Skip to content

Commit 16b39b1

Browse files
complete how to
1 parent f7a206f commit 16b39b1

File tree

5 files changed

+27
-21
lines changed

5 files changed

+27
-21
lines changed
141 KB
Loading
56 KB
Loading
6.15 KB
Loading

articles/sentinel/understand-threat-intelligence.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -155,9 +155,9 @@ Enhance threat detection and response by establishing connections between object
155155

156156
| Use case | Description |
157157
|---|---|
158-
| Connect threat actor to an attack pattern | The threat actor **APT29** *Uses* the attack pattern **Phishing via Email** to gain initial access.|
159-
| Link an indicator to a threat actor| A domain indicator **allyourbase.contoso.com** is *Attributed to* the threat actor **APT29**. |
160-
| Associate an identity (victim) with an attack pattern| The *FourthCoffee* organization is targeted by the attack pattern *Phishing via Email*.|
158+
| Connect threat actor to an attack pattern | The threat actor `APT29` *Uses* the attack pattern `Phishing via Email` to gain initial access.|
159+
| Link an indicator to a threat actor| A domain indicator `allyourbase.contoso.com` is *Attributed to* the threat actor `APT29`. |
160+
| Associate an identity (victim) with an attack pattern| The attack pattern `Phishing via Email` *Targets* the `FourthCoffee` organization.|
161161

162162
The following image shows how the relationship builder connects all of these use cases.
163163

@@ -170,9 +170,9 @@ Designate which TI objects can be shared with appropriate audiences by designati
170170
| TLP color | Sensitivity |
171171
|---|---|
172172
| White | Information can be shared freely and publicly without any restrictions. |
173-
| Green | Information can be shared with peers and partner organizations within the community, but not publicly. It is intended for a wider audience within the community. |
174-
| Amber | Information can be shared with members of the organization, but not publicly. It is intended to be used within the organization to protect sensitive information. |
175-
| Red | Information is highly sensitive and should not be shared outside of the specific group or meeting where it was originally disclosed. |
173+
| Green | Information can be shared with peers and partner organizations within the community, but not publicly. It's intended for a wider audience within the community. |
174+
| Amber | Information can be shared with members of the organization, but not publicly. It's intended to be used within the organization to protect sensitive information. |
175+
| Red | Information is highly sensitive and shouldn't be shared outside of the specific group or meeting where it was originally disclosed. |
176176

177177
Tagging threat intelligence is a quick way to group objects together to make them easier to find. Typically, you might apply tags related to a particular incident. But, if an indicator represents threats from a particular known actor or well-known attack campaign, consider creating a relationship instead of a tag. After you search and filter for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
178178

@@ -186,15 +186,15 @@ View your threat intelligence from the management interface. Use advanced search
186186

187187
View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics and workbooks.
188188

189-
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects` alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
189+
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
190190

191191
Here's an example view of a basic query for just threat indicators using the current table.
192192

193193
:::image type="content" source="media/understand-threat-intelligence/logs-page-ti-table.png" alt-text="Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table." lightbox="media/understand-threat-intelligence/logs-page-ti-table.png":::
194194

195195
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
196196

197-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated by the source and pattern of the indicator.
197+
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated from the source and pattern of the indicator.
198198

199199
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-your-indicators).
200200

@@ -204,11 +204,11 @@ Microsoft enriches IP and domain indicators with extra `GeoLocation` and `WhoIs`
204204

205205
View `GeoLocation` and `WhoIs` data on the **Threat Intelligence** pane for those types of threat indicators imported into Microsoft Sentinel.
206206

207-
For example, use `GeoLocation` data to find information like the organization or country/region for an IP indicator. Use `WhoIs` data to find data like registrar and record creation data from a domain indicator.
207+
For example, use `GeoLocation` data to find information like the organization or country or region for an IP indicator. Use `WhoIs` data to find data like registrar and record creation data from a domain indicator.
208208

209209
## Detect threats with threat indicator analytics
210210

211-
The most important use case for threat indicators in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules that run on a schedule and generate security alerts. The rules are driven by queries. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
211+
The most important use case for threat indicators in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules powered by queries that run on a schedule and generate security alerts. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
212212

