Skip to content

Commit 3d86970

Browse files
authored
Merge pull request #210186 from MicrosoftDocs/main
9/5/2022 PM Publish
2 parents dc190e4 + 039af9e commit 3d86970

19 files changed

+252
-39
lines changed

articles/active-directory/develop/apple-sso-plugin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: aaddev
1818
# Microsoft Enterprise SSO plug-in for Apple devices (preview)
1919

2020
> [!IMPORTANT]
21-
> This feature [!INCLUDE [PREVIEW BOILERPLATE](../../../includes/active-directory-develop-preview.md)]
21+
> This feature is in public preview. This preview is provided without a service-level agreement. For more information, see [Supplemental terms of use for Microsoft Azure public previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2222
2323
The *Microsoft Enterprise SSO plug-in for Apple devices* provides single sign-on (SSO) for Azure Active Directory (Azure AD) accounts on macOS, iOS, and iPadOS across all applications that support Apple's [enterprise single sign-on](https://developer.apple.com/documentation/authenticationservices) feature. The plug-in provides SSO for even old applications that your business might depend on but that don't yet support the latest identity libraries or protocols. Microsoft worked closely with Apple to develop this plug-in to increase your application's usability while providing the best protection available.
2424

articles/active-directory/standards/memo-22-09-meet-identity-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,11 @@ ms.collection: M365-identity-device-management
1717

1818
# Meet identity requirements of memorandum 22-09 with Azure Active Directory
1919

20-
US executive order [14028, Improving the Nation's Cyber Security](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity), directs federal agencies on advancing security measures that dramatically reduce the risk of successful cyberattacks against the federal government's digital infrastructure. On January 26, 2022, the [Office of Management and Budget (OMB)](https://www.whitehouse.gov/omb/) released the federal Zero Trust strategy in [memorandum 22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf), in support of EO 14028.
20+
US executive order [14028, Improving the Nation's Cyber Security](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity), directs federal agencies on advancing security measures that drastically reduce the risk of successful cyberattacks against the federal government's digital infrastructure. On January 26, 2022, the [Office of Management and Budget (OMB)](https://www.whitehouse.gov/omb/) released the federal Zero Trust strategy in [memorandum 22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf), in support of EO 14028.
2121

2222
This series of articles offers guidance for employing Azure Active Directory (Azure AD) as a centralized identity management system for implementing Zero Trust principles, as described in memorandum 22-09.
2323

24-
The release of memorandum 22-09 is designed to support Zero Trust initiatives within federal agencies. It also provides regulatory guidance in supporting federal cybersecurity and data privacy paws. The memo cites the [Department of Defense (DoD) Zero Trust Reference Architecture](https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf):
24+
The release of memorandum 22-09 is designed to support Zero Trust initiatives within federal agencies. It also provides regulatory guidance in supporting federal cybersecurity and data privacy laws. The memo cites the [Department of Defense (DoD) Zero Trust Reference Architecture](https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf):
2525

2626
>"The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access. It is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify once at the perimeter to continual verification of each user, device, application, and transaction."
2727

articles/expressroute/expressroute-howto-routing-portal-resource-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ You can remove your Microsoft peering configuration by right-clicking the peerin
171171
You can remove your private peering configuration by right-clicking the peering and selecting **Delete** as shown in the following image:
172172

173173
> [!WARNING]
174-
> You must ensure that all virtual networks and ExpressRoute Global Reach connections are removed before running this operation.
174+
> You must ensure that all virtual network connections and ExpressRoute Global Reach connections are removed before running this operation.
175175
>
176176
177177
:::image type="content" source="./media/expressroute-howto-routing-portal-resource-manager/delete-private-peering.png" alt-text="Screenshot showing how to delete private peering.":::

