Skip to content

Commit 3b488fc

Browse files
update create relationship and image
1 parent 71beff0 commit 3b488fc

File tree

3 files changed

+11
-5
lines changed

3 files changed

+11
-5
lines changed
21.7 KB
Loading

articles/sentinel/understand-threat-intelligence.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -149,11 +149,15 @@ The following STIX objects are available in Microsoft Sentinel:
149149

150150
### Create relationships
151151

152-
Establish connections between objects to enhance threat detection and response. Here are some examples of the relationship builder:
152+
Establish connections between objects to enhance threat detection and response. Here are use cases of the relationship builder:
153153

154-
Connecting Threat Actor to Attack Pattern: The threat actor "APT29" uses the attack pattern "Phishing via Email" to gain initial access.
155-
Linking Indicator to Threat Actor: An indicator (malicious domain) is attributed to the threat actor "APT29".
156-
Associating Identity (Victim) with Attack Pattern: The organization "Example Corp" is targeted by the attack pattern "Phishing via Email".
154+
| Use case | Description |
155+
|---|---|
156+
| Connecting Threat Actor to Attack Pattern | The threat actor "APT29" uses the attack pattern "Phishing via Email" to gain initial access.|
157+
| Linking Indicator to Threat Actor| An indicator (malicious domain) is attributed to the threat actor "APT29". |
158+
| Associating Identity (Victim) with Attack Pattern| The organization "Example Corp" is targeted by the attack pattern "Phishing via Email".|
159+
160+
:::image type="content" source="media/understand-threat-intelligence/relationship-example.png" alt-text="Screenshot showing example relationship being built.":::
157161

158162
### Curate threat intelligence
159163

articles/sentinel/work-with-threat-indicators.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,9 @@ For more information on supported STIX objects, see [Understand threat intellige
5858

5959
1. Choose the **Object type**, then fill in the form on the **New TI object** page. Required fields are marked with a red asterisk (*).
6060

61-
1. Select **Add and duplicate** if you want to create more items with the same metadata. Otherwise, select **Add** to create the single item.
61+
1. Select **Add and duplicate** if you want to create more items with the same metadata. The following image shows the section of each STIX object's metadata that is duplicated.
62+
1. Otherwise, select **Add** to create the single item.
63+
6264

6365

6466
## Manage threat intelligence

0 commit comments

Comments
 (0)