You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -155,9 +155,9 @@ Enhance threat detection and response by establishing connections between object
155
155
156
156
| Use case | Description |
157
157
|---|---|
158
-
| Connect threat actor to an attack pattern | The threat actor **APT29***Uses* the attack pattern **Phishing via Email** to gain initial access.|
159
-
| Link an indicator to a threat actor| A domain indicator **allyourbase.contoso.com** is *Attributed to* the threat actor **APT29**. |
160
-
| Associate an identity (victim) with an attack pattern| The *FourthCoffee* organization is targeted by the attack pattern *Phishing via Email*.|
158
+
| Connect threat actor to an attack pattern | The threat actor `APT29`*Uses* the attack pattern `Phishing via Email` to gain initial access.|
159
+
| Link an indicator to a threat actor| A domain indicator `allyourbase.contoso.com` is *Attributed to* the threat actor `APT29`. |
160
+
| Associate an identity (victim) with an attack pattern| The attack pattern `Phishing via Email`*Targets* the `FourthCoffee` organization.|
161
161
162
162
The following image shows how the relationship builder connects all of these use cases.
163
163
@@ -170,9 +170,9 @@ Designate which TI objects can be shared with appropriate audiences by designati
170
170
| TLP color | Sensitivity |
171
171
|---|---|
172
172
| White | Information can be shared freely and publicly without any restrictions. |
173
-
| Green | Information can be shared with peers and partner organizations within the community, but not publicly. It is intended for a wider audience within the community. |
174
-
| Amber | Information can be shared with members of the organization, but not publicly. It is intended to be used within the organization to protect sensitive information. |
175
-
| Red | Information is highly sensitive and should not be shared outside of the specific group or meeting where it was originally disclosed. |
173
+
| Green | Information can be shared with peers and partner organizations within the community, but not publicly. It's intended for a wider audience within the community. |
174
+
| Amber | Information can be shared with members of the organization, but not publicly. It's intended to be used within the organization to protect sensitive information. |
175
+
| Red | Information is highly sensitive and shouldn't be shared outside of the specific group or meeting where it was originally disclosed. |
176
176
177
177
Tagging threat intelligence is a quick way to group objects together to make them easier to find. Typically, you might apply tags related to a particular incident. But, if an indicator represents threats from a particular known actor or well-known attack campaign, consider creating a relationship instead of a tag. After you search and filter for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
178
178
@@ -186,15 +186,15 @@ View your threat intelligence from the management interface. Use advanced search
186
186
187
187
View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics and workbooks.
188
188
189
-
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects` alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
189
+
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
190
190
191
191
Here's an example view of a basic query for just threat indicators using the current table.
192
192
193
193
:::image type="content" source="media/understand-threat-intelligence/logs-page-ti-table.png" alt-text="Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table." lightbox="media/understand-threat-intelligence/logs-page-ti-table.png":::
194
194
195
195
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
196
196
197
-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated by the source and pattern of the indicator.
197
+
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated from the source and pattern of the indicator.
198
198
199
199
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-your-indicators).
200
200
@@ -204,11 +204,11 @@ Microsoft enriches IP and domain indicators with extra `GeoLocation` and `WhoIs`
204
204
205
205
View `GeoLocation` and `WhoIs` data on the **Threat Intelligence** pane for those types of threat indicators imported into Microsoft Sentinel.
206
206
207
-
For example, use `GeoLocation` data to find information like the organization or country/region for an IP indicator. Use `WhoIs` data to find data like registrar and record creation data from a domain indicator.
207
+
For example, use `GeoLocation` data to find information like the organization or country or region for an IP indicator. Use `WhoIs` data to find data like registrar and record creation data from a domain indicator.
208
208
209
209
## Detect threats with threat indicator analytics
210
210
211
-
The most important use case for threat indicators in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules that run on a schedule and generate security alerts. The rules are driven by queries. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
211
+
The most important use case for threat indicators in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules powered by queries that run on a schedule and generate security alerts. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
212
212
213
213
Although you can always create new analytics rules from scratch, Microsoft Sentinel provides a set of built-in rule templates, created by Microsoft security engineers, to take advantage of your threat indicators. These templates are based on the type of threat indicators (domain, email, file hash, IP address, or URL) and data source events that you want to match. Each template lists the required sources that are needed for the rule to function. This information makes it easy to determine if the necessary events are already imported in Microsoft Sentinel.
