Skip to content

Commit 4dd11ac

Browse files
authored
Merge pull request #286135 from paulth1/sentinel-threat-intelligence-batch2
[AQ] edit pass: Sentinel threat intelligence batch2
2 parents 4e42722 + b61f602 commit 4dd11ac

6 files changed

+207
-205
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 47 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -9,128 +9,130 @@ ms.date: 3/14/2024
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
12-
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
12+
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so that I don't lose important information.
1313
---
1414

1515
# Add entities to threat intelligence in Microsoft Sentinel
1616

1717
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise (IOC) in your threat intelligence.
1818

19-
For example, you discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
19+
For example, you might discover an IP address that performs port scans across your network or functions as a command and control node by sending and/or receiving transmissions from large numbers of nodes in your network.
2020

21-
Microsoft Sentinel allows you to flag these types of entities right from within your incident investigation, and add it to your threat intelligence. You are able to view the added indicators both in **Logs** and **Threat Intelligence**, and use them across your Microsoft Sentinel workspace.
21+
With Microsoft Sentinel, you can flag these types of entities from within your incident investigation and add them to your threat intelligence. You can view the added indicators in **Logs** and **Threat Intelligence** and use them across your Microsoft Sentinel workspace.
2222

2323
## Add an entity to your threat intelligence
2424

25-
The new [incident details page](investigate-incidents.md) gives you another way to add entities to threat intelligence, in addition to the investigation graph. Both ways are shown below.
25+
The [Incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence.
2626

2727
# [Incident details page](#tab/incidents)
2828

29-
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
29+
1. On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
3030

31-
1. Select an incident to investigate. In the incident details panel, select **View full details** to open the incident details page.
31+
1. Select an incident to investigate. On the **Incident details** pane, select **View full details** to open the **Incident details** page.
3232

33-
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot of incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
33+
1. On the **Entities** pane, find the entity that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
3434

35-
1. Find the entity from the **Entities** widget that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
35+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the Incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
3636

3737
1. Select the three dots to the right of the entity, and select **Add to TI** from the pop-up menu.
3838

39-
Only the following types of entities can be added as threat indicators:
39+
Add only the following types of entities as threat indicators:
40+
4041
- Domain name
4142
- IP address (IPv4 and IPv6)
4243
- URL
4344
- File (hash)
4445

45-
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot of adding an entity to threat intelligence.":::
46+
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot that shows adding an entity to threat intelligence.":::
4647

4748
# [Investigation graph](#tab/cases)
4849

49-
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. You can use it to add entities to your threat intelligence indicator lists, making them available across your workspace.
50+
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. Use it to add entities to your threat intelligence indicator lists by making them available across your workspace.
51+
52+
1. On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
5053

51-
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
54+
1. Select an incident to investigate. On the **Incident details** pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
5255

53-
1. Select an incident to investigate. In the incident details panel, select the **Actions** button and choose **Investigate** from the pop-up menu. This will open the investigation graph.
56+
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot that shows selecting an incident from the list to investigate.":::
5457

55-
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot of selecting incident from queue to investigate.":::
58+
1. Select the entity from the graph that you want to add as a threat indicator. On the side pane that opens, select **Add to TI**.
5659

57-
1. Select the entity from the graph that you want to add as a threat indicator. A side panel will open on the right. Select **Add to TI**.
60+
Only add the following types of entities as threat indicators:
5861

59-
Only the following types of entities can be added as threat indicators:
6062
- Domain name
6163
- IP address (IPv4 and IPv6)
6264
- URL
6365
- File (hash)
6466

65-
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot of adding entity to threat intelligence.":::
67+
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot that shows adding an entity to threat intelligence.":::
6668

6769
---
6870

69-
Whichever of the two interfaces you choose, you will end up here:
71+
Whichever of the two interfaces you choose, you end up here.
7072

71-
1. The **New indicator** side panel will open. The following fields will be populated automatically:
73+
1. The **New indicator** side pane opens. The following fields are populated automatically:
7274

