You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/add-entity-to-threat-intelligence.md
+47-45Lines changed: 47 additions & 45 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,128 +9,130 @@ ms.date: 3/14/2024
9
9
appliesto:
10
10
- Microsoft Sentinel in the Azure portal
11
11
ms.collection: usx-security
12
-
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
12
+
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so that I don't lose important information.
13
13
---
14
14
15
15
# Add entities to threat intelligence in Microsoft Sentinel
16
16
17
17
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise (IOC) in your threat intelligence.
18
18
19
-
For example, you discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
19
+
For example, you might discover an IP address that performs port scans across your network or functions as a command and control node by sending and/or receiving transmissions from large numbers of nodes in your network.
20
20
21
-
Microsoft Sentinel allows you to flag these types of entities right from within your incident investigation, and add it to your threat intelligence. You are able to view the added indicators both in **Logs** and **Threat Intelligence**, and use them across your Microsoft Sentinel workspace.
21
+
With Microsoft Sentinel, you can flag these types of entities from within your incident investigation and add them to your threat intelligence. You can view the added indicators in **Logs** and **Threat Intelligence** and use them across your Microsoft Sentinel workspace.
22
22
23
23
## Add an entity to your threat intelligence
24
24
25
-
The new [incident details page](investigate-incidents.md)gives you another way to add entities to threat intelligence, in addition to the investigation graph. Both ways are shown below.
25
+
The [Incident details page](investigate-incidents.md)and the investigation graph give you two ways to add entities to threat intelligence.
26
26
27
27
# [Incident details page](#tab/incidents)
28
28
29
-
1.From the Microsoft Sentinel navigation menu, select **Incidents**.
29
+
1.On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
30
30
31
-
1. Select an incident to investigate. In the incident details panel, select **View full details** to open the incident details page.
31
+
1. Select an incident to investigate. On the **Incident details** pane, select **View full details** to open the **Incident details** page.
32
32
33
-
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot of incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
33
+
1. On the **Entities** pane, find the entity that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
34
34
35
-
1. Find the entity from the **Entities** widget that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
35
+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the Incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
36
36
37
37
1. Select the three dots to the right of the entity, and select **Add to TI** from the pop-up menu.
38
38
39
-
Only the following types of entities can be added as threat indicators:
39
+
Add only the following types of entities as threat indicators:
40
+
40
41
- Domain name
41
42
- IP address (IPv4 and IPv6)
42
43
- URL
43
44
- File (hash)
44
45
45
-
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot of adding an entity to threat intelligence.":::
46
+
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot that shows adding an entity to threat intelligence.":::
46
47
47
48
# [Investigation graph](#tab/cases)
48
49
49
-
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. You can use it to add entities to your threat intelligence indicator lists, making them available across your workspace.
50
+
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. Use it to add entities to your threat intelligence indicator lists by making them available across your workspace.
51
+
52
+
1. On the Microsoft Sentinel menu, select **Incidents** from the **Threat management** section.
50
53
51
-
1.From the Microsoft Sentinel navigation menu, select **Incidents**.
54
+
1.Select an incident to investigate. On the **Incident details** pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
52
55
53
-
1. Select an incident to investigate. In the incident details panel, select the **Actions** button and choose **Investigate**from the pop-up menu. This will open the investigation graph.
56
+
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot that shows selecting an incident from the list to investigate.":::
54
57
55
-
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot of selecting incident from queue to investigate.":::
58
+
1. Select the entity from the graph that you want to add as a threat indicator. On the side pane that opens, select **Add to TI**.
56
59
57
-
1. Select the entity from the graph that you want to add as a threat indicator. A side panel will open on the right. Select **Add to TI**.
60
+
Only add the following types of entities as threat indicators:
58
61
59
-
Only the following types of entities can be added as threat indicators:
60
62
- Domain name
61
63
- IP address (IPv4 and IPv6)
62
64
- URL
63
65
- File (hash)
64
66
65
-
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot of adding entity to threat intelligence.":::
67
+
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot that shows adding an entity to threat intelligence.":::
66
68
67
69
---
68
70
69
-
Whichever of the two interfaces you choose, you will end up here:
71
+
Whichever of the two interfaces you choose, you end up here.
