Skip to content

Commit 724d5a1

Browse files
remove image and minor wording changes
1 parent 2dca08b commit 724d5a1

File tree

2 files changed

+16
-19
lines changed

2 files changed

+16
-19
lines changed

articles/sentinel/understand-threat-intelligence.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -203,25 +203,23 @@ For more information, see [Work with threat intelligence in Microsoft Sentinel](
203203

204204
## View your threat intelligence
205205

206-
View your threat intelligence from the management interface. Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
206+
View your threat intelligence from the management interface or using queries. From the management interface, use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
207207

208208
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
209209

210-
View your indicators from **Logs** for Microsoft Sentinel in the Azure portal or using **Advanced hunting** in the Defender portal. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored either way. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
210+
Use queries to view threat intelligence from **Logs** or **Advanced hunting**. Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211211

212212
>[!IMPORTANT]
213213
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
214214
>
215215
216-
Here's an example view of a basic query for just threat indicators using the `ThreatIntelligenceIndicator` table in the Azure portal.
216+
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
217217

218-
:::image type="content" source="media/understand-threat-intelligence/logs-page-ti-table.png" alt-text="Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table." lightbox="media/understand-threat-intelligence/logs-page-ti-table.png":::
218+
### Threat intelligence life cycle
219219

220220
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
221221

222-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated from the source and pattern of the indicator.
223-
224-
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
222+
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated using both the source and pattern of the indicator.
225223

226224
### View your GeoLocation and WhoIs data enrichments (public preview)
227225

articles/sentinel/work-with-threat-indicators.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -133,8 +133,7 @@ In the following image, multiple sources were used to search by placing them in
133133

134134
:::image type="content" source="media/work-with-threat-indicators/advanced-search.png" alt-text="Screenshot shows an OR operator combined with multiple AND conditions to search threat intelligence." lightbox="media/work-with-threat-indicators/advanced-search.png":::
135135

136-
137-
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
136+
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Understand threat intelligence](understand-threat-intelligence.md#threat-intelligence-life-cycle).
138137

139138
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data so you can provide more context for any investigations where indicator is found.
140139

@@ -158,16 +157,24 @@ Edit threat intelligence one object at a time, whether created directly in Micro
158157

159158
For more information on how threat intel is updated, see [View your threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
160159

161-
### Find and view your indicators with queries
160+
### Find and view threat intelligence with queries
162161

163-
This procedure describes how to view your threat indicators with queries, regardless of the source feed or method you used to ingest them.
162+
This procedure describes how to view your threat intelligence with queries, regardless of the source feed or method you used to ingest them.
164163

165164
Threat indicators are stored in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
166165

167166
>[!IMPORTANT]
168167
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
169168
>
170169
170+
#### [Defender portal](#tab/defender-portal)
171+
172+
1. For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Investigation & response** > **Hunting** > **Advanced hunting**.
173+
174+
1. The `ThreatIntelligenceIndicator` table is located under the **Microsoft Sentinel** group.
175+
176+
:::image type="content" source="./media/work-with-threat-indicators/ti-table-results-advanced-hunting.png" alt-text="Screenshot of add watchlist option on watchlist page." lightbox="./media/work-with-threat-indicators/ti-table-results-advanced-hunting.png":::
177+
171178
#### [Azure portal](#tab/azure-portal)
172179

173180
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **General**, select **Logs**.
@@ -178,14 +185,6 @@ Your results should look similar to the sample threat indicator shown here.
178185

179186
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
180187

181-
#### [Defender portal](#tab/defender-portal)
182-
183-
1. For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Investigation & response** > **Hunting** > **Advanced hunting**.
184-
185-
1. The `ThreatIntelligenceIndicator` table is located under the **Microsoft Sentinel** group.
186-
187-
:::image type="content" source="./media/work-with-threat-indicators/ti-table-results-advanced-hunting.png" alt-text="Screenshot of add watchlist option on watchlist page." lightbox="./media/work-with-threat-indicators/ti-table-results-advanced-hunting.png":::
188-
189188
---
190189

191190
For more information, see [View your threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).

0 commit comments

Comments
 (0)