You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/add-entity-to-threat-intelligence.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,21 +22,21 @@ With Microsoft Sentinel, you can flag these types of entities from within your i
22
22
23
23
## Add an entity to your threat intelligence
24
24
25
-
The [Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
25
+
The [Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence.
26
26
27
27
# [Incident details page](#tab/incidents)
28
28
29
29
1. On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
30
30
31
31
1. Select an incident to investigate. On the **Incident details** pane, select **View full details** to open the **Incident details** page.
32
32
33
-
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the Incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
34
-
35
33
1. On the **Entities** pane, find the entity that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
36
34
35
+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the Incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
36
+
37
37
1. Select the three dots to the right of the entity, and select **Add to TI** from the pop-up menu.
38
38
39
-
Only add the following types of entities as threat indicators:
39
+
Add only the following types of entities as threat indicators:
40
40
41
41
- Domain name
42
42
- IP address (IPv4 and IPv6)
@@ -75,20 +75,20 @@ Whichever of the two interfaces you choose, you end up here.
75
75
-**Types**
76
76
- The type of indicator represented by the entity you're adding.
77
77
- Dropdown list with possible values: `ipv4-addr`, `ipv6-addr`, `URL`, `file`, and `domain-name`.
78
-
- Required. Automatically populated based on the **entity type**.
78
+
- Required. Automatically populated based on the *entity type*.
79
79
80
80
-**Value**
81
81
- The name of this field changes dynamically to the selected indicator type.
82
82
- The value of the indicator itself.
83
-
- Required. Automatically populated by the **entity value**.
83
+
- Required. Automatically populated by the *entity value*.
84
84
85
85
-**Tags**
86
86
- Free-text tags you can add to the indicator.
87
-
- Optional. Automatically populated by the **incident ID**. You can add others.
87
+
- Optional. Automatically populated by the *incident ID*. You can add others.
88
88
89
89
-**Name**
90
90
- Name of the indicator. This name is what appears in your list of indicators.
91
-
- Optional. Automatically populated by the **incident name.**
91
+
- Optional. Automatically populated by the *incident name*.
92
92
93
93
-**Created by**
94
94
- Creator of the indicator.
@@ -126,7 +126,7 @@ Whichever of the two interfaces you choose, you end up here.
126
126
127
127
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot that shows entering information in the new threat indicator pane.":::
128
128
129
-
1. When all the fields are filled in to your satisfaction, select **Apply**. A confirmation message appears in the upper-right corner stating that your indicator was created.
129
+
1. When all the fields are filled in to your satisfaction, select **Apply**. A message appears in the upper-right corner to confirm that your indicator was created.
130
130
131
131
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
Copy file name to clipboardExpand all lines: articles/sentinel/use-matching-analytics-to-detect-threats.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,15 +15,15 @@ ms.collection: usx-security
15
15
16
16
# Use matching analytics to detect threats
17
17
18
-
Take advantage of threat intelligence produced by Microsoft to generate high-fidelity alerts and incidents with the **Microsoft Defender Threat Intelligence Analytics** rule. This built-in rule in Microsoft Sentinel matches indicators with Common Event Format (CEF) logs, Windows domain name system (DNS) events with domain and IPv4 threat indicators, syslog data, and more.
18
+
Take advantage of threat intelligence produced by Microsoft to generate high-fidelity alerts and incidents with the **Microsoft Defender Threat Intelligence Analytics** rule. This built-in rule in Microsoft Sentinel matches indicators with Common Event Format (CEF) logs, Windows DNS events with domain and IPv4 threat indicators, syslog data, and more.
19
19
20
20
> [!IMPORTANT]
21
21
> Matching analytics is currently in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for more legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
22
22
>
23
23
24
24
## Prerequisites
25
25
26
-
To produce high-fidelity alerts and incidents, one or more of the supported data connectors must be installed. A premium Microsoft Defender Threat Intelligence license isn't required. Install the appropriate solutions from the **Content hub** to connect these data sources:
26
+
You must install one or more of the supported data connectors to produce high-fidelity alerts and incidents. A premium Microsoft Defender Threat Intelligence license isn't required. Install the appropriate solutions from the **Content hub** to connect these data sources:
27
27
28
28
- Common Event Format
29
29
- DNS (preview)
@@ -79,15 +79,15 @@ Use the following steps to triage through the incidents generated by the **Micro
79
79
80
80
1. In the Microsoft Sentinel workspace where you enabled the **Microsoft Defender Threat Intelligence Analytics** rule, select **Incidents**, and search for **Microsoft Defender Threat Intelligence Analytics**.
81
81
82
-
Any incidents found are shown in the grid.
82
+
Any incidents that are found appear in the grid.
83
83
84
84
1. Select **View full details** to view entities and other details about the incident, such as specific alerts.
85
85
86
86
Here's an example.
87
87
88
88
:::image type="content" source="media/use-matching-analytics-to-detect-threats/matching-analytics.png" alt-text="Screenshot of incident generated by matching analytics with details pane.":::
89
89
90
-
1. Observe the severity assigned to the alerts and the incident. Depending on how the indicator is matched, an appropriate severity is assigned to an alert from `Informational` to `High`. For example, if the indicator is matched with firewall logs that allowed the traffic, a high-severity alert is generated. If the same indicator was matched with firewall logs that blocked the traffic, the alert generated is low or medium.
90
+
1. Observe the severity assigned to the alerts and the incident. Depending on how the indicator is matched, an appropriate severity is assigned to an alert from `Informational` to `High`. For example, if the indicator is matched with firewall logs that allowed the traffic, a high-severity alert is generated. If the same indicator was matched with firewall logs that blocked the traffic, the generated alert is low or medium.
91
91
92
92
Alerts are then grouped on a per-observable basis of the indicator. For example, all alerts generated in a 24-hour time period that match the `contoso.com` domain are grouped into a single incident with a severity assigned based on the highest alert severity.
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ Here's an example.
53
53
54
54
### Find and view your indicators in Logs
55
55
56
-
This procedure describes how to view your imported threat indicators in the Microsoft Sentinel **Logs** area, together with other Microsoft Sentinel event data, regardless of the source feed or the connector used.
56
+
This procedure describes how to view your imported threat indicators in the Microsoft Sentinel **Logs** area, together with other Microsoft Sentinel event data, regardless of the source feed or the connector that you used.
57
57
58
58
Imported threat indicators are listed in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries run elsewhere in Microsoft Sentinel, such as in **Analytics** or **Workbooks**.
59
59
@@ -97,7 +97,7 @@ Tagging threat indicators is an easy way to group them together to make them eas
97
97
98
98
With Microsoft Sentinel, you can also edit indicators, whether they were created directly in Microsoft Sentinel or come from partner sources, like TIP and TAXII servers. For indicators created in Microsoft Sentinel, all fields are editable. For indicators that come from partner sources, only specific fields are editable, including tags, **Expiration date**, **Confidence**, and **Revoked**. Either way, only the latest version of the indicator appears on the **Threat Intelligence** page. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-and-manage-your-threat-indicators).
99
99
100
-
## Workbooks provide insights about your threat intelligence
100
+
## Gain insights about your threat intelligence with workbooks
101
101
102
102
Use a purpose-built Microsoft Sentinel workbook to visualize key information about your threat intelligence in Microsoft Sentinel, and customize the workbook according to your business needs.
0 commit comments