Skip to content

Commit 24376ae

Browse files
update relationship image
1 parent 4479d03 commit 24376ae

File tree

4 files changed

+9
-5
lines changed

4 files changed

+9
-5
lines changed

articles/sentinel/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -790,7 +790,7 @@
790790
href: connect-threat-intelligence-taxii.md
791791
- name: Add threat intelligence in bulk by file
792792
href: indicators-bulk-file-import.md
793-
- name: Work with threat indicators
793+
- name: Work with threat intelligence
794794
href: work-with-threat-indicators.md
795795
- name: Add entity to threat indicators
796796
href: add-entity-to-threat-intelligence.md
16 KB
Loading

articles/sentinel/whats-new.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,12 +36,14 @@ Managing Microsoft Sentinel-powered threat intelligence has moved in the Defende
3636

3737
:::image type="content" source="media/whats-new/intel-management-navigation.png" alt-text="Screenshot showing new menu placement for Microsoft Sentinel threat intelligence.":::
3838

39-
Enhanced threat intelligence capabilities are available in both Microsoft's unified SecOps platform and Microsoft Sentinel in the Azure portal. The management interface streamlines the manual process of creating individual threat intel with these key features:
39+
Enhanced threat intelligence capabilities are available in both Microsoft's unified SecOps platform and Microsoft Sentinel in the Azure portal. The management interface streamlines the creation and curation of threat intel with these key features:
40+
4041
- Define relationships as you create new STIX objects.
4142
- Curate existing threat intelligence with the new relationship builder.
42-
- Copy common metadata from a new or existing TI object with the duplicate feature.
43+
- Create multiple objects quickly by copying common metadata from a new or existing TI object with the duplicate feature.
44+
- Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
4345

44-
Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query. For more information, see the following articles:
46+
For more information, see the following articles:
4547
- [New STIX objects in Microsoft Sentinel](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-public-preview-new-stix-objects-in-microsoft-sentinel/4369164)
4648
- [Understand threat intelligence](understand-threat-intelligence.md#create-and-manage-threat-intelligence)
4749
- [Uncover adversaries with threat intelligence in Microsoft's unified SecOps platform](/unified-secops-platform/threat-intelligence-overview)

articles/sentinel/work-with-threat-indicators.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,9 @@ For more information on supported STIX objects, see [Understand threat intellige
6464

6565
1. Otherwise, select **Add** to create the single item.
6666

67-
## Curate threat intelligence
67+
### Curate threat intelligence with the relationship builder
68+
69+
6870

6971

7072
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::

0 commit comments

Comments
 (0)