You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-threat-intelligence.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,12 +62,12 @@ You can stream threat indicators to Azure Sentinel by using one of the integrate
62
62
3. Ask your Azure Active Directory tenant administrator to grant admin consent to the registered application for your organization. From the Azure portal: **Azure Active Directory** > **App registrations** > **\<*app name*>** > **View API Permissions** > **Grant admin consent for \<*tenant name*>**.
63
63
64
64
4. Configure your TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API to send indicators to Azure Sentinel by specifying the following:
65
-
66
-
a. The values for the registered application's ID, secret, and tenant ID.
67
-
68
-
b. For the target product, specify Azure Sentinel.
69
-
70
-
c. For the action, specify alert.
65
+
66
+
a. The values for the registered application's ID, secret, and tenant ID.
67
+
68
+
b. For the target product, specify Azure Sentinel.
69
+
70
+
c. For the action, specify alert.
71
71
72
72
5. In the Azure portal, navigate to **Azure Sentinel** > **Data connectors** and then select the **Threat Intelligence Platforms (Preview)** connector.
0 commit comments