70
72
71
-
1. The **New indicator** side panel will open. The following fields will be populated automatically:
73
+
1. The **New indicator** side pane opens. The following fields are populated automatically:
72
74
73
-
-**Type**
74
-
- The type of indicator represented by the entity you're adding.
75
-
Drop-down with possible values: *ipv4-addr*, *ipv6-addr*, *URL*, *file*, *domain-name*
76
-
- Required; automatically populated based on the **entity type**.
75
+
-**Types**
76
+
- The type of indicator represented by the entity you're adding.
77
+
- Dropdown list with possible values: `ipv4-addr`, `ipv6-addr`, `URL`, `file`, and `domain-name`.
78
+
- Required. Automatically populated based on the *entity type*.
77
79
78
80
-**Value**
79
81
- The name of this field changes dynamically to the selected indicator type.
80
82
- The value of the indicator itself.
81
-
- Required; automatically populated by the **entity value**.
83
+
- Required. Automatically populated by the *entity value*.
82
84
83
-
-**Tags**
85
+
-**Tags**
84
86
- Free-text tags you can add to the indicator.
85
-
- Optional; automatically populated by the **incident ID**. You can add others.
87
+
- Optional. Automatically populated by the *incident ID*. You can add others.
86
88
87
89
-**Name**
88
-
- Name of the indicator—this is what will be displayed in your list of indicators.
89
-
- Optional; automatically populated by the **incident name.**
90
+
- Name of the indicator. This name is what appears in your list of indicators.
91
+
- Optional. Automatically populated by the *incident name*.
90
92
91
93
-**Created by**
92
94
- Creator of the indicator.
93
-
- Optional; automatically populated by the user logged into Microsoft Sentinel.
95
+
- Optional. Automatically populated by the user signed in to Microsoft Sentinel.
94
96
95
97
Fill in the remaining fields accordingly.
96
98
97
-
-**Threat type**
99
+
-**Threat types**
98
100
- The threat type represented by the indicator.
99
-
- Optional; free text.
101
+
- Optional. Free text.
100
102
101
103
-**Description**
102
104
- Description of the indicator.
103
-
- Optional; free text.
105
+
- Optional. Free text.
104
106
105
107
-**Revoked**
106
-
- Revoked status of the indicator. Mark checkbox to revoke the indicator, clear checkbox to make it active.
107
-
- Optional; boolean.
108
+
- Revoked status of the indicator. Select the checkbox to revoke the indicator. Clear the checkbox to make it active.
109
+
- Optional. Boolean.
108
110
109
111
-**Confidence**
110
-
- Score reflecting confidence in the correctness of the data, by percent.
111
-
- Optional; integer, 1-100
112
+
- Score that reflects confidence in the correctness of the data, by percent.
113
+
- Optional. Integer, 1-100.
112
114
113
-
-**Kill chain**
114
-
- Phases in the [*Lockheed Martin Cyber Kill Chain*](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
115
-
- Optional; free text
115
+
-**Kill chains**
116
+
- Phases in the [Lockheed Martin Cyber Kill Chain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
117
+
- Optional. Free text.
116
118
117
119
-**Valid from**
118
120
- The time from which this indicator is considered valid.
119
-
- Required; date/time
121
+
- Required. Date/time.
120
122
121
123
-**Valid until**
122
124
- The time at which this indicator should no longer be considered valid.
123
-
- Optional; date/time
125
+
- Optional. Date/time.
124
126
125
-
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot of entering information in new threat indicator panel.":::
127
+
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot that shows entering information in the new threat indicator pane.":::
126
128
127
-
1. When all the fields are filled in to your satisfaction, select **Apply**. You'll see a confirmation message in the upper-right-hand corner that your indicator was created.
129
+
1. When all the fields are filled in to your satisfaction, select **Apply**. A message appears in the upper-right corner to confirm that your indicator was created.
128
130
129
-
1. The entity will be added as a threat indicator in your workspace. You can find it [in the list of indicators in the **Threat intelligence** page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page), and also [in the *ThreatIntelligenceIndicators* table in **Logs**](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
131
+
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
130
132
131
133
## Related content
132
134
133
-
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
135
+
In this article, you learned how to add entities to your threat indicator lists. For more information, see the following articles:
134
136
135
137
-[Investigate incidents with Microsoft Sentinel](investigate-incidents.md)
136
138
-[Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md)
0 commit comments