Skip to content

Commit 0f1f8a0

Browse files
update article location
1 parent 4fcf176 commit 0f1f8a0

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Matching analytics is configured when you enable the **Microsoft Defender Threat
6060

6161
1. Select **Review** > **Create**.
6262

63-
:::image type="content" source="media/use-matching-analytics-to-detect-threats/configure-matching-analytics-rule.png" alt-text="Screenshot that shows the Microsoft Defender Threat Intelligence Analytics rule enabled on the Active rules tab.":::
63+
:::image type="content" source="media/use-matching-analytics-to-detect-threats/configure-matching-analytics-rule.png" alt-text="Screenshot that shows the Microsoft Defender Threat Intelligence Analytics rule enabled on the Active rules tab." lightbox="media/use-matching-analytics-to-detect-threats/configure-matching-analytics-rule.png":::
6464

6565
## Data sources and indicators
6666

@@ -106,7 +106,7 @@ Here's an example of the **Threat Intelligence** page.
106106

107107
## Get more context from Microsoft Defender Threat Intelligence
108108

109-
Along with high-fidelity alerts and incidents, some Microsoft Defender Threat Intelligence indicators include a link to a reference article in the Microsoft Defender Threat Intelligence community portal.
109+
Along with high-fidelity alerts and incidents, some Microsoft Defender Threat Intelligence indicators include a link to a reference article in Intel Explorer.
110110

111111
:::image type="content" source="media/use-matching-analytics-to-detect-threats/mdti-article-link.png" alt-text="Screenshot that shows an incident with a link to the Microsoft Defender Threat Intelligence reference article.":::
112112

0 commit comments

Comments
 (0)