Skip to content

Commit 644d3cf

Browse files
polish final run through before wider review
1 parent 9244691 commit 644d3cf

File tree

4 files changed

+24
-19
lines changed

4 files changed

+24
-19
lines changed
7.33 KB
Loading

articles/sentinel/understand-threat-intelligence.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,8 @@ The following table outlines the activities required to make the most of threat
4040
| Action | Description|
4141
|---|---|
4242
| **Store threat intelligence in Microsoft Sentinel's workspace** | <ul><li>Import threat intelligence into Microsoft Sentinel by enabling data connectors to various threat intelligence platforms and feeds.</li><li>Connect threat intelligence to Microsoft Sentinel by using the upload API to connect various TI platforms or custom applications.</li><li>Create threat intelligence with a streamlined management interface.</li>|
43-
| **Manage threat intelligence** | <ul><li>View imported threat intelligence in logs or with advanced search.</li><li>Curate threat intelligence by establishing relationships between objects or adding tags</li><li>Visualize key information about your TI with the threat intelligence workbook.</li>|
44-
| **Use threat intelligence** | <ul><li>Detect threats and generate security alerts and incidents by using the built-in analytics rule templates based on your threat intelligence.</li><li>Hunt for threats using your threat intel to ask the right questions about the signals captured for your organization.</li>|
43+
| **Manage threat intelligence** | <ul><li>View imported threat intelligence using queries or advanced search.</li><li>Curate threat intelligence with relationships or tags</li><li>Visualize key information about your TI with workbooks.</li>|
44+
| **Use threat intelligence** | <ul><li>Detect threats and generate security alerts and incidents with built-in analytics rule templates based on your threat intelligence.</li><li>Hunt for threats using your threat intel to ask the right questions about the signals captured for your organization.</li>|
4545

4646
Threat intelligence also provides useful context within other Microsoft Sentinel experiences, such as notebooks. For more information, see [Get started with notebooks and MSTICPy](/azure/sentinel/notebook-get-started).
4747

@@ -54,7 +54,7 @@ Most threat intelligence is imported using data connectors or an API. Here are t
5454
- **Microsoft Defender Threat Intelligence** data connector to ingest Microsoft's threat intelligence
5555
- **Threat Intelligence - TAXII** data connector for industry-standard STIX/TAXII feeds
5656
- **Threat Intelligence upload API** for integrated and curated TI feeds using a REST API to connect (doesn't require a data connector)
57-
- **Threat Intelligence Platform data connector** also connects TI feeds using a legacy REST API, but is on the path for deprecation
57+
- **Threat Intelligence Platform** data connector also connects TI feeds using a legacy REST API, but is on the path for deprecation
5858

5959
Use these solutions in any combination, depending on where your organization sources threat intelligence. All of these data connectors are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
6060

@@ -66,7 +66,7 @@ Bring public, open-source, and high-fidelity IOCs generated by Defender Threat I
6666

6767
There are two versions of the data connector, standard and premium. There's also a freely available Defender Threat Intelligence threat analytics rule which gives you a sample of what the premium Defender Threat Intelligence data connector provides. However, with matching analytics, only indicators that match the rule are ingested into your environment.
6868

69-
The premium Defender Threat Intelligence data connector ingests Microsoft-enriched open source intelligence and Microsoft's curated IOCs. These premium features allow analytics on more data sources with greater flexibility and understanding of that threat intelligence. Here's a table that shows what to expect when you license and enable the Defender Threat Intelligence data connector premium version.
69+
The premium Defender Threat Intelligence data connector ingests Microsoft-enriched open source intelligence and Microsoft's curated IOCs. These premium features allow analytics on more data sources with greater flexibility and understanding of that threat intelligence. Here's a table that shows what to expect when you license and enable the premium version.
7070

