Skip to content

Commit 0d0b30e

Browse files
authored
Update work-with-stix-objects-indicators.md
Updated documentation to have row filtering
1 parent 66d7168 commit 0d0b30e

File tree

1 file changed

+15
-5
lines changed

1 file changed

+15
-5
lines changed

articles/sentinel/work-with-stix-objects-indicators.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ For more information about threat intelligence in Microsoft Sentinel, see [Threa
2525
> **Be sure to update your custom queries, analytics and detection rules, workbooks, and automation to use the new tables by July 31, 2025.** After this date, Microsoft Sentinel will stop ingesting data to the legacy `ThreatIntelligenceIndicator` table. We're updating all out-of-the-box threat intelligence solutions in Content hub to leverage the new tables.
2626
> We've made some important updates that may explain an increase in data ingestion.
2727
> 1. Data is now republished to Log Analytics every **7 days** instead of every **12 days**. This change will result in traffic spikes at the beginning of each week. This data is identifiable in the `ThreatIntelIndicators` and `ThreatIntelObjects` tables by filtering `SouceSystem=="LogARepublisher"`.
28-
> 2. The new tables now support additional columns, including the full data object used in advanced hunting scenarios. To exclude specific columns, please refer to the [Transform away columns sent to Log Analytics](#transform-away-columns-sent-to-log-analytics)[Transform away columns sent to Log Analytics](#transform-away-columns-sent-to-log-analytics) section.
28+
> 2. The new tables now support additional columns, including the full data object used in advanced hunting scenarios. To exclude specific columns, please refer to the [Transform away columns sent to Log Analytics](#transform-away-columns-sent-to-log-analytics) section. To exclude specific rows, please refer to [Transform away rows sent to Log Analytics](#transform-away-rows-sent-to-log-analytics).
2929
> For more details on the updated schema and how it may affect your usage, see [ThreatIntelIndicators](/azure/azure-monitor/reference/tables/threatintelindicators) and [ThreatIntelObjects](/azure/azure-monitor/reference/tables/threatintelobjects).
30-
>
30+
3131
## Identify threat actors associated with specific threat indicators
3232

3333
This query is an example of how to correlate threat indicators, such as IP addresses, with threat actors:
@@ -144,15 +144,25 @@ ThreatIntelIndicators
144144
| project-reorder TimeGenerated, WorkspaceId, AzureTenantId, ThreatType, ObservableKey, ObservableValue, Confidence, Name, Description, LastUpdateMethod, SourceSystem, Created, Modified, ValidFrom, ValidUntil, IsDeleted, Tags, AdditionalFields, CreatedByRef, Extensions, ExternalReferences, GranularMarkings, IndicatorId, KillChainPhases, Labels, Lang, ObjectMarkingRefs, Pattern, PatternType, PatternVersion, Revoked, SpecVersion, NetworkIP, NetworkDestinationIP, NetworkSourceIP, DomainName, EmailAddress, FileHashType, FileHashValue, Url, x509Certificate, x509Issuer, x509CertificateNumber, Data
145145
```
146146

147-
## Transform away columns sent to Log Analytics.
147+
## Transform away values sent to Log Analytics
148148

149149
[Transformations in Azure Monitor](/azure/azure-monitor/data-collection/data-collection-transformations) allow you to filter or modify incoming data before it's stored in a Log Analytics workspace. They're implemented as a Kusto Query Language (KQL) statement in a [data collection rule (DCR)](/azure/azure-monitor/data-collection/data-collection-rule-overview).
150150

151-
This example shows how to remove the Pattern column from the `ThreatIntelIndicators` table.
151+
### Transform away columns sent to Log Analytics
152+
`ThreatIntelIndicators` and `ThreatIntelObjects` contains a `Data` column that holds a copy of the entire STIX object. If this column is not useful for your scenario, it is possible to filter it out before ingestion using DCRs, as shown below:
153+
154+
```
155+
source
156+
| project-away Data
157+
```
158+
159+
### Transform away rows sent to Log Analytics
160+
`ThreatIntelIndicators` always receives at least one row per unexpired indicator. However, in some cases, we are unable to parse the STIX pattern into a key/value pair. In such instances, the indicator is sent to Log Analytics with only the unparsed pattern, allowing users to write custom analytics if desired. If these rows are not useful, it is possible to filter them out before ingestion using DCRs, as shown below:
152161

153162
```
154163
source
155-
| project-away Pattern
164+
| where (ObservableKey != "" and isnotempty(ObservableKey))
165+
or (ObservableValue != "" and isnotempty(ObservableValue))
156166
```
157167

158168
## Related content

0 commit comments

Comments
 (0)