articles/key-vault/certificates/faq.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,10 @@ sections:
4040
When I import a certificate via the Azure portal, I get a "Something went wrong" error. How can I investigate further?
4141
answer: |
4242
To view a more descriptive error, import the certificate file by using [the Azure CLI](/cli/azure/keyvault/certificate#az_keyvault_certificate_import) or [PowerShell](/powershell/module/azurerm.keyvault/import-azurekeyvaultcertificate).
43+
- question: |
44+
When I import a certificate via the Azure portal, I get a "The size of the X.509 certificate is too long" error. What should I do?
45+
answer: |
46+
The error indicates that your certificate might be too long, it might be including many certificates in a single file. This is a hard-limit that can't be increased. The solution is to shorten your certificate file's content so that it aligns to our size's limit.
4347
- question: |
4448
How can I resolve this error? "Error type: Access denied or user is unauthorized to import certificate"
4549
answer: |

articles/lab-services/reliability-in-azure-lab-services.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ ms.date: 08/18/2022
88

99
# What is reliability in Azure Lab Services?
1010

11-
This article describes reliability support in Azure Lab Services, and covers regional resiliency with availability zones. For a more detailed overview of reliability in Azure, see [Azure resiliency](/azure/availability-zones/overview.md).
11+
This article describes reliability support in Azure Lab Services, and covers regional resiliency with availability zones. For a more detailed overview of reliability in Azure, see [Azure resiliency](/azure/availability-zones/overview).
1212

1313
## Availability zone support
1414

15-
Azure availability zones are at least three physically separate groups of datacenters within each Azure region. Datacenters within each zone are equipped with independent power, cooling, and networking infrastructure. In the case of a local zone failure, availability zones allow the services to fail over to the other availability zones to provide continuity in service with minimal interruption. Failures can range from software and hardware failures to events such as earthquakes, floods, and fires. Tolerance to failures is achieved with redundancy and logical isolation of Azure services. For more detailed information on availability zones in Azure, see [Regions and availability zones](/azure/availability-zones/az-overview.md).
15+
Azure availability zones are at least three physically separate groups of datacenters within each Azure region. Datacenters within each zone are equipped with independent power, cooling, and networking infrastructure. In the case of a local zone failure, availability zones allow the services to fail over to the other availability zones to provide continuity in service with minimal interruption. Failures can range from software and hardware failures to events such as earthquakes, floods, and fires. Tolerance to failures is achieved with redundancy and logical isolation of Azure services. For more detailed information on availability zones in Azure, see [Regions and availability zones](/azure/availability-zones/az-overview).
1616

1717
Azure availability zones-enabled services are designed to provide the right level of resiliency and flexibility. They can be configured in two ways. They can be either zone redundant, with automatic replication across zones, or zonal, with instances pinned to a specific zone. You can also combine these approaches. For more information on zonal vs. zone-redundant architecture, see [Build solutions with availability zones](/azure/architecture/high-availability/building-solutions-for-high-availability).
1818

@@ -126,4 +126,4 @@ Azure Lab Services does not provide any service-specific signals about an outage
126126
## Next steps
127127

128128
> [!div class="nextstepaction"]
129-
> [Resiliency in Azure](/azure/availability-zones/overview.md)
129+
> [Resiliency in Azure](/azure/availability-zones/overview)