73-
- **Type**
74-
- The type of indicator represented by the entity you're adding.
75-
Drop-down with possible values: *ipv4-addr*, *ipv6-addr*, *URL*, *file*, *domain-name*
76-
- Required; automatically populated based on the **entity type**.
75+
- **Types**
76+
- The type of indicator represented by the entity you're adding.
77+
- Dropdown list with possible values: `ipv4-addr`, `ipv6-addr`, `URL`, `file`, and `domain-name`.
78+
- Required. Automatically populated based on the *entity type*.
7779

7880
- **Value**
7981
- The name of this field changes dynamically to the selected indicator type.
8082
- The value of the indicator itself.
81-
- Required; automatically populated by the **entity value**.
83+
- Required. Automatically populated by the *entity value*.
8284

83-
- **Tags**
85+
- **Tags**
8486
- Free-text tags you can add to the indicator.
85-
- Optional; automatically populated by the **incident ID**. You can add others.
87+
- Optional. Automatically populated by the *incident ID*. You can add others.
8688

8789
- **Name**
88-
- Name of the indicator—this is what will be displayed in your list of indicators.
89-
- Optional; automatically populated by the **incident name.**
90+
- Name of the indicator. This name is what appears in your list of indicators.
91+
- Optional. Automatically populated by the *incident name*.
9092

9193
- **Created by**
9294
- Creator of the indicator.
93-
- Optional; automatically populated by the user logged into Microsoft Sentinel.
95+
- Optional. Automatically populated by the user signed in to Microsoft Sentinel.
9496

9597
Fill in the remaining fields accordingly.
9698

97-
- **Threat type**
99+
- **Threat types**
98100
- The threat type represented by the indicator.
99-
- Optional; free text.
101+
- Optional. Free text.
100102

101103
- **Description**
102104
- Description of the indicator.
103-
- Optional; free text.
105+
- Optional. Free text.
104106

105107
- **Revoked**
106-
- Revoked status of the indicator. Mark checkbox to revoke the indicator, clear checkbox to make it active.
107-
- Optional; boolean.
108+
- Revoked status of the indicator. Select the checkbox to revoke the indicator. Clear the checkbox to make it active.
109+
- Optional. Boolean.
108110

109111
- **Confidence**
110-
- Score reflecting confidence in the correctness of the data, by percent.
111-
- Optional; integer, 1-100
112+
- Score that reflects confidence in the correctness of the data, by percent.
113+
- Optional. Integer, 1-100.
112114

113-
- **Kill chain**
114-
- Phases in the [*Lockheed Martin Cyber Kill Chain*](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
115-
- Optional; free text
115+
- **Kill chains**
116+
- Phases in the [Lockheed Martin Cyber Kill Chain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
117+
- Optional. Free text.
116118

117119
- **Valid from**
118120
- The time from which this indicator is considered valid.
119-
- Required; date/time
121+
- Required. Date/time.
120122

121123
- **Valid until**
122124
- The time at which this indicator should no longer be considered valid.
123-
- Optional; date/time
125+
- Optional. Date/time.
124126

125-
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot of entering information in new threat indicator panel.":::
127+
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot that shows entering information in the new threat indicator pane.":::
126128

127-
1. When all the fields are filled in to your satisfaction, select **Apply**. You'll see a confirmation message in the upper-right-hand corner that your indicator was created.
129+
1. When all the fields are filled in to your satisfaction, select **Apply**. A message appears in the upper-right corner to confirm that your indicator was created.
128130

129-
1. The entity will be added as a threat indicator in your workspace. You can find it [in the list of indicators in the **Threat intelligence** page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page), and also [in the *ThreatIntelligenceIndicators* table in **Logs**](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
131+
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
130132

131133
## Related content
132134

133-
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
135+
In this article, you learned how to add entities to your threat indicator lists. For more information, see the following articles:
134136

135137
- [Investigate incidents with Microsoft Sentinel](investigate-incidents.md)
136138
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md)

0 commit comments

Comments
 (0)