Skip to content

Commit 2c04890

Browse files
committed
edit pass: sentinel-threat-intelligence-batch2
1 parent be88c7e commit 2c04890

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ With Microsoft Sentinel, you can flag these types of entities from within your i
2222

2323
## Add an entity to your threat intelligence
2424

25-
The [new incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
25+
The [new Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
2626

2727
# [Incident details page](#tab/incidents)
2828

2929
1. On the Microsoft Sentinel menu, select **Incidents**.
3030

31-
1. Select an incident to investigate. On the incident details pane, select **View full details** to open the incident details page.
31+
1. Select an incident to investigate. On the **Incident details** pane, select **View full details** to open the **Incident details** page.
3232

33-
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
33+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the Incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
3434

3535
1. On the **Entities** pane, find the entity that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
3636

@@ -51,7 +51,7 @@ The [investigation graph](investigate-cases.md) is a visual, intuitive tool that
5151

5252
1. On the Microsoft Sentinel menu, select **Incidents**.
5353

54-
1. Select an incident to investigate. On the incident details pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
54+
1. Select an incident to investigate. On the **Incident details** pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
5555

5656
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot that shows selecting an incident from the list to investigate.":::
5757

@@ -128,7 +128,7 @@ Whichever of the two interfaces you choose, you end up here.
128128

129129
1. When all the fields are filled in to your satisfaction, select **Apply**. A confirmation message appears in the upper-right corner stating that your indicator was created.
130130

131-
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat Intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
131+
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
132132

133133
## Related content
134134

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Along with high-fidelity alerts and incidents, some Microsoft Defender Threat In
107107

108108
:::image type="content" source="media/use-matching-analytics-to-detect-threats/mdti-article-link.png" alt-text="Screenshot that shows an incident with a link to the Microsoft Defender Threat Intelligence reference article.":::
109109

110-
For more information, see the [Microsoft Defender Threat Intelligence portal](https://ti.defender.microsoft.com) and [What is Microsoft Defender Threat Intelligence?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
110+
For more information, see [What is Microsoft Defender Threat Intelligence?](/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti).
111111

112112
## Related content
113113

articles/sentinel/work-with-threat-indicators.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ Integrate threat intelligence into Microsoft Sentinel through the following acti
2828

2929
Learn how to work with threat intelligence indicators throughout Microsoft Sentinel.
3030

31-
### Find and view your indicators on the Threat Intelligence page
31+
### Find and view your indicators on the Threat intelligence page
3232

3333
This procedure describes how to view and manage your indicators on the **Threat intelligence** page, which you can access from the main Microsoft Sentinel menu. Use the **Threat intelligence** page to sort, filter, and search your imported threat indicators without writing a Log Analytics query.
3434

35-
To view your threat intelligence indicators on the **Threat Intelligence** page:
35+
To view your threat intelligence indicators on the **Threat intelligence** page:
3636

3737
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Threat intelligence**.
3838

0 commit comments

Comments
 (0)