Skip to content

Commit 33789aa

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us416874-freshness-update-ts
2 parents 7aac10e + 50ebf70 commit 33789aa

File tree

6 files changed

+229
-19
lines changed

6 files changed

+229
-19
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6739,6 +6739,11 @@
67396739
"redirect_url": "/dotnet/maui/data-cloud/push-notifications",
67406740
"redirect_document_id": false
67416741
},
6742+
{
6743+
"source_path": "articles/work-with-styx-objects-and-indicators.md",
6744+
"redirect_url": "/azure/sentinel/work-with-styx-objects-indicators",
6745+
"redirect_document_id": false
6746+
},
67426747
{
67436748
"source_path": "articles/storage/files/geo-redundant-storage-for-large-file-shares.md",
67446749
"redirect_url": "/azure/storage/files/files-redundancy",

articles/healthcare-apis/dicom/update-files.md

Lines changed: 45 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,10 @@ Beyond the efficiency gains, the bulk update capability preserves a record of th
1919
There are a few limitations when you use the bulk update operation:
2020

2121
- A maximum of 50 studies can be updated in a single operation.
22-
- Only one bulk update operation can be performed at a time.
22+
- Only one bulk update operation can be performed at a time for a given study.
23+
- For updates involving UID changes, only one study can be updated in a single operation.
24+
- Only Study Instance UID and Series Instance UID can be updated as part of UID update. SOP Instance UID cannot be updated for an instance.
25+
- UID update operation would fail when the target UIDs (`studyInstanceUID`, `seriesInstanceUid` and `sopInstanceUId`) already exists.
2326
- You can't delete only the latest version of a study, or revert back to the original version.
2427
- You can't update any field from non-null to a null value.
2528

