Skip to content

Commit 6f7c371

Browse files
add TLP step
1 parent d70872c commit 6f7c371

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/sentinel/work-with-threat-indicators.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Sentinel
44
description: This article explains how to view, create, manage, and visualize threat intelligence in Microsoft Sentinel.
55
author: austinmccollum
66
ms.topic: how-to
7-
ms.date: 01/27/2025
7+
ms.date: 02/21/2025
88
ms.author: austinmc
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
@@ -56,6 +56,7 @@ For more information on supported STIX objects, see [Understand threat intellige
5656
:::image type="content" source="media/work-with-threat-indicators/threat-intel-add-new-indicator.png" alt-text="Screenshot that shows adding a new threat indicator." lightbox="media/work-with-threat-indicators/threat-intel-add-new-indicator.png":::
5757

5858
1. Choose the **Object type**, then fill in the form on the **New TI object** page. Required fields are marked with a red asterisk (*).
59+
1. Consider designating a sensitivity value, or **Traffic light protocol** (TLP) rating to the TI object. For more information on what the values represent, see [Curate threat intelligence](understand-threat-intelligence.md#curate-threat-intelligence).
5960
1. If you know how this object relates to another threat intelligence object, indicate that connection with the **Relationship type** and the **Target reference**.
6061
1. Select **Add** for an individual object, or **Add and duplicate** if you want to create more items with the same metadata. The following image shows the common section of each STIX object's metadata that is duplicated.
6162

0 commit comments

Comments
 (0)