Skip to content

Commit 7f5b36c

Browse files
clean up overview deemphasize indicators for objects
1 parent 7f22e02 commit 7f5b36c

File tree

2 files changed

+13
-9
lines changed

2 files changed

+13
-9
lines changed

articles/sentinel/stix-objects-api.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,13 @@ author: austinmccollum
66
ms.topic: reference
77
ms.date: 05/30/2024
88
ms.author: austinmc
9+
appliesto:
10+
- Microsoft Sentinel in the Azure portal
911
---
1012

1113
# Import threat intelligence to Microsoft Sentinel with the STIX objects API (Preview)
1214

13-
Import indicators of compromise and other STIX domain objects to use in Microsoft Sentinel workspace with the STIX objects API. Whether you're using a threat intelligence platform or a custom application, use this document as a supplemental reference to the instructions in the [Microsoft Sentinel STIX objects API data connector](connect-threat-intelligence-upload-api.md). Installing the data connector isn't required to connect to the API.
15+
Import threat intelligence to use in Microsoft Sentinel with the STIX objects API. Whether you're using a threat intelligence platform or a custom application, use this document as a supplemental reference to the instructions in the [Microsoft Sentinel STIX objects API data connector](connect-threat-intelligence-upload-api.md). Installing the data connector isn't required to connect to the API. The threat intelligence you can import includes indicators of compromise and other STIX domain objects.
1416

1517
> [!IMPORTANT]
1618
> This API is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -94,6 +96,8 @@ Create the array of STIX objects using the STIX format specification. Some of th
9496

9597
#### Common properties
9698

99+
All the objects you import with the STIX objects API share these common properties.
100+
97101
|Property Name |Type | Description |
98102
|----|----|----|
99103
|`id` (required)| string | An ID used to identify the indicator. See section [2.9](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_64yvzeku5a5c) for specifications on how to create an `id`. The format looks something like `indicator--<UUID>`|

articles/sentinel/understand-threat-intelligence.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Understand threat intelligence
33
titleSuffix: Microsoft Sentinel
44
description: Understand how threat intelligence feeds are connected to, managed, and used in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
55
author: austinmccollum
6-
ms.topic: concept
7-
ms.date: 5/30/2024
6+
ms.topic: conceptual
7+
ms.date: 6/10/2024
88
ms.author: austinmc
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
@@ -26,7 +26,7 @@ For SIEM solutions like Microsoft Sentinel, the most common forms of CTI are thr
2626

2727
Integrate threat intelligence (TI) into Microsoft Sentinel through the following activities:
2828

29-
- **Import threat intelligence** into Microsoft Sentinel by enabling **data connectors** to various TI [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
29+
- **Import threat intelligence** into Microsoft Sentinel by enabling **data connectors** or using the STIX objects API to connect various TI [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
3030

3131
- **View and manage** the imported threat intelligence in **Logs** and in the **Threat Intelligence** blade of Microsoft Sentinel.
3232

@@ -42,14 +42,14 @@ Threat Intelligence also provides useful context within other Microsoft Sentinel
4242

4343
## Import threat intelligence with data connectors
4444

45-
Just like all the other event data in Microsoft Sentinel, threat indicators are imported using data connectors. Here are the data connectors in Microsoft Sentinel provided specifically for threat indicators.
45+
Most threat intelligence is imported using data connectors or an API. Here are the solutions available for Microsoft Sentinel.
4646

4747
- **Microsoft Defender Threat Intelligence data connector** to ingest Microsoft's threat indicators
48-
- **Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds and
49-
- **Threat Intelligence upload indicators API** for integrated and curated TI feeds using a REST API to connect
48+
- **Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds
49+
- **Threat Intelligence STIX objects API** for integrated and curated TI feeds using a REST API to connect
5050
- **Threat Intelligence Platform data connector** also connects TI feeds using a REST API, but is on the path for deprecation
5151

52-
Use any of these data connectors in any combination together, depending on where your organization sources threat indicators. All three of these are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
52+
Use any of these solutions in any combination together, depending on where your organization sources threat intelligence. All three of these are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
5353

5454
Also, see this catalog of [threat intelligence integrations](threat-intelligence-integration.md) available with Microsoft Sentinel.
5555

@@ -74,7 +74,7 @@ For more information, see [Connect your threat intelligence platform using STIX
7474

7575
### Add threat indicators to Microsoft Sentinel with the Threat Intelligence Platforms data connector
7676

77-
Much like the existing upload indicators API data connector, the **Threat Intelligence Platform data connector** uses an API allowing your TIP or custom solution to send indicators into Microsoft Sentinel. However, this data connector is now on a path for deprecation. We recommend new solutions to take advantage of the optimizations the upload indicators API has to offer.
77+
this data connector is now on a path for deprecation. Much like the existing STIX objects API, the **Threat Intelligence Platform data connector** uses an API allowing your TIP or custom solution to send indicators into Microsoft Sentinel. So, we recommend new solutions to take advantage of the optimizations the STIX objects API has to offer.
7878

7979
The TIP data connector works with the [Microsoft Graph Security tiIndicators API](/graph/api/resources/tiindicator). It can also be used by any custom threat intelligence platform that communicates with the tiIndicators API to send indicators to Microsoft Sentinel (and to other Microsoft security solutions like Microsoft Defender XDR).
8080

0 commit comments

Comments
 (0)