Skip to content

Commit 4a5c0a5

Browse files
add mdti portion
1 parent 7949b54 commit 4a5c0a5

File tree

3 files changed

+8
-1
lines changed

3 files changed

+8
-1
lines changed
39.7 KB
Loading

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,13 @@ In the **Threat Intelligence** page:
8484

8585
:::image type="content" source="media/work-with-threat-indicators/matching-analytics-threat-intelligence.png" alt-text="Screenshot of the Threat Intelligence overview with an indicator selecting showing the details pain and the source as Microsoft Threat Intelligence Analytics.":::
8686

87+
## Get additional context from Microsoft Defender Threat Intelligence
88+
89+
Part of the Microsoft Threat Intelligence available through matching analytics is sourced from Microsoft Defender Threat Intelligence (MDTI). Along with high fidelity alerts and incidents, MDTI indicators include the link to a reference article in their community portal.
90+
91+
:::image type="content" source="media/use-matching-analytics-to-detect-threats/mdti-article-link.png" alt-text="Screenshot of an incident with a link to the reference MDTI article.":::
92+
93+
For more information, see the [MDTI portal](https://ti.defender.microsoft.com).
8794

8895
## Next steps
8996

articles/sentinel/use-threat-indicators-in-analytics-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ According to the default settings, each time the rule runs on its schedule, any
7373

7474
In Microsoft Sentinel, the alerts generated from analytics rules also generate security incidents, which can be found in **Incidents** under **Threat Management** on the Microsoft Sentinel menu. Incidents are what your security operations teams will triage and investigate to determine the appropriate response actions. You can find detailed information in this [Tutorial: Investigate incidents with Microsoft Sentinel](./investigate-cases.md).
7575

76-
Microsoft Sentinel refreshes indicators every 12 days to make sure they are available for matching purposes through the analytic rules.
76+
Since analytic rules constrain lookups beyond 14 days, Microsoft Sentinel refreshes indicators every 12 days to make sure they are available for matching purposes through the analytic rules.
7777

7878
## Next steps
7979

0 commit comments

Comments
 (0)