You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+27-26Lines changed: 27 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,14 +11,12 @@ appliesto:
11
11
- Microsoft Sentinel in the Microsoft Defender portal
12
12
ms.collection: usx-security
13
13
14
-
15
14
#Customer intent: As a security analyst, I want to integrate threat intelligence into Microsoft Sentinel so that I can detect, investigate, and respond to potential security threats effectively.
16
-
17
15
---
18
16
19
17
# Understand threat intelligence in Microsoft Sentinel
20
18
21
-
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution with the ability to manage threat intelligence from numerous sources.
19
+
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution with the ability to ingest, curate, and manage threat intelligence from numerous sources.
@@ -35,27 +33,19 @@ Organizations use CTI to provide essential context to unusual activity so that s
35
33
36
34
For SIEM solutions like Microsoft Sentinel, the most common forms of CTI are threat indicators, which are also known as indicators of compromise (IOCs) or indicators of attack. Threat indicators are data that associate observed artifacts such as URLs, file hashes, or IP addresses with known threat activity such as phishing, botnets, or malware. This form of threat intelligence is often called *tactical threat intelligence*. It's applied to security products and automation in large scale to detect potential threats to an organization and protect against them.
37
35
38
-
Another facet of threat intelligence represents threat actors, their TTPs (techniques, tactics and procedures), their infrastructure, and their victims. Microsoft Sentinel supports managing these facets along with IOCs, expressed using the open source standard for exchanging CTI known as the STIX (structured threat information expression) language format. The STIX objects usable in Microsoft Sentinel are:
39
-
- Indicator
40
-
- Attack pattern
41
-
- Identity
42
-
- Threat actor
43
-
- Relationship
44
-
45
-
Use threat intelligence in Microsoft Sentinel to detect malicious activity observed in your environment and provide context to security investigators to inform response decisions.
36
+
Another facet of threat intelligence represents threat actors, their techniques, tactics and procedures (TTPs), their infrastructure, and the identities of their victims. Microsoft Sentinel supports managing these facets along with IOCs, expressed using the open source standard for exchanging CTI known as structured threat information expression (STIX). Threat intelligence expressed as STIX objects improves interoperability and empowers organizations to hunt more efficiently. Use threat intelligence STIX objects in Microsoft Sentinel to detect malicious activity observed in your environment and provide the full context of an attack to inform response decisions.
46
37
47
-
You can integrate threat intelligence into Microsoft Sentinel through the following activities:
38
+
The following outline describes the activities required to make the most of threat intelligence integration in Microsoft Sentinel:
48
39
49
-
-**Import threat intelligence** into Microsoft Sentinel by enabling *data connectors* to various threat intelligence [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
50
-
-**Connect threat intelligence** to Microsoft Sentinel by using the upload API to connect various TI [platforms](connect-threat-intelligence-tip.md) or custom applications.
51
-
-**Create threat intelligence** individually or import using a file from the management interface.
52
-
-**View and manage** the imported threat intelligence in **Logs** or with advanced search in the user interface.
53
-
-**Detect threats** and generate security alerts and incidents by using the built-in **Analytics** rule templates based on your imported threat intelligence.
54
-
-**Visualize key information** about your imported threat intelligence in Microsoft Sentinel with the **Threat Intelligence** workbook.
40
+
| Action | Description|
41
+
|---|---|
42
+
|**Store threat intelligence in Microsoft Sentinel's workspace**| - Import threat intelligence into Microsoft Sentinel by enabling *data connectors* to various threat intelligence [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).</br>- Connect threat intelligence to Microsoft Sentinel by using the upload API to connect various TI [platforms](connect-threat-intelligence-tip.md) or custom applications.</br>- Create threat intelligence with a streamlined UI individually or importing as a file from the management interface.|
43
+
|**Manage threat intelligence**| - View imported threat intelligence in logs or with advanced search.</br>- Visualize key information about your imported threat intelligence in Microsoft Sentinel with the threat intelligence workbook.|
44
+
|**Use threat intelligence**| - Detect threats and generate security alerts and incidents by using the built-in analytics rule templates based on your threat intelligence.</br>- Hunt for threats using the threat intel you have to ask the right questions about the signals captured for your organization.|
55
45
56
46
Microsoft enriches IPV4 and domain name indicators with [GeoLocation and WhoIs data](#view-your-geolocation-and-whois-data-enrichments-public-preview), which is displayed together with other indicator information.
