Skip to content

Commit 196924d

Browse files
committed
edit pass: sentinel-threat-intelligence-batch2
1 parent 7a585ab commit 196924d

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,19 +14,19 @@ ms.collection: usx-security
1414

1515
# Add entities to threat intelligence in Microsoft Sentinel
1616

17-
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise in your threat intelligence.
17+
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise (IOC) in your threat intelligence.
1818

19-
For example, you might discover an IP address that performs port scans across your network or functions as a command and control node by sending and receiving transmissions from large numbers of nodes in your network.
19+
For example, you might discover an IP address that performs port scans across your network or functions as a command and control node by sending and/or receiving transmissions from large numbers of nodes in your network.
2020

2121
With Microsoft Sentinel, you can flag these types of entities from within your incident investigation and add them to your threat intelligence. You can view the added indicators in **Logs** and **Threat Intelligence** and use them across your Microsoft Sentinel workspace.
2222

2323
## Add an entity to your threat intelligence
2424

25-
The [new Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
25+
The [Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
2626

2727
# [Incident details page](#tab/incidents)
2828

29-
1. On the Microsoft Sentinel menu, select **Incidents**.
29+
1. On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
3030

3131
1. Select an incident to investigate. On the **Incident details** pane, select **View full details** to open the **Incident details** page.
3232

@@ -49,7 +49,7 @@ The [new Incident details page](investigate-incidents.md) and the investigation
4949

5050
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. Use it to add entities to your threat intelligence indicator lists by making them available across your workspace.
5151

52-
1. On the Microsoft Sentinel menu, select **Incidents**.
52+
1. On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
5353

5454
1. Select an incident to investigate. On the **Incident details** pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
5555

0 commit comments

Comments
 (0)