You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/healthcare-apis/dicom/update-files.md
+45-3Lines changed: 45 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,10 @@ Beyond the efficiency gains, the bulk update capability preserves a record of th
19
19
There are a few limitations when you use the bulk update operation:
20
20
21
21
- A maximum of 50 studies can be updated in a single operation.
22
-
- Only one bulk update operation can be performed at a time.
22
+
- Only one bulk update operation can be performed at a time for a given study.
23
+
- For updates involving UID changes, only one study can be updated in a single operation.
24
+
- Only Study Instance UID and Series Instance UID can be updated as part of UID update. SOP Instance UID cannot be updated for an instance.
25
+
- UID update operation would fail when the target UIDs (`studyInstanceUID`, `seriesInstanceUid` and `sopInstanceUId`) already exists.
23
26
- You can't delete only the latest version of a study, or revert back to the original version.
24
27
- You can't update any field from non-null to a null value.
25
28
@@ -64,6 +67,41 @@ The request body contains the specification for studies to update. Both the `stu
64
67
}
65
68
```
66
69
70
+
For updating the UIDs, new UIDs have to be provided in the change dataset as follows. The `seriesInstanceUid` is an optional field.
71
+
72
+
1. Use the request in the format below to update the `studyInstanceUid` for all instances within a study.
73
+
74
+
```
75
+
{
76
+
"studyInstanceUids": ["1.2.3.4"],
77
+
"changeDataset": {
78
+
"0020000D": {
79
+
"vr": "UI",
80
+
"Value": ["1.2.3.5"]
81
+
}
82
+
}
83
+
}
84
+
```
85
+
86
+
2. Use the request in the format below to update the `studyInstanceUid` and the `seriesInstanceUid` for all instances within a series. Note that only one study can be updated at a time, and if a series-level update is performed, the entire hierarchy must be included. For series-level update, both the new `studyInstanceUid` and `seriesInstanceUid` have to be provided in the `changeDataset`.
87
+
88
+
```
89
+
{
90
+
"studyInstanceUids": ["1.2.3.4"],
91
+
"seriesInstanceUid": "5.6.7.8",
92
+
"changeDataset": {
93
+
"0020000D": {
94
+
"vr": "UI",
95
+
"Value": ["1.2.3.5"]
96
+
},
97
+
"0020000E": {
98
+
"vr": "UI",
99
+
"Value": ["5.6.7.9"]
100
+
}
101
+
}
102
+
}
103
+
```
104
+
67
105
#### Responses
68
106
When a bulk update operation starts successfully, the API returns a `202` status code. The body of the response contains a reference to the operation.
69
107
@@ -140,7 +178,7 @@ GET {dicom-service-url}/{version}/operations/{operationId}
140
178
| 404 (Not Found) || Operation not found |
141
179
142
180
## Retrieving study versions
143
-
The [Retrieve (WADO-RS)](dicom-services-conformance-statement-v2.md#retrieve-wado-rs) transaction allows you to retrieve both the original and latest version of a study, series, or instance. By default, the latest version of a study, series, or instance is returned. The original version is returned by setting the `msdicom-request-original` header to `true`. An example request follows.
181
+
The [Retrieve (WADO-RS)](dicom-services-conformance-statement-v2.md#retrieve-wado-rs) transaction allows you to retrieve both the original and latest version of a study, series, or instance. By default, the latest version of a study, series, or instance is returned. The original version is returned by setting the `msdicom-request-original` header to `true`. For bulk updates involving UID update, the original and latest version can be retrieved using the newer UIDs only. An example request follows.
144
182
145
183
```http
146
184
GET {dicom-service-url}/{version}/studies/{study}/series/{series}/instances/{instance}
For bulk updates involving UID update, the original and latest version can be retrieved using the newer UIDs only.
191
+
152
192
## Delete
153
193
The [delete](dicom-services-conformance-statement-v2.md#delete) method deletes both the original and latest version of a study, series, or instance.
154
194
155
195
## Change feed
156
-
The [change feed](change-feed-overview.md) records update actions in the same manner as create and delete actions.
196
+
The [change feed](change-feed-overview.md) records update actions in the same manner as create and delete actions. For UID updates, change feed entries for the older UIDs will not be updated. The update action would be present only for the new UIDs.
