You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/add-entity-to-threat-intelligence.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,7 @@ Whichever of the two interfaces you choose, you end up here.
129
129
130
130
1. When all the fields are filled in to your satisfaction, select **Apply**. A message appears in the upper-right corner to confirm that your indicator was created.
131
131
132
-
1. The entity is added as threat intelligence in your workspace. You can find it [in threat intelligence management interface](work-with-threat-indicators.md#view-your-threat-intelligence-in-the-management-interface). You can also query it [using the ThreatIntelligenceIndicators table](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
132
+
1. The entity is added as threat intelligence in your workspace. You can find it [in threat intelligence management interface](work-with-threat-indicators.md#view-your-threat-intelligence-in-the-management-interface). You can also query it [using the ThreatIntelligenceIndicators table](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
Copy file name to clipboardExpand all lines: articles/sentinel/indicators-bulk-file-import.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ The templates provide all the fields you need to create a single valid indicator
69
69
70
70
1. Drag your bulk threat intelligence file to the **Upload a file** section, or browse for the file by using the link.
71
71
72
-
1. Enter a source for the threat intelligence in the **Source** text box. This value is stamped on all the indicators included in that file. View this property as the `SourceSystem` field. The source is also displayed in the **Manage file imports** pane. For more information, see [Work with threat indicators](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
72
+
1. Enter a source for the threat intelligence in the **Source** text box. This value is stamped on all the indicators included in that file. View this property as the `SourceSystem` field. The source is also displayed in the **Manage file imports** pane. For more information, see [Work with threat indicators](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
73
73
74
74
1. Choose how you want Microsoft Sentinel to handle invalid entries by selecting one of the buttons at the bottom of the **Import using a file** pane:
Copy file name to clipboardExpand all lines: articles/sentinel/understand-threat-intelligence.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Understand threat intelligence
2
+
title: Threat intelligence
3
3
titleSuffix: Microsoft Sentinel
4
4
description: Understand threat intelligence and how it integrates with features in Microsoft Sentinel to analyze data, detect threats, and enrich alerts.
5
5
author: austinmccollum
6
6
ms.topic: concept-article
7
-
ms.date: 01/27/2025
7
+
ms.date: 02/27/2025
8
8
ms.author: austinmc
9
9
appliesto:
10
10
- Microsoft Sentinel in the Azure portal
@@ -14,7 +14,7 @@ ms.collection: usx-security
14
14
#Customer intent: As a security analyst, I want to integrate threat intelligence into Microsoft Sentinel so that I can detect, investigate, and respond to potential security threats effectively.
15
15
---
16
16
17
-
# Understand threat intelligence in Microsoft Sentinel
17
+
# Threat intelligence in Microsoft Sentinel
18
18
19
19
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution with the ability to ingest, curate, and manage threat intelligence from numerous sources.
20
20
@@ -203,25 +203,23 @@ For more information, see [Work with threat intelligence in Microsoft Sentinel](
203
203
204
204
## View your threat intelligence
205
205
206
-
View your threat intelligence from the management interface. Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
206
+
View your threat intelligence from the management interface or using queries. From the management interface, use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
207
207
208
208
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
209
209
210
-
View your indicators stored in the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
210
+
Use queries to view threat intelligence from **Logs** or **Advanced hunting**. Either way, the `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics, hunting queries, and workbooks.
211
211
212
212
>[!IMPORTANT]
213
-
>Tables supporting the new STIX object schema are in private preview. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
213
+
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
214
214
>
215
215
216
-
Here's an example view of a basic query for just threatindicators using the current table.
216
+
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-threat-intelligence-with-queries).
217
217
218
-
:::image type="content" source="media/understand-threat-intelligence/logs-page-ti-table.png" alt-text="Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table." lightbox="media/understand-threat-intelligence/logs-page-ti-table.png":::
218
+
### Threat intelligence life cycle
219
219
220
220
Threat intelligence indicators are ingested into the `ThreatIntelligenceIndicator` table of your Log Analytics workspace as read-only. Whenever an indicator is updated, a new entry in the `ThreatIntelligenceIndicator` table is created. Only the most current indicator appears on the management interface. Microsoft Sentinel deduplicates indicators based on the `IndicatorId` and `SourceSystem` properties and chooses the indicator with the newest `TimeGenerated[UTC]`.