7171
| Free | Premium |
7272
|---|---|
@@ -132,7 +132,7 @@ Threat intelligence powered by Microsoft Sentinel is managed next to Microsoft D
132132
>[!NOTE]
133133
> Threat intelligence in the Azure portal is still accessed from **Microsoft Sentinel** > **Threat management** > **Threat intelligence**.
134134
135-
Two of the most common threat intelligence tasks are creating new threat intelligence related to security investigations and tagging intel objects. The management interface streamlines the manual process of creating individual threat intel with a few key features.
135+
Two of the most common threat intelligence tasks are creating new threat intelligence related to security investigations and adding tags. The management interface streamlines the manual process of creating individual threat intel with a few key features.
136136
- Define relationships as you create new STIX objects.
137137
- Curate existing TI with the relationship builder.
138138
- Copy common metadata from a new or existing TI object with the duplicate feature.
@@ -146,16 +146,16 @@ The following STIX objects are available in Microsoft Sentinel:
146146
| **Threat actor** | From script kiddies to nation states, threat actor objects describe motivations, sophistication, and resourcing levels. |
147147
| **Attack pattern** | Also known as techniques, tactics and procedures, attack patterns describe a specific component of an attack and the MITRE ATT&CK stage it's used on. |
148148
| **Indicator** | `Domain name`, `URL`, `IPv4 address`, `IPv6 address`, and `File hashes`</br></br>`X509 certificates` are used to authenticate the identity of devices and servers for secure communication over the internet.</br></br>`JA3` fingerprints are unique identifiers generated from the TLS/SSL handshake process. They help in identifying specific applications and tools used in network traffic, making it easier to detect malicious activities</br></br>`JA3S` fingerprints extend the capabilities of JA3 by also including server-specific characteristics in the fingerprinting process. This extension provides a more comprehensive view of the network traffic and helps in identifying both client and server-side threats.</br></br>`User agents` provide information about the client software making requests to a server, such as the browser or operating system. They're useful in identifying and profiling devices and applications accessing a network. |
149-
| Identity | Describe victims, organizations, and other groups or individuals along with the business sectors most closely associated with them. |
150-
| Relationship | The threads that connect threat intelligence, helping to make connections across disparate signals and data points are described with relationships. |
149+
| **Identity** | Describe victims, organizations, and other groups or individuals along with the business sectors most closely associated with them. |
150+
| **Relationship** | The threads that connect threat intelligence, helping to make connections across disparate signals and data points are described with relationships. |
151151

152152
### Create relationships
153153

154-
Enhance threat detection and response by establishing connections between objects with the relationship builder. The following table lists some use cases of establishing connections.
154+
Enhance threat detection and response by establishing connections between objects with the relationship builder. The following table lists some of its use cases.
155155

156156
| Use case | Description |
157157
|---|---|
158-
| Connect threat actor to an attack pattern | The threat actor `APT29` *Uses* the attack pattern `Phishing via Email` to gain initial access.|
158+
| Connect a threat actor to an attack pattern | The threat actor `APT29` *Uses* the attack pattern `Phishing via Email` to gain initial access.|
159159
| Link an indicator to a threat actor| A domain indicator `allyourbase.contoso.com` is *Attributed to* the threat actor `APT29`. |
160160
| Associate an identity (victim) with an attack pattern| The attack pattern `Phishing via Email` *Targets* the `FourthCoffee` organization.|
161161

@@ -165,7 +165,7 @@ The following image shows how the relationship builder connects all of these use
165165

166166
### Curate threat intelligence
167167

168-
Designate which TI objects can be shared with appropriate audiences by designating a sensitivity level called Traffic Light Protocol (TLP).
168+
Configure which TI objects can be shared with appropriate audiences by designating a sensitivity level called Traffic Light Protocol (TLP).
169169

170170
| TLP color | Sensitivity |
171171
|---|---|
@@ -186,7 +186,9 @@ View your threat intelligence from the management interface. Use advanced search
186186

187187
View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
188188

189-
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
189+
>[!IMPORTANT]
190+
>Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
191+
>
190192
191193
Here's an example view of a basic query for just threat indicators using the current table.
192194

@@ -208,7 +210,7 @@ For example, use `GeoLocation` data to find information like the organization or
208210