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -286,6 +286,8 @@
286286
href: indicators-bulk-file-import.md
287287
- name: Work with threat indicators
288288
href: work-with-threat-indicators.md
289+
- name: Add entity to threat indicators
290+
href: add-entity-to-threat-intelligence.md
289291
- name: Monitor and visualize data
290292
items:
291293
- name: Visualize collected data
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Add entities to threat intelligence in Microsoft Sentinel
3+
description: This article shows you, if you discover a malicious entity in an incident investigation, how to add the entity to your threat intelligence indicator lists in Microsoft Sentinel.
4+
author: yelevin
5+
ms.topic: how-to
6+
ms.date: 08/25/2022
7+
ms.author: yelevin
8+
---
9+
10+
# Add entities to threat intelligence in Microsoft Sentinel
11+
12+
When investigating an incident, you examine entities and their context as an important part of understanding the scope and nature of the incident. In the course of the investigation, you may discover a domain name, URL, file, or IP address in the incident that should be labeled and tracked as an indicator of compromise (IOC), a threat indicator.
13+
14+
For example, you may discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
15+
16+
Microsoft Sentinel allows you to flag these types of entities as malicious, right from within the investigation graph, and add it to your threat indicator lists. You'll then be able to view the added indicators both in Logs and in the Threat Intelligence blade, and use them across your Microsoft Sentinel workspace.
17+
18+
> [!IMPORTANT]
19+
> Adding entities as TI indicators is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
20+
21+
## Add an entity to your indicators list
22+
23+
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. You can use it to add entities to your threat intelligence indicator lists, making them available across your workspace.
24+
25+
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
26+
27+
1. Select an incident to investigate. In the incident details panel, select the **Actions** button and choose **Investigate** from the pop-up menu. This will open the investigation graph.
28+
29+
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot of selecting incident from queue to investigate.":::
30+
31+
1. Select the entity from the graph that you want to add as a threat indicator. A side panel will open on the right. Select **Add to TI**.
32+
33+
Only the following types of entities can be added as threat indicators:
34+
- Domain name
35+
- IP address (IPv4 and IPv6)
36+
- URL
37+
- File (hash)
38+
39+
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot of adding entity to threat intelligence.":::
40+
41+
1. The **New indicator** side panel will open. The following fields will be populated automatically:
42+
43+
- **Type**
44+
- The type of indicator represented by the entity you're adding.
45+
Drop-down with possible values: *ipv4-addr*, *ipv6-addr*, *URL*, *file*, *domain-name*
46+
- Required; automatically populated based on the **entity type**.
47+
48+
- **Value**
49+
- The name of this field changes dynamically to the selected indicator type.
50+
- The value of the indicator itself.
51+
- Required; automatically populated by the **entity value**.
52+
53+
- **Tags**
54+
- Free-text tags you can add to the indicator.
55+
- Optional; automatically populated by the **incident ID**. You can add others.
56+
57+
- **Name**
58+
- Name of the indicator - this is what will be displayed in your list of indicators.
59+
- Optional; automatically populated by the **incident name.**
60+
61+
- **Created by**
62+
- Creator of the indicator.
63+
- Optional; automatically-populated by the user logged into Microsoft Sentinel.
64+
65+
Fill in the remaining fields accordingly.
66+
67+
- **Threat type**
68+
- The threat type represented by the indicator.
69+
- Optional; free text.
70+
71+
- **Description**
72+
- Description of the indicator.
73+
- Optional; free text.
74+
75+
- **Revoked**
76+
- Revoked status of the indicator. Mark checkbox to revoke the indicator, clear checkbox to make it active.
77+
- Optional; boolean.
78+
79+
- **Confidence**
80+
- Score reflecting confidence in the correctness of the data, by percent.
81+
- Optional; integer, 1-100
82+
83+
- **Kill chain**
84+
- Phases in the [*Lockheed Martin Cyber Kill Chain*](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
85+
- Optional; free text
86+
87+
- **Valid from**
88+
- The time from which this indicator is considered valid.
89+
- Required; date/time
90+
91+
- **Valid until**
92+
- The time at which this indicator should no longer be considered valid.
93+
- Optional; date/time
94+
95+
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot of entering information in new threat indicator panel.":::
96+
97+
1. When all the fields are filled in to your satisfaction, select **Apply**. You'll see a confirmation message in the upper-right-hand corner that your indicator was created.
98+
99+
1. The entity will be added as a threat indicator in your workspace. You can find it [in the list of indicators in the **Threat intelligence** page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page), and also [in the *ThreatIntelligenceIndicators* table in **Logs**](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
100+
101+
## Next steps
102+
103+
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
104+
105+
- [Investigate incidents with Microsoft Sentinel](investigate-cases.md)
106+
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md)
107+
- [Work with threat indicators in Microsoft Sentinel](work-with-threat-indicators.md)
90.8 KB
Loading
121 KB
Loading
550 KB
Loading

0 commit comments

Comments
 (0)