You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -157,10 +157,17 @@ Take full control of threat intelligence feeds by filtering and optimizing the i
157
157
| Ingestion rule use case | Description |
158
158
|---|---|
159
159
| Reduce noise | Filter out old threat intelligence not updated for 6 months that also has low confidence. |
160
-
| Extend validity date | Promote high fidelity IOCs from trusted source by extending their `Valid until` by 30 days. |
160
+
| Extend validity date | Promote high fidelity IOCs from trusted sources by extending their `Valid until` by 30 days. |
161
161
| Remember the old days | The new threat actor taxonomy is great, but some of the analysts want to be sure to tag the old names. |
162
162
163
-
For more information, see [Work with threat intelligence ingestion rules](work-with-threat-indicators.md#curate-threat-intelligence-with-ingestion-rules).
163
+
:::image type="content" source="media/understand-threat-intelligence/ingestion-rules-overview.png" alt-text="Screenshot shows four ingestion rules matching the use cases.":::
164
+
165
+
Keep in mind the following tips for using ingestion rules:
166
+
- All rules apply in order. Threat intelligence objects being ingested will get processed by each rule until a `Delete` action is taken.
167
+
- The `Delete` action means the threat intelligence object is skipped for ingestion, meaning it's removed from the pipeline. Any previous versions of the object already ingested aren't affected.
168
+
- New and edited rules take up to 15 minutes to take effect.
169
+
170
+
For more information, see [Work with threat intelligence ingestion rules](work-with-threat-indicators.md#optimize-threat-intelligence-feeds-with-ingestion-rules).
0 commit comments