Skip to content

Commit 4479d03

Browse files
update image common metadata
1 parent 66bebba commit 4479d03

File tree

3 files changed

+8
-7
lines changed

3 files changed

+8
-7
lines changed
36.1 KB
Loading

articles/sentinel/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Managing Microsoft Sentinel-powered threat intelligence has moved in the Defende
3939
Enhanced threat intelligence capabilities are available in both Microsoft's unified SecOps platform and Microsoft Sentinel in the Azure portal. The management interface streamlines the manual process of creating individual threat intel with these key features:
4040
- Define relationships as you create new STIX objects.
4141
- Curate existing threat intelligence with the new relationship builder.
42-
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing threat intel objects.
42+
- Copy common metadata from a new or existing TI object with the duplicate feature.
4343

4444
Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query. For more information, see the following articles:
4545
- [New STIX objects in Microsoft Sentinel](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-public-preview-new-stix-objects-in-microsoft-sentinel/4369164)

articles/sentinel/work-with-threat-indicators.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,12 @@ For more information on supported STIX objects, see [Understand threat intellige
6060

6161
1. Select **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
6262

63-
:::image type="content" source="media/work-with-threat-indicators/" alt-text="{alt-text}":::
63+
:::image type="content" source="media/work-with-threat-indicators/common-metadata-stix-object.png" alt-text="Screenshot showing new STIX object creation and the common metadata available to all objects.":::
6464

6565
1. Otherwise, select **Add** to create the single item.
6666

67-
Relationship
67+
## Curate threat intelligence
68+
6869

6970
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::
7071

@@ -99,11 +100,11 @@ Here's an example.
99100
100101
### Find and view your indicators in Logs
101102

102-
This procedure describes how to view your imported threat indicators in the Microsoft Sentinel **Logs** area, together with other Microsoft Sentinel event data, regardless of the source feed or the connector that you used.
103+
This procedure describes how to view your imported threat indicators in Log Analytics, together with other Microsoft Sentinel event data, regardless of the source feed or method you used to ingest them.
103104

104105
Imported threat indicators are listed in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries run elsewhere in Microsoft Sentinel, such as in **Analytics** or **Workbooks**.
105106

106-
To view your threat intelligence indicators in **Logs**:
107+
To view your threat intelligence indicators:
107108

108109
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **General**, select **Logs**.
109110

@@ -117,9 +118,9 @@ To view your threat intelligence indicators in **Logs**:
117118

118119
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
119120

120-
### Tag and edit threat indicators
121+
### Tag and edit threat intelligence
121122

122-
Tagging threat indicators is an easy way to group them together to make them easier to find. Typically, you might apply tags to an indicator related to a particular incident, or if the indicator represents threats from a particular known actor or well-known attack campaign. After you search for the indicators you want to work with, tag them individually. Multiselect indicators and tag them all at once with one or more tags. Because tagging is free-form, we recommend that you create standard naming conventions for threat indicator tags.
123+
Tagging threat intelligence is an easy way to group them together to make them easier to find. Typically, you might apply tags to an indicator related to a particular incident, or if the indicator represents threats from a particular known actor or well-known attack campaign. After you search for the indicators you want to work with, tag them individually. Multiselect indicators and tag them all at once with one or more tags. Because tagging is free-form, we recommend that you create standard naming conventions for threat indicator tags.
123124

124125
:::image type="content" source="media/work-with-threat-indicators/threat-intel-tagging-indicators.png" alt-text="Screenshot that shows applying tags to threat indicators." lightbox="media/work-with-threat-indicators/threat-intel-tagging-indicators.png":::
125126

0 commit comments

Comments
 (0)