You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+21-2Lines changed: 21 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,9 +147,28 @@ The following STIX objects are available in Microsoft Sentinel:
147
147
| Identity | Describe victims, organizations, and other groups or individuals along with the business sectors most closely associated with them. |
148
148
| Relationship | The threads that connect threat intelligence, helping to make connections across disparate signals and data points are described with relationships. |
149
149
150
-
Tagging threat intelligence is a quick way to group objects together to make them easier to find. Typically, you might apply tags related to a particular incident. But, if an indicator represents threats from a particular known actor or well-known attack campaign you might create a relationship instead of a tag. After you search for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
150
+
### Create relationships
151
151
152
-
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#create-and-manage-objects).
152
+
Establish connections between objects to enhance threat detection and response. Here are some examples of the relationship builder:
153
+
154
+
Connecting Threat Actor to Attack Pattern: The threat actor "APT29" uses the attack pattern "Phishing via Email" to gain initial access.
155
+
Linking Indicator to Threat Actor: An indicator (malicious domain) is attributed to the threat actor "APT29".
156
+
Associating Identity (Victim) with Attack Pattern: The organization "Example Corp" is targeted by the attack pattern "Phishing via Email".
157
+
158
+
### Curate threat intelligence
159
+
160
+
Designate which TI objects can be shared with appropriate audiences by designating a sensitivity level called Traffic Light Protocol (TLP).
161
+
162
+
| TLP color | Sensitivity |
163
+
|---|---|
164
+
| White | Information can be shared freely and publicly without any restrictions. |
165
+
| Green | Information can be shared with peers and partner organizations within the community, but not publicly. It is intended for a wider audience within the community. |
166
+
| Amber | Information can be shared with members of the organization, but not publicly. It is intended to be used within the organization to protect sensitive information. |
167
+
| Red | Information is highly sensitive and should not be shared outside of the specific group or meeting where it was originally disclosed. |
168
+
169
+
Tagging threat intelligence is a quick way to group objects together to make them easier to find. Typically, you might apply tags related to a particular incident. But, if an indicator represents threats from a particular known actor or well-known attack campaign, consider creating a relationship instead of a tag. After you search and filter for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
170
+
171
+
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#create-threat-intelligence).
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+14-9Lines changed: 14 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,37 +24,42 @@ Accelerate threat detection and remediation with streamlined creation and manage
24
24
25
25
## Access the management interface
26
26
27
-
Use one of the following tabs, depending on whether you're working in the Azure portal or the Defender portal. Even though the management interface is accessed differently depending which portal you use, the creation and management tasks have the same steps.
27
+
Use one of the following tabs, depending on where you want to work with threat intelligence. Even though the management interface is accessed differently depending which portal you use, the creation and management tasks have the same steps once you get there.
28
28
29
29
### [Defender portal](#tab/defender-portal)
30
30
31
-
For Microsoft Sentinel-powered threat intelligence in the Defender portal, navigate to **Threat intelligence** > **Intel management**.
31
+
In the Defender portal, navigate to **Threat intelligence** > **Intel management**.
32
32
33
33
:::image type="content" source="media/work-with-threat-indicators/intel-management-navigation.png" alt-text="Screenshot showing the intel management menu item in the Defender portal.":::
34
34
35
35
### [Azure portal](#tab/azure-portal)
36
36
37
-
For Microsoft Sentinel in the Azure portal, navigate to **Threat management** > **Threat intelligence**.
37
+
In the Azure portal, navigate to **Threat management** > **Threat intelligence**.
38
38
39
39
:::image type="content" source="media/work-with-threat-indicators/threat-intelligence-sentinel.png" alt-text="Screenshot showing threat intelligence menu for Microsoft Sentinel in the Azure portal.":::
40
40
41
-
## Create threat intelligence in the management interface
41
+
---
42
+
43
+
## Create threat intelligence
42
44
43
-
Use the management interface to create threat intelligence objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects security investigations.
45
+
Use the management interface to create STIX objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects.
44
46
45
47
- Define relationships as you create new STIX objects.
46
48
- Curate existing TI with the relationship builder.
47
49
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing TI object.
48
50
49
-
### Create a new indicator
51
+
For more information on supported STIX objects, see [Understand threat intelligence](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
50
52
51
-
1. On the menu bar at the top of the page, select **Add new**.
53
+
### Create a new STIX object
54
+
55
+
1. Select **Add new** > **TI object**.
52
56
53
57
:::image type="content" source="media/work-with-threat-indicators/threat-intel-add-new-indicator.png" alt-text="Screenshot that shows adding a new threat indicator." lightbox="media/work-with-threat-indicators/threat-intel-add-new-indicator.png":::
54
58
55
-
1. Choose the indicator type, and then fill in the form on the **New indicator** pane. The required fields are marked with an asterisk (*).
59
+
1. Choose the **Object type**, then fill in the form on the **New TI object** page. Required fields are marked with a red asterisk (*).
60
+
61
+
1. Select **Add and duplicate** if you want to create more items with the same metadata. Otherwise, select **Add** to create the single item.
56
62
57
-
1. Select **Apply**. The indicator is added to the indicators list and is also sent to the `ThreatIntelligenceIndicator` table in **Logs**.
0 commit comments