221
221
222
-
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated from the source and pattern of the indicator.
223
-
224
-
For more information, see [Work with threat intelligence in Microsoft Sentinel](work-with-threat-indicators.md#find-and-view-your-indicators-with-queries).
222
+
The `IndicatorId` property is generated using the STIX indicator ID. When indicators are imported or created from non-STIX sources, `IndicatorId` is generated using both the source and pattern of the indicator.
225
223
226
224
### View your GeoLocation and WhoIs data enrichments (public preview)
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+40-24Lines changed: 40 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Use the management interface to create STIX objects and perform other common thr
47
47
- Define relationships as you create new STIX objects.
48
48
- Quickly create multiple objects by using the duplicate feature to copy the metadata from a new or existing TI object.
49
49
50
-
For more information on supported STIX objects, see [Understand threat intelligence](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
50
+
For more information on supported STIX objects, see [Threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md#create-and-manage-threat-intelligence).
51
51
52
52
### Create a new STIX object
53
53
@@ -90,28 +90,32 @@ Reduce noise from your TI feeds, extend the validity of high value indicators, a
90
90
91
91
:::image type="content" source="media/work-with-threat-indicators/new-ingestion-rule.png" alt-text="Screenshot showing new ingestion rule creation for extending valid until date.":::
92
92
93
-
For more information, see [Understand threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules).
93
+
For more information, see [Threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules).
94
94
95
95
### Curate threat intelligence with the relationship builder
96
96
97
97
Connect threat intelligence objects with the relationship builder. There's a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.
98
98
99
-
1. Start with an object like a threat actor or attack pattern where the single object connects to one or more objects, like indicators.
99
+
1. Select **Add new** > **TI relationship**.
100
+
101
+
1. Start with an existing TI object like a threat actor or attack pattern where the single object connects to one or more existing objects, like indicators.
100
102
101
103
1. Add the relationship type according to the best practices outlined in the following table and in the [STIX 2.1 reference relationship summary table](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_6n2czpjuie3v):
102
104
103
-
| Relationship type | Description |
104
-
|---|---|
105
-
|**Duplicate of**</br>**Derived from**</br>**Related to**| Common relationships defined for any STIX domain object (SDO)<br>For more information, see [STIX 2.1 reference on common relationships](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_f3dx2rhc3vl)|
106
-
|**Targets**|`Attack pattern` or `Threat actor` Targets `Identity`|
107
-
|**Uses**|`Threat actor` Uses `Attack pattern`|
108
-
|**Attributed to**|`Threat actor` Attributed to `Identity`|
109
-
|**Indicates**|`Indicator` Indicates `Attack pattern` or `Threat actor`|
|**Duplicate of**</br>**Derived from**</br>**Related to**| Common relationships defined for any STIX domain object (SDO)<br>For more information, see [STIX 2.1 reference on common relationships](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_f3dx2rhc3vl)|
108
+
|**Targets**|`Attack pattern` or `Threat actor` Targets `Identity`|
109
+
|**Uses**|`Threat actor` Uses `Attack pattern`|
110
+
|**Attributed to**|`Threat actor` Attributed to `Identity`|
111
+
|**Indicates**|`Indicator` Indicates `Attack pattern` or `Threat actor`|
1. Use the following image as an example in how to use the relationship builder. This example demonstrates how to make connections made between a threat actor and an attack pattern, indicator, and identity using the relationship builder in the Defender portal.
111
115
112
-
The following image demonstrates connections made between a threat actor and an attack pattern, indicator, and identity using the relationship type table.
