Skip to content

Commit a15f75e

Browse files
resolve blocking issues
1 parent 35a0048 commit a15f75e

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Matching analytics is configured when you enable the **Microsoft Threat Intellig
4242

4343
1. Click **Review** > **Create**.
4444

45-
:::image type="content" source="media/use-matching-analytics-to-detect-threats/configure-matching-analytics-rule.png" alt-text="A screenshot showing the Microsoft Threat Intelligence Analytics rule enable in the Active rules tab.":::
45+
:::image type="content" source="media/use-matching-analytics-to-detect-threats/configure-matching-analytics-rule.png" alt-text="A screenshot showing the Microsoft Threat Intelligence Analytics rule enabled in the Active rules tab.":::
4646

4747
Alerts are grouped on a per-observable basis. For example, all alerts generated in a 24-hour time period that match the `contoso.com` domain are grouped into a single incident with the appropriate severity.
4848

@@ -72,17 +72,17 @@ Use the following steps to triage through the incidents generated by the **Micro
7272

7373
For example:
7474

75-
:::image type="content" source="media/work-with-threat-indicators/matching-analytics.png" alt-text="Sample matched analytics details.":::
75+
:::image type="content" source="media/work-with-threat-indicators/matching-analytics.png" alt-text="Screenshot of incident generated by matching analytics with details pane.":::
7676

7777
When a match is found, the indicator is also published to the Log Analytics **ThreatIntelligenceIndicators**, and displayed in the **Threat Intelligence** page. For any indicators published from this rule, the source is defined as **Microsoft Threat Intelligence Analytics**.
7878

7979
For example, in the **ThreatIntelligenceIndicators** log:
8080

81-
:::image type="content" source="media/work-with-threat-indicators/matching-analytics-logs.png" alt-text="Matching analytics displayed in the ThreatIntelligenceIndicators log.":::
81+
:::image type="content" source="media/work-with-threat-indicators/matching-analytics-logs.png" alt-text="Screenshot of ThreatIntelligenceIndicator table in Log Analytics showing recent indicator with SourceSystem of Microsoft Threat Intelligence Analytics.":::
8282

8383
In the **Threat Intelligence** page:
8484

85-
:::image type="content" source="media/work-with-threat-indicators/matching-analytics-threat-intelligence.png" alt-text="Matching analytics displayed in the Threat Intelligence page.":::
85+
:::image type="content" source="media/work-with-threat-indicators/matching-analytics-threat-intelligence.png" alt-text="Screenshot of the Threat Intelligence overview with an indicator selecting showing the details pain and the source as Microsoft Threat Intelligence Analytics.":::
8686

8787

8888
## Next steps

articles/sentinel/use-threat-indicators-in-analytics-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,11 @@ Below is an example of how to enable and configure a rule to generate security a
3535

3636
1. Find the rule titled **TI map IP entity to AzureActivity** and ensure you have connected all the required data sources as shown below.
3737

38-
:::image type="content" source="media/work-with-threat-indicators/threat-intel-required-data-sources.png" alt-text="Required data sources":::
38+
:::image type="content" source="media/work-with-threat-indicators/threat-intel-required-data-sources.png" alt-text="Screenshot of required data sources for the TI map IP entity to AzureActivity analytics rule.":::
3939

4040
1. Select the **TI map IP entity to AzureActivity** rule and then select **Create rule** to open a rule configuration wizard. Configure the settings in the wizard and then select **Next: Set rule logic >**.
4141

42-
:::image type="content" source="media/work-with-threat-indicators/threat-intel-create-analytics-rule.png" alt-text="Create analytics rule":::
42+
:::image type="content" source="media/work-with-threat-indicators/threat-