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+17-11Lines changed: 17 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,6 @@ In the Azure portal, navigate to **Threat management** > **Threat intelligence**
45
45
Use the management interface to create STIX objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects.
46
46
47
47
- Define relationships as you create new STIX objects.
48
-
- Curate existing TI with the relationship builder.
49
48
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing TI object.
50
49
51
50
For more information on supported STIX objects, see [Understand threat intelligence](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
@@ -58,17 +57,17 @@ For more information on supported STIX objects, see [Understand threat intellige
58
57
59
58
1. Choose the **Object type**, then fill in the form on the **New TI object** page. Required fields are marked with a red asterisk (*).
60
59
1. If you know how this object relates to another threat intelligence object, indicate that connection with the **Relationship type** and the **Target reference**.
61
-
1. Select **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
60
+
1. Select **Add** for an individual object, or **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
62
61
63
-
:::image type="content" source="media/work-with-threat-indicators/common-metadata-stix-object.png" alt-text="Screenshot showing new STIX object creation and the common metadata available to all objects.":::
64
-
65
-
1. Otherwise, select **Add** to create the single item.
62
+
:::image type="content" source="media/work-with-threat-indicators/common-metadata-stix-object-reduced.png" alt-text="Screenshot showing new STIX object creation and the common metadata available to all objects.":::
66
63
67
64
## Manage threat intelligence
68
65
66
+
Curate existing TI with the relationship builder. Use the management interface to search, filter and sort, then add tags to your threat intelligence.
67
+
69
68
### Curate threat intelligence with the relationship builder
70
69
71
-
Connect threat intelligence objects with the relationship builder. There is a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.
70
+
Connect threat intelligence objects with the relationship builder. There's a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.
72
71
73
72
1. Start with an object like a threat actor or attack pattern where the single object connects to one or more objects, like indicators.
74
73
1. Add the relationship type according to the best practices outlined in the following table and in the [STIX 2.1 reference relationship summary table](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_6n2czpjuie3v):
@@ -82,19 +81,26 @@ Connect threat intelligence objects with the relationship builder. There is a ma
82
81
|**Indicates**|`Indicator` Indicates `Attack pattern` or `Threat actor`|
The following image demonstrates connections made between a threat actor and an attack pattern, indicator and identity using the relationship type table.
84
+
The following image demonstrates connections made between a threat actor and an attack pattern, indicator, and identity using the relationship type table.
86
85
87
86
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::
88
87
89
88
### View your threat intelligence in the management interface
90
89
91
-
This procedure describes how to view and manage your indicators. Use the **Threat intelligence** page to sort, filter, and search your imported threat indicators without writing a Log Analytics query.
90
+
Use the management interface to sort, filter, and search your threat indicators from whatever source they were ingested from without writing a Log Analytics query.
91
+
92
+
1. From the management interface, expand the **What would you like to search?** menu.
93
+
1. Select the STIX object type or leave the default **All object types**.
94
+
1. Select conditions using logical operators.
95
+
1. Select the object you want to see more information about.
96
+
97
+
In the following image, multiple sources were used to search by placing them in an `OR` group, while multiple conditions were group with the `AND` operator.
92
98
93
-
1. From the grid, select the indicator for which you want to view more information. The indicator's information includes confidence levels, tags, and threat types.
99
+
:::image type="content" source="media/works-with-threat-indicators/advanced-search.png" alt-text="Screenshot shows an OR operator combined with multiple AND conditions to search threat intelligence.":::
94
100
95
-
Microsoft Sentinel only displays the most current version of indicators in this view. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
101
+
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
96
102
97
-
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data. This data provides more context for investigations where the selected indicator is found.
103
+
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data so you can provide more context for any investigations where indicator is found.
0 commit comments