You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/add-entity-to-threat-intelligence.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,15 +22,15 @@ With Microsoft Sentinel, you can flag these types of entities from within your i
22
22
23
23
## Add an entity to your threat intelligence
24
24
25
-
The [new incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
25
+
The [new Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
26
26
27
27
# [Incident details page](#tab/incidents)
28
28
29
29
1. On the Microsoft Sentinel menu, select **Incidents**.
30
30
31
-
1. Select an incident to investigate. On the incident details pane, select **View full details** to open the incident details page.
31
+
1. Select an incident to investigate. On the **Incident details** pane, select **View full details** to open the **Incident details** page.
32
32
33
-
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
33
+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the Incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
34
34
35
35
1. On the **Entities** pane, find the entity that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
36
36
@@ -51,7 +51,7 @@ The [investigation graph](investigate-cases.md) is a visual, intuitive tool that
51
51
52
52
1. On the Microsoft Sentinel menu, select **Incidents**.
53
53
54
-
1. Select an incident to investigate. On the incident details pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
54
+
1. Select an incident to investigate. On the **Incident details** pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
55
55
56
56
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot that shows selecting an incident from the list to investigate.":::
57
57
@@ -128,7 +128,7 @@ Whichever of the two interfaces you choose, you end up here.
128
128
129
129
1. When all the fields are filled in to your satisfaction, select **Apply**. A confirmation message appears in the upper-right corner stating that your indicator was created.
130
130
131
-
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat Intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
131
+
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
Copy file name to clipboardExpand all lines: articles/sentinel/use-matching-analytics-to-detect-threats.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ Along with high-fidelity alerts and incidents, some Microsoft Defender Threat In
107
107
108
108
:::image type="content" source="media/use-matching-analytics-to-detect-threats/mdti-article-link.png" alt-text="Screenshot that shows an incident with a link to the Microsoft Defender Threat Intelligence reference article.":::
109
109
110
-
For more information, see the [Microsoft Defender Threat Intelligence portal](https://ti.defender.microsoft.com) and [What is Microsoft Defender Threat Intelligence?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
110
+
For more information, see [What is Microsoft Defender Threat Intelligence?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,11 @@ Integrate threat intelligence into Microsoft Sentinel through the following acti
28
28
29
29
Learn how to work with threat intelligence indicators throughout Microsoft Sentinel.
30
30
31
-
### Find and view your indicators on the Threat Intelligence page
31
+
### Find and view your indicators on the Threat intelligence page
32
32
33
33
This procedure describes how to view and manage your indicators on the **Threat intelligence** page, which you can access from the main Microsoft Sentinel menu. Use the **Threat intelligence** page to sort, filter, and search your imported threat indicators without writing a Log Analytics query.
34
34
35
-
To view your threat intelligence indicators on the **Threat Intelligence** page:
35
+
To view your threat intelligence indicators on the **Threat intelligence** page:
36
36
37
37
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Threat intelligence**.
0 commit comments