Skip to content

Commit 66bebba

Browse files
update images
1 parent 3b488fc commit 66bebba

File tree

3 files changed

+9
-4
lines changed

3 files changed

+9
-4
lines changed
31.6 KB
Loading

articles/sentinel/understand-threat-intelligence.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -125,15 +125,15 @@ For more information, see [Connect Microsoft Sentinel to STIX/TAXII threat intel
125125

126126
Threat intelligence powered by Microsoft Sentinel is managed next to Microsoft Defender Threat Intelligence (MDTI) and Threat Analytics in Microsoft's unified SecOps platform.
127127

128-
:::image type="content" source="media/understand-threat-intelligence/intel-management-defender-portal.png" alt-text="Screenshot showing intel management page in the Defender portal.":::
128+
:::image type="content" source="media/understand-threat-intelligence/intel-management-defender-portal.png" alt-text="Screenshot showing intel management page in the Defender portal." lightbox="media/understand-threat-intelligence/intel-management-defender-portal.png":::
129129

130130
>[!NOTE]
131-
> Threat intelligence in the Azure portal remains in Microsoft Sentinel > **Threat management** > **Threat intelligence**.
131+
> Threat intelligence in the Azure portal is still accessed from **Microsoft Sentinel** > **Threat management** > **Threat intelligence**.
132132
133133
Two of the most common threat intelligence tasks are creating new threat intelligence related to security investigations and tagging intel objects. The management interface streamlines the manual process of creating individual threat intel with a few key features.
134134
- Define relationships as you create new STIX objects.
135135
- Curate existing TI with the relationship builder.
136-
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing TI object.
136+
- Copy common metadata from a new or existing TI object with the duplicate feature.
137137
- Add free-form tags to objects with multi-select.
138138

139139
The following STIX objects are available in Microsoft Sentinel:

articles/sentinel/work-with-threat-indicators.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,15 @@ For more information on supported STIX objects, see [Understand threat intellige
5858

5959
1. Choose the **Object type**, then fill in the form on the **New TI object** page. Required fields are marked with a red asterisk (*).
6060

61-
1. Select **Add and duplicate** if you want to create more items with the same metadata. The following image shows the section of each STIX object's metadata that is duplicated.
61+
1. Select **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
62+
63+
:::image type="content" source="media/work-with-threat-indicators/" alt-text="{alt-text}":::
64+
6265
1. Otherwise, select **Add** to create the single item.
6366

67+
Relationship
6468

69+
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::
6570

6671
## Manage threat intelligence
6772

0 commit comments

Comments
 (0)