@@ -64,6 +67,41 @@ The request body contains the specification for studies to update. Both the `stu
6467
}
6568
```
6669

70+
For updating the UIDs, new UIDs have to be provided in the change dataset as follows. The `seriesInstanceUid` is an optional field.
71+
72+
1. Use the request in the format below to update the `studyInstanceUid` for all instances within a study.
73+
74+
```
75+
{
76+
"studyInstanceUids": ["1.2.3.4"],
77+
"changeDataset": {
78+
"0020000D": {
79+
"vr": "UI",
80+
"Value": ["1.2.3.5"]
81+
}
82+
}
83+
}
84+
```
85+
86+
2. Use the request in the format below to update the `studyInstanceUid` and the `seriesInstanceUid` for all instances within a series. Note that only one study can be updated at a time, and if a series-level update is performed, the entire hierarchy must be included. For series-level update, both the new `studyInstanceUid` and `seriesInstanceUid` have to be provided in the `changeDataset`.
87+
88+
```
89+
{
90+
"studyInstanceUids": ["1.2.3.4"],
91+
"seriesInstanceUid": "5.6.7.8",
92+
"changeDataset": {
93+
"0020000D": {
94+
"vr": "UI",
95+
"Value": ["1.2.3.5"]
96+
},
97+
"0020000E": {
98+
"vr": "UI",
99+
"Value": ["5.6.7.9"]
100+
}
101+
}
102+
}
103+
```
104+
67105
#### Responses
68106
When a bulk update operation starts successfully, the API returns a `202` status code. The body of the response contains a reference to the operation.
69107

@@ -140,7 +178,7 @@ GET {dicom-service-url}/{version}/operations/{operationId}
140178
| 404 (Not Found) | | Operation not found |
141179

142180
## Retrieving study versions
143-
The [Retrieve (WADO-RS)](dicom-services-conformance-statement-v2.md#retrieve-wado-rs) transaction allows you to retrieve both the original and latest version of a study, series, or instance. By default, the latest version of a study, series, or instance is returned. The original version is returned by setting the `msdicom-request-original` header to `true`. An example request follows.
181+
The [Retrieve (WADO-RS)](dicom-services-conformance-statement-v2.md#retrieve-wado-rs) transaction allows you to retrieve both the original and latest version of a study, series, or instance. By default, the latest version of a study, series, or instance is returned. The original version is returned by setting the `msdicom-request-original` header to `true`. For bulk updates involving UID update, the original and latest version can be retrieved using the newer UIDs only. An example request follows.
144182

145183
```http
146184
GET {dicom-service-url}/{version}/studies/{study}/series/{series}/instances/{instance}
@@ -149,11 +187,13 @@ msdicom-request-original: true
149187
Content-Type: application/dicom
150188
```
151189

190+
For bulk updates involving UID update, the original and latest version can be retrieved using the newer UIDs only.
191+
152192
## Delete
153193
The [delete](dicom-services-conformance-statement-v2.md#delete) method deletes both the original and latest version of a study, series, or instance.
154194

155195
## Change feed
156-
The [change feed](change-feed-overview.md) records update actions in the same manner as create and delete actions.
196+
The [change feed](change-feed-overview.md) records update actions in the same manner as create and delete actions. For UID updates, change feed entries for the older UIDs will not be updated. The update action would be present only for the new UIDs.
157197

158198
## Supported DICOM modules
159199
Any attributes in the [Patient Identification Module](https://dicom.nema.org/dicom/2013/output/chtml/part03/sect_C.2.html#table_C.2-2) and [Patient Demographic Module](https://dicom.nema.org/dicom/2013/output/chtml/part03/sect_C.2.html#table_C.2-3) that aren't sequences can be updated using the bulk update operation. Supported attributes are called out in the tables.
@@ -213,6 +253,8 @@ The UID `1.3.6.1.4.1.311.129` is a registered under [Microsoft OID arc](https://
213253
#### General study module
214254
| Attribute Name | Tag | Description |
215255
| ---------------- | --------------| --------------------- |
256+
| Study Instance UID | (0020,000D) | Unique identifier for the Study |
257+
| Series Instance UID | (0020,000E) | Unique identifier for the Series |
216258
| Referring Physician's Name | (0008,0090) | Name of the patient's referring physician |
217259
| Accession Number | (0008,0050) | A RIS generated number that identifies the order for the Study |
218260
| Study Description | (0008,1030) | Institution-generated description or classification of the Study (component) performed |

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -802,6 +802,8 @@
802802
href: use-threat-indicators-in-analytics-rules.md
803803
- name: Use matching analytics to detect threats
804804
href: use-matching-analytics-to-detect-threats.md
805+
- name: Work with STIX objects and indicators
806+
href: work-with-styx-objects-indicators.md
805807
- name: Detect threats and analyze data
806808
items:
807809
- name: Monitor and visualize data

articles/sentinel/understand-threat-intelligence.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,11 @@
22
title: Threat intelligence
33
titleSuffix: Microsoft Sentinel
44
description: Understand threat intelligence and how it integrates with features in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
5-
author: austinmccollum
5+
author: guywi-ms
66
ms.topic: concept-article
77
ms.date: 02/27/2025
8-
ms.author: austinmc
8+
ms.author: guywild
9+
ms.reviewer: alsheheb
910
appliesto:
1011
- Microsoft Sentinel in the Azure portal
1112
- Microsoft Sentinel in the Microsoft Defender portal
@@ -203,23 +204,28 @@ For more information, see [Work with threat intelligence in Microsoft Sentinel](
203204

204205
## View your threat intelligence
205206

206-
View your threat intelligence from the management interface or using queries. From the management interface, use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
207+
View your threat intelligence from the management interface or using queries:
207208

208-
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
209+
- From the management interface, use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
209210

210-
Use queries to view threat intelligence from **Logs** or **Advanced hunting**. Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211+
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
212+
213+
- Use queries to view threat intelligence from **Logs** in the Azure portal or **Advanced hunting** in the Defender portal.
214+
215+
Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211216

212217
>[!IMPORTANT]
213-
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
214-
>
218+
> On April 3, 2025, we publicly previewed two new tables to support STIX indicator and object schemas: `ThreatIntelIndicator` and `ThreatIntelObjects`. Microsoft Sentinel will ingest all threat intelligence into these new tables, while continuing to ingest the same data into the legacy `ThreatIntelligenceIndicator` table until July 31, 2025.
219+
>**Be sure to update your custom queries, analytics and detection rules, workbooks, and automation to use the new tables by July 31, 2025.** After this date, Microsoft Sentinel will stop ingesting data to the legacy `ThreatIntelligenceIndicator` table. We're updating all out-of-the-box threat intelligence solutions in Content hub to leverage the new tables. For more information about the new table schemas, see [ThreatIntelIndicator](/azure/azure-monitor/reference/tables/threatintelligenceindicator) and [ThreatIntelObjects](/azure/azure-monitor/reference/tables/threatintelobjects).
220+
> For information on using and migrating to the new tables, see (Work with STIX objects to enhance threat intelligence and threat hunting in Microsoft Sentinel (Preview))[work-with-styx-objects-and-indicators.md].
215221
216-
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
222+
### Threat intelligence lifecycle
217223

218-
### Threat intelligence life cycle
224+
Microsoft Sentinel ingests threat intelligence indicators into the threat intelligence tables in your Log Analytics workspace. For more information on Microsoft Sentinel's threat intelligence tables, see [View your threat intelligence](#view-your-threat-intelligence).
219225

220-
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
226+
Whenever an indicator is created, updated, or deleted, Microsoft Sentinel creates a new entry in the tables. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `Id` property (the `IndicatorId` property in the legacy `ThreatIntelligenceIndicator`) and chooses the indicator with the newest `TimeGenerated[UTC]`.
221227

222-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated using both the source and pattern of the indicator.
228+
The `Id` property is a concatenation of the base64-encoded `SourceSystem` value, `---` (three dashes), and the `stixId` (which is the `Data.Id` value).
223229

224230
### View your GeoLocation and WhoIs data enrichments (public preview)
225231

0 commit comments

Comments
 (0)