Skip to content

Commit 8a2e256

Browse files
authored
Merge pull request #295350 from austinmccollum/austinmc-ti-updates
update relationship builder for clarity
2 parents 1953466 + 8c00c76 commit 8a2e256

7 files changed

+51
-37
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Whichever of the two interfaces you choose, you end up here.
129129

130130
1. When all the fields are filled in to your satisfaction, select **Apply**. A message appears in the upper-right corner to confirm that your indicator was created.
131131

132-
1. The entity is added as threat intelligence in your workspace. You can find it [in threat intelligence management interface](work-with-threat-indicators.md#view-your-threat-intelligence-in-the-management-interface). You can also query it [using the ThreatIntelligenceIndicators table](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
132+
1. The entity is added as threat intelligence in your workspace. You can find it [in threat intelligence management interface](work-with-threat-indicators.md#view-your-threat-intelligence-in-the-management-interface). You can also query it [using the ThreatIntelligenceIndicators table](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
133133

134134
## Related content
135135

articles/sentinel/indicators-bulk-file-import.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ The templates provide all the fields you need to create a single valid indicator
6969

7070
1. Drag your bulk threat intelligence file to the **Upload a file** section, or browse for the file by using the link.
7171

72-
1. Enter a source for the threat intelligence in the **Source** text box. This value is stamped on all the indicators included in that file. View this property as the `SourceSystem` field. The source is also displayed in the **Manage file imports** pane. For more information, see [Work with threat indicators](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
72+
1. Enter a source for the threat intelligence in the **Source** text box. This value is stamped on all the indicators included in that file. View this property as the `SourceSystem` field. The source is also displayed in the **Manage file imports** pane. For more information, see [Work with threat indicators](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
7373

7474
1. Choose how you want Microsoft Sentinel to handle invalid entries by selecting one of the buttons at the bottom of the **Import using a file** pane:
7575

50.8 KB
Loading
196 KB
Loading

articles/sentinel/understand-threat-intelligence.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Understand threat intelligence
2+
title: Threat intelligence
33
titleSuffix: Microsoft Sentinel
44
description: Understand threat intelligence and how it integrates with features in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
55
author: austinmccollum
66
ms.topic: concept-article
7-
ms.date: 01/27/2025
7+
ms.date: 02/27/2025
88
ms.author: austinmc
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
@@ -14,7 +14,7 @@ ms.collection: usx-security
1414
#Customer intent: As a security analyst, I want to integrate threat intelligence into Microsoft Sentinel so that I can detect, investigate, and respond to potential security threats effectively.
1515
---
1616

17-
# Understand threat intelligence in Microsoft Sentinel
17+
# Threat intelligence in Microsoft Sentinel
1818

1919
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution with the ability to ingest, curate, and manage threat intelligence from numerous sources.
2020

@@ -203,25 +203,23 @@ For more information, see [Work with threat intelligence in Microsoft Sentinel](
203203

204204
## View your threat intelligence
205205

206-
View your threat intelligence from the management interface. Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
206+
View your threat intelligence from the management interface or using queries. From the management interface, use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
207207

208208
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
209209

210-
View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
210+
Use queries to view threat intelligence from **Logs** or **Advanced hunting**. Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211211

212212
>[!IMPORTANT]
213-
>Tables supporting the new STIX object schema are in private preview. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
213+
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
214214
>
215215
216-
Here's an example view of a basic query for just threat indicators using the current table.
216+
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
217217

218-
:::image type="content" source="media/understand-threat-intelligence/logs-page-ti-table.png" alt-text="Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table." lightbox="media/understand-threat-intelligence/logs-page-ti-table.png":::
218+
### Threat intelligence life cycle
219219

220220
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
221221

222-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated from the source and pattern of the indicator.
223-
224-
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
222+
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated using both the source and pattern of the indicator.
225223

226224
### View your GeoLocation and WhoIs data enrichments (public preview)
227225

articles/sentinel/work-with-threat-indicators.md

Lines changed: 40 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Use the management interface to create STIX objects and perform other common thr
4747
- Define relationships as you create new STIX objects.
4848
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing TI object.
4949

50-
For more information on supported STIX objects, see [Understand threat intelligence](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
50+
For more information on supported STIX objects, see [Threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
5151

5252
### Create a new STIX object
5353

@@ -90,28 +90,32 @@ Reduce noise from your TI feeds, extend the validity of high value indicators, a
9090

9191
:::image type="content" source="media/work-with-threat-indicators/new-ingestion-rule.png" alt-text="Screenshot showing new ingestion rule creation for extending valid until date.":::
9292

93-
For more information, see [Understand threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules).
93+
For more information, see [Threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules).
9494

9595
### Curate threat intelligence with the relationship builder
9696

9797
Connect threat intelligence objects with the relationship builder. There's a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.
9898

99-
1. Start with an object like a threat actor or attack pattern where the single object connects to one or more objects, like indicators.
99+
1. Select **Add new** > **TI relationship**.
100+
101+
1. Start with an existing TI object like a threat actor or attack pattern where the single object connects to one or more existing objects, like indicators.
100102

101103
1. Add the relationship type according to the best practices outlined in the following table and in the [STIX 2.1 reference relationship summary table](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_6n2czpjuie3v):
102104