209211
## Detect threats with threat indicator analytics
210212

211-
The most important use case for threat indicators in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules powered by queries that run on a schedule and generate security alerts. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
213+
The most important use case for threat intelligence in SIEM solutions like Microsoft Sentinel is to power analytics rules for threat detection. These indicator-based rules compare raw events from your data sources against your threat indicators to detect security threats in your organization. In Microsoft Sentinel Analytics, you create analytics rules powered by queries that run on a schedule and generate security alerts. Along with configurations, they determine how often the rule should run, what kind of query results should generate security alerts and incidents, and, optionally, when to trigger an automated response.
212214

213215
Although you can always create new analytics rules from scratch, Microsoft Sentinel provides a set of built-in rule templates, created by Microsoft security engineers, to take advantage of your threat indicators. These templates are based on the type of threat indicators (domain, email, file hash, IP address, or URL) and data source events that you want to match. Each template lists the required sources that are needed for the rule to function. This information makes it easy to determine if the necessary events are already imported in Microsoft Sentinel.
214216

articles/sentinel/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Enhanced threat intelligence capabilities are available in both Microsoft's unif
4040

4141
- Define relationships as you create new STIX objects.
4242
- Curate existing threat intelligence with the new relationship builder.
43-
- Create multiple objects quickly by copying common metadata from a new or existing TI object with the duplicate feature.
43+
- Create multiple objects quickly by copying common metadata from a new or existing TI object using a duplication feature.
4444
- Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
4545

4646
For more information, see the following articles:
@@ -50,7 +50,7 @@ For more information, see the following articles:
5050

5151
### Unlock advanced hunting with new STIX objects by opting in to new threat intelligence tables
5252

53-
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects` alongside with or instead of the current table, `ThreatIntelligenceIndicator` with this opt-in process.
53+
Tables supporting the new STIX object schema aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects` alongside with or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
5454

5555
For more information, see the blog announcement [New STIX objects in Microsoft Sentinel](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-public-preview-new-stix-objects-in-microsoft-sentinel/4369164).
5656

articles/sentinel/work-with-threat-indicators.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -90,11 +90,14 @@ The following image demonstrates connections made between a threat actor and an
9090
Use the management interface to sort, filter, and search your threat intelligence from whatever source they were ingested from without writing a Log Analytics query.
9191

9292
1. From the management interface, expand the **What would you like to search?** menu.
93-
1. Select the STIX object type or leave the default **All object types**.
93+
94+
1. Select a STIX object type or leave the default **All object types**.
95+
9496
1. Select conditions using logical operators.
97+
9598
1. Select the object you want to see more information about.
9699

97-
In the following image, multiple sources were used to search by placing them in an `OR` group, while multiple conditions were group with the `AND` operator.
100+
In the following image, multiple sources were used to search by placing them in an `OR` group, while multiple conditions were grouped with the `AND` operator.
98101

99102
:::image type="content" source="media/work-with-threat-indicators/advanced-search.png" alt-text="Screenshot shows an OR operator combined with multiple AND conditions to search threat intelligence.":::
100103

@@ -124,9 +127,9 @@ For more information on how threat intel is updated, see [View your threat intel
124127

125128
### Find and view your indicators with queries
126129

127-
This procedure describes how to view your imported threat indicators in Log Analytics, together with other Microsoft Sentinel event data, regardless of the source feed or method you used to ingest them.
130+
This procedure describes how to view your threat indicators in Log Analytics, together with other Microsoft Sentinel event data, regardless of the source feed or method you used to ingest them.
128131

129-
Imported threat indicators are listed in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
132+
Threat indicators are listed in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
130133

131134
To view your threat intelligence indicators:
132135

@@ -141,7 +144,7 @@ To view your threat intelligence indicators:
141144

142145
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
143146

144-
## Visualize your threat intelligence with workbooks
147+
### Visualize your threat intelligence with workbooks
145148

146149
Use a purpose-built Microsoft Sentinel workbook to visualize key information about your threat intelligence in Microsoft Sentinel, and customize the workbook according to your business needs.
147150

0 commit comments

Comments
 (0)