573
:::image type="content" source="media/work-with-threat-indicators/matching-analytics.png" alt-text="Screenshot of incident generated by matching analytics with details pane.":::
7674

77-
When a match is found, the indicator is also published to the Log Analytics **ThreatIntelligenceIndicators**, and displayed in the **Threat Intelligence** page. For any indicators published from this rule, the source is defined as **Microsoft Threat Intelligence Analytics**.
75+
1. Observe the severity assigned to the alerts and the incident. Depending on how the indicator is matched, an appropriate severity is assigned to an alert from `Informational` to `High`. For example, if the indicator is matched with firewall logs that have allowed the traffic, a high severity alert is generated. If the same indicator was matched with firewall logs that blocked the traffic, the alert generated would be low or medium.
76+
77+
Alerts are then grouped on a per-observable basis of the indicator. For example, all alerts generated in a 24-hour time period that match the `contoso.com` domain are grouped into a single incident with a severity assigned based on the highest alert severity.
78+
79+
1. Observe the indicator details. When a match is found, the indicator is published to the Log Analytics **ThreatIntelligenceIndicators** table, and displayed in the **Threat Intelligence** page. For any indicators published from this rule, the source is defined as **Microsoft Threat Intelligence Analytics**.
7880

7981
For example, in the **ThreatIntelligenceIndicators** log:
8082

@@ -90,7 +92,7 @@ Part of the Microsoft Threat Intelligence available through matching analytics i
9092

9193
:::image type="content" source="media/use-matching-analytics-to-detect-threats/mdti-article-link.png" alt-text="Screenshot of an incident with a link to the reference MDTI article.":::
9294

93-
For more information, see the [MDTI portal](https://ti.defender.microsoft.com).
95+
For more information, see the [MDTI portal](https://ti.defender.microsoft.com) and [What is Microsoft Defender Threat Intelligence?](/../../defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti.md)
9496

9597
## Next steps
9698

0 commit comments

Comments
 (0)