103-
| Relationship type | Description |
104-
|---|---|
105-
| **Duplicate of**</br>**Derived from**</br>**Related to** | Common relationships defined for any STIX domain object (SDO)<br>For more information, see [STIX 2.1 reference on common relationships](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_f3dx2rhc3vl)|
106-
| **Targets** | `Attack pattern` or `Threat actor` Targets `Identity` |
107-
| **Uses** | `Threat actor` Uses `Attack pattern` |
108-
| **Attributed to** | `Threat actor` Attributed to `Identity` |
109-
| **Indicates** | `Indicator` Indicates `Attack pattern` or `Threat actor` |
110-
| **Impersonates** | `Threat actor` Impersonates `Identity` |
105+
| Relationship type | Description |
106+
|---|---|
107+
| **Duplicate of**</br>**Derived from**</br>**Related to** | Common relationships defined for any STIX domain object (SDO)<br>For more information, see [STIX 2.1 reference on common relationships](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_f3dx2rhc3vl)|
108+
| **Targets** | `Attack pattern` or `Threat actor` Targets `Identity` |
109+
| **Uses** | `Threat actor` Uses `Attack pattern` |
110+
| **Attributed to** | `Threat actor` Attributed to `Identity` |
111+
| **Indicates** | `Indicator` Indicates `Attack pattern` or `Threat actor` |
112+
| **Impersonates** | `Threat actor` Impersonates `Identity` |
113+
114+
1. Use the following image as an example in how to use the relationship builder. This example demonstrates how to make connections made between a threat actor and an attack pattern, indicator, and identity using the relationship builder in the Defender portal.
111115

112-
The following image demonstrates connections made between a threat actor and an attack pattern, indicator, and identity using the relationship type table.
116+
:::image type="content" source="media/work-with-threat-indicators/relationship-example-defender-portal.png" alt-text="Screenshot showing the relationship builder." lightbox="media/work-with-threat-indicators/relationship-example-defender-portal.png":::
113117

114-
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::
118+
1. Complete the relationship by configuring **Common** properties.
115119

116120
### View your threat intelligence in the management interface
117121

@@ -129,8 +133,7 @@ In the following image, multiple sources were used to search by placing them in
129133

130134
:::image type="content" source="media/work-with-threat-indicators/advanced-search.png" alt-text="Screenshot shows an OR operator combined with multiple AND conditions to search threat intelligence." lightbox="media/work-with-threat-indicators/advanced-search.png":::
131135

132-
133-
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
136+
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Threat intelligence life cycle](understand-threat-intelligence.md#threat-intelligence-life-cycle).
134137

135138
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data so you can provide more context for any investigations where indicator is found.
136139

@@ -154,24 +157,37 @@ Edit threat intelligence one object at a time, whether created directly in Micro
154157

155158
For more information on how threat intel is updated, see [View your threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
156159

157-
### Find and view your indicators with queries
160+
### Find and view threat intelligence with queries
158161

159-
This procedure describes how to view your threat indicators in Log Analytics, together with other Microsoft Sentinel event data, regardless of the source feed or method you used to ingest them.
162+
This procedure describes how to view your threat intelligence with queries, regardless of the source feed or method you used to ingest them.
160163

161-
Threat indicators are listed in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
164+
Threat indicators are stored in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
162165

163-
To view your threat intelligence indicators:
166+
>[!IMPORTANT]
167+
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
168+
>
164169
165-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **General**, select **Logs**.
170+
#### [Defender portal](#tab/defender-portal)
166171

167-
For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Investigation & response** > **Hunting** > **Advanced hunting**.
172+
1. For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Investigation & response** > **Hunting** > **Advanced hunting**.
168173

169174
1. The `ThreatIntelligenceIndicator` table is located under the **Microsoft Sentinel** group.
175+
176+
:::image type="content" source="./media/work-with-threat-indicators/table-results-advanced-hunting.png" alt-text="Screenshot of add watchlist option on watchlist page." lightbox="./media/work-with-threat-indicators/table-results-advanced-hunting.png":::
177+
178+
#### [Azure portal](#tab/azure-portal)
179+
180+
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **General**, select **Logs**.
181+
170182
1. Select the **Preview data** icon (the eye) next to the table name. Select **See in query editor** to run a query that shows records from this table.
171183

172-
Your results should look similar to the sample threat indicator shown here.
184+
Your results should look similar to the sample threat indicator shown here.
185+
186+
:::image type="content" source="media/work-with-threat-indicators/table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/table-results.png":::
187+
188+
---
173189

174-
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
190+
For more information, see [View your threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
175191

176192
### Visualize your threat intelligence with workbooks
177193

@@ -224,7 +240,7 @@ There's also a rich resource for [Azure Monitor workbooks on GitHub](https://git
224240
225241
For more information, see the following articles:
226242
227-
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md).
243+
- [Threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md).
228244
- Connect Microsoft Sentinel to [STIX/TAXII threat intelligence feeds](./connect-threat-intelligence-taxii.md).
229245
- See which [TIPs, TAXII feeds, and enrichments](threat-intelligence-integration.md) can be readily integrated with Microsoft Sentinel.
230246

0 commit comments

Comments
 (0)