116
+
:::image type="content" source="media/work-with-threat-indicators/relationship-example-defender-portal.png" alt-text="Screenshot showing the relationship builder." lightbox="media/work-with-threat-indicators/relationship-example-defender-portal.png":::
113
117
114
-
:::image type="content" source="media/work-with-threat-indicators/relationship-example.png" alt-text="Screenshot showing the relationship builder.":::
118
+
1. Complete the relationship by configuring **Common** properties.
115
119
116
120
### View your threat intelligence in the management interface
117
121
@@ -129,8 +133,7 @@ In the following image, multiple sources were used to search by placing them in
129
133
130
134
:::image type="content" source="media/work-with-threat-indicators/advanced-search.png" alt-text="Screenshot shows an OR operator combined with multiple AND conditions to search threat intelligence." lightbox="media/work-with-threat-indicators/advanced-search.png":::
131
135
132
-
133
-
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
136
+
Microsoft Sentinel only displays the most current version of your threat intel in this view. For more information on how objects are updated, see [Threat intelligence life cycle](understand-threat-intelligence.md#threat-intelligence-life-cycle).
134
137
135
138
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data so you can provide more context for any investigations where indicator is found.
136
139
@@ -154,24 +157,37 @@ Edit threat intelligence one object at a time, whether created directly in Micro
154
157
155
158
For more information on how threat intel is updated, see [View your threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
156
159
157
-
### Find and view your indicators with queries
160
+
### Find and view threat intelligence with queries
158
161
159
-
This procedure describes how to view your threat indicators in Log Analytics, together with other Microsoft Sentinel event data, regardless of the source feed or method you used to ingest them.
162
+
This procedure describes how to view your threat intelligence with queries, regardless of the source feed or method you used to ingest them.
160
163
161
-
Threat indicators are listed in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
164
+
Threat indicators are stored in the Microsoft Sentinel `ThreatIntelligenceIndicator` table. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as **Analytics**, **Hunting**, and **Workbooks**.
162
165
163
-
To view your threat intelligence indicators:
166
+
>[!IMPORTANT]
167
+
>Tables supporting the new STIX object schema aren't available publicly. In order to view the STIX objects in queries and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, alongside or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
168
+
>
164
169
165
-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **General**, select **Logs**.
170
+
#### [Defender portal](#tab/defender-portal)
166
171
167
-
For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Investigation & response** > **Hunting** > **Advanced hunting**.
172
+
1. For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Investigation & response** > **Hunting** > **Advanced hunting**.
168
173
169
174
1. The `ThreatIntelligenceIndicator` table is located under the **Microsoft Sentinel** group.
175
+
176
+
:::image type="content" source="./media/work-with-threat-indicators/table-results-advanced-hunting.png" alt-text="Screenshot of add watchlist option on watchlist page." lightbox="./media/work-with-threat-indicators/table-results-advanced-hunting.png":::
177
+
178
+
#### [Azure portal](#tab/azure-portal)
179
+
180
+
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **General**, select **Logs**.
181
+
170
182
1. Select the **Preview data** icon (the eye) next to the table name. Select **See in query editor** to run a query that shows records from this table.
171
183
172
-
Your results should look similar to the sample threat indicator shown here.
184
+
Your results should look similar to the sample threat indicator shown here.
185
+
186
+
:::image type="content" source="media/work-with-threat-indicators/table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/table-results.png":::
187
+
188
+
---
173
189
174
-
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
190
+
For more information, see [View your threat intelligence](understand-threat-intelligence.md#view-your-threat-intelligence).
175
191
176
192
### Visualize your threat intelligence with workbooks
177
193
@@ -224,7 +240,7 @@ There's also a rich resource for [Azure Monitor workbooks on GitHub](https://git
224
240
225
241
For more information, see the following articles:
226
242
227
-
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md).
243
+
- [Threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md).
228
244
- Connect Microsoft Sentinel to [STIX/TAXII threat intelligence feeds](./connect-threat-intelligence-taxii.md).
229
245
- See which [TIPs, TAXII feeds, and enrichments](threat-intelligence-integration.md) can be readily integrated with Microsoft Sentinel.
0 commit comments