157
197
158
198
## Supported DICOM modules
159
199
Any attributes in the [Patient Identification Module](https://dicom.nema.org/dicom/2013/output/chtml/part03/sect_C.2.html#table_C.2-2) and [Patient Demographic Module](https://dicom.nema.org/dicom/2013/output/chtml/part03/sect_C.2.html#table_C.2-3) that aren't sequences can be updated using the bulk update operation. Supported attributes are called out in the tables.
@@ -213,6 +253,8 @@ The UID `1.3.6.1.4.1.311.129` is a registered under [Microsoft OID arc](https://
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+17-11Lines changed: 17 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,11 @@
2
2
title: Threat intelligence
3
3
titleSuffix: Microsoft Sentinel
4
4
description: Understand threat intelligence and how it integrates with features in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
5
-
author: austinmccollum
5
+
author: guywi-ms
6
6
ms.topic: concept-article
7
7
ms.date: 02/27/2025
8
-
ms.author: austinmc
8
+
ms.author: guywild
9
+
ms.reviewer: alsheheb
9
10
appliesto:
10
11
- Microsoft Sentinel in the Azure portal
11
12
- Microsoft Sentinel in the Microsoft Defender portal
@@ -203,23 +204,28 @@ For more information, see [Work with threat intelligence in Microsoft Sentinel](
203
204
204
205
## View your threat intelligence
205
206
206
-
View your threat intelligence from the management interface or using queries. From the management interface, use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
207
+
View your threat intelligence from the management interface or using queries:
207
208
208
-
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
209
+
- From the management interface, use advanced search to sort and filter your threatintelligence objects without even writing a Log Analytics query.
209
210
210
-
Use queries to view threat intelligence from **Logs** or **Advanced hunting**. Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211
+
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
212
+
213
+
- Use queries to view threat intelligence from **Logs** in the Azure portal or **Advanced hunting** in the Defender portal.
214
+
215
+
Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211
216
212
217
>[!IMPORTANT]
213
-
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
214
-
>
218
+
> On April 3, 2025, we publicly previewed two new tables to support STIX indicator and object schemas: `ThreatIntelIndicator` and `ThreatIntelObjects`. Microsoft Sentinel will ingest all threat intelligence into these new tables, while continuing to ingest the same data into the legacy `ThreatIntelligenceIndicator` table until July 31, 2025.
219
+
>**Be sure to update your custom queries, analytics and detection rules, workbooks, and automation to use the new tables by July 31, 2025.** After this date, Microsoft Sentinel will stop ingesting data to the legacy `ThreatIntelligenceIndicator` table. We're updating all out-of-the-box threat intelligence solutions in Content hub to leverage the new tables. For more information about the new table schemas, see [ThreatIntelIndicator](/azure/azure-monitor/reference/tables/threatintelligenceindicator) and [ThreatIntelObjects](/azure/azure-monitor/reference/tables/threatintelobjects).
220
+
> For information on using and migrating to the new tables, see (Work with STIX objects to enhance threat intelligence and threat hunting in Microsoft Sentinel (Preview))[work-with-styx-objects-and-indicators.md].
215
221
216
-
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
222
+
### Threat intelligence lifecycle
217
223
218
-
### Threat intelligence life cycle
224
+
Microsoft Sentinel ingests threat intelligence indicators into the threat intelligence tables in your Log Analytics workspace. For more information on Microsoft Sentinel's threat intelligence tables, see [View your threat intelligence](#view-your-threat-intelligence).
219
225
220
-
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
226
+
Whenever an indicator is created, updated, or deleted, Microsoft Sentinel creates a new entry in the tables. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `Id` property (the `IndicatorId` property in the legacy `ThreatIntelligenceIndicator`) and chooses the indicator with the newest `TimeGenerated[UTC]`.
221
227
222
-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated using both the source and pattern of the indicator.
228
+
The `Id` property is a concatenation of the base64-encoded `SourceSystem` value, `---` (three dashes), and the `stixId` (which is the `Data.Id` value).
223
229
224
230
### View your GeoLocation and WhoIs data enrichments (public preview)
0 commit comments