213213
Although you can always create new analytics rules from scratch, Microsoft Sentinel provides a set of built-in rule templates, created by Microsoft security engineers, to take advantage of your threat indicators. These templates are based on the type of threat indicators (domain, email, file hash, IP address, or URL) and data source events that you want to match. Each template lists the required sources that are needed for the rule to function. This information makes it easy to determine if the necessary events are already imported in Microsoft Sentinel.
214214

articles/sentinel/work-with-threat-indicators.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ In the Azure portal, navigate to **Threat management** > **Threat intelligence**
4545
Use the management interface to create STIX objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects.
4646

4747
- Define relationships as you create new STIX objects.
48-
- Curate existing TI with the relationship builder.
4948
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing TI object.
5049

5150
For more information on supported STIX objects, see [Understand threat intelligence](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
@@ -58,17 +57,17 @@ For more information on supported STIX objects, see [Understand threat intellige
5857

5958
1. Choose the **Object type**, then fill in the form on the **New TI object** page. Required fields are marked with a red asterisk (*).
6059
1. If you know how this object relates to another threat intelligence object, indicate that connection with the **Relationship type** and the **Target reference**.
61-
1. Select **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
60+
1. Select **Add** for an individual object, or **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
6261

63-
:::image type="content" source="media/work-with-threat-indicators/common-metadata-stix-object.png" alt-text="Screenshot showing new STIX object creation and the common metadata available to all objects.":::
64-
65-
1. Otherwise, select **Add** to create the single item.
62+
:::image type="content" source="media/work-with-threat-indicators/common-metadata-stix-object-reduced.png" alt-text="Screenshot showing new STIX object creation and the common metadata available to all objects.":::
6663

6764
## Manage threat intelligence
6865

66+
Curate existing TI with the relationship builder. Use the management interface to search, filter and sort, then add tags to your threat intelligence.
67+
6968
### Curate threat intelligence with the relationship builder
7069

71-
Connect threat intelligence objects with the relationship builder. There is a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.
70+
Connect threat intelligence objects with the relationship builder. There's a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.
7271

7372
1. Start with an object like a threat actor or attack pattern where the single object connects to one or more objects, like indicators.
7473
1. Add the relationship type according to the best practices outlined in the following table and in the [STIX 2.1 reference relationship summary table](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_6n2czpjuie3v):
@@ -82,19 +81,26 @@ Connect threat intelligence objects with the relationship builder. There is a ma
8281
| **Indicates** | `Indicator` Indicates `Attack pattern` or `Threat actor` |
8382
| **Impersonates** | `Threat actor` Impersonates `Identity` |
8483

85-
The following image demonstrates connections made between a threat actor and an attack pattern, indicator and identity using the relationship type table.
84+
The following image demonstrates connections made between a threat actor and an attack pattern, indicator, and identity using the relationship type table.
8685

8786
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::
8887

8988
### View your threat intelligence in the management interface
9089

91-
This procedure describes how to view and manage your indicators. Use the **Threat intelligence** page to sort, filter, and search your imported threat indicators without writing a Log Analytics query.
90+
Use the management interface to sort, filter, and search your threat indicators from whatever source they were ingested from without writing a Log Analytics query.
91+
92+
1. From the management interface, expand the **What would you like to search?** menu.
93+
1. Select the STIX object type or leave the default **All object types**.
94+
1. Select conditions using logical operators.
95+
1. Select the object you want to see more information about.
96+
97+
In the following image, multiple sources were used to search by placing them in an `OR` group, while multiple conditions were group with the `AND` operator.
9298

93-
1. From the grid, select the indicator for which you want to view more information. The indicator's information includes confidence levels, tags, and threat types.
99+
:::image type="content" source="media/works-with-threat-indicators/advanced-search.png" alt-text="Screenshot shows an OR operator combined with multiple AND conditions to search threat intelligence.":::
94100

95-
Microsoft Sentinel only displays the most current version of indicators in this view. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
101+
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
96102

97-
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data. This data provides more context for investigations where the selected indicator is found.
103+
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data so you can provide more context for any investigations where indicator is found.
98104

99105
Here's an example.
100106

0 commit comments

Comments
 (0)