57
47
58
-
Threat intelligence also provides useful context within other Microsoft Sentinel experiences, such as hunting and notebooks. For more information, see [Jupyter notebooks in Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/using-threat-intelligence-in-your-jupyter-notebooks/ba-p/860239) and [Tutorial: Get started with Jupyter notebooks and MSTICPy in Microsoft Sentinel](notebook-get-started.md).
48
+
Threat intelligence also provides useful context within other Microsoft Sentinel experiences, such as notebooks. For more information, see [Jupyter notebooks in Microsoft Sentinel](https://techcommunity.microsoft.com/t5/azure-sentinel/using-threat-intelligence-in-your-jupyter-notebooks/ba-p/860239) and [Tutorial: Get started with Jupyter notebooks and MSTICPy in Microsoft Sentinel](notebook-get-started.md).
@@ -133,20 +123,31 @@ To import STIX-formatted threat intelligence to Microsoft Sentinel from a TAXII
133
123
134
124
For more information, see [Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds](connect-threat-intelligence-taxii.md).
135
125
136
-
## Create threat intelligence
126
+
## Create and manage threat intelligence
137
127
138
-
Manually create threat intelligence
128
+
Two of the most common threat intelligence tasks are tagging and creating new threat intelligence related to security investigations. The management interface streamlines the manual process of creating individual threat intel with a few key features.
139
129
140
-
## View and manage your threat intelligence
130
+
- Define relationships as you create new STIX objects.
131
+
- Curate existing TI with the relationship builder.
132
+
- Add a new TI object and duplicate its metadata to create multiple objects more quickly.
141
133
142
-
View and manage threat intelligence from the management interface. Sort, filter, and search your imported threat intelligence without even writing a Log Analytics query.
143
-
144
-
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
134
+
The following STIX objects are usable in Microsoft Sentinel:
145
135
146
-
Two of the most common threat intelligence tasks are tagging and creating new threat intelligence related to security investigations. Create or edit the threat indicators directly in the management interface.
136
+
- Indicator
137
+
- Attack pattern
138
+
- Identity
139
+
- Threat actor
140
+
- Relationship
147
141
148
142
Tagging threat intelligence is an easy way to group them together to make them easier to find. Typically, you might apply tags related to a particular incident, or if an indicator represents threats from a particular known actor or well-known attack campaign you might create a relationship. After you search for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
149
143
144
+
145
+
## View your threat intelligence
146
+
147
+
View your threat intelligence from the management interface. Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
148
+
149
+
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
150
+
150
151
Validate your indicators and view your successfully imported threat indicators from the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics and workbooks.
151
152
152
153
New tables are used to support the new STIX object schema, but aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt-in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Either ingest your threat intelligence into only the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, or alongside the current table, `ThreatIntelligenceIndicator` with this optional request.
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,15 +74,15 @@ To view your threat intelligence indicators in **Logs**:
74
74
75
75
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
76
76
77
-
## Create and tag indicators
77
+
## Create and manage objects
78
78
79
-
Use the **Threat Intelligence** page to create threat indicators directly within the Microsoft Sentinel interface and perform two common threat intelligence administrative tasks: indicator tagging and creating new indicators related to security investigations.
79
+
Use the management interface to create threat intelligence objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects security investigations.
80
80
81
81
### Create a new indicator
82
82
83
-
1.For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under**Threat management**, select**Threat intelligence**.
84
-
85
-
For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select**Microsoft Sentinel** > **Threat management** >**Threat intelligence**.
83
+
1.In the [Defender portal](https://security.microsoft.com/), select**** >**Threat intelligence** > **Intel management**.
84
+
85
+
For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under**Threat management**, select**Threat intelligence**.
86
86
87
87
1. On the menu bar at the top of the page, select **Add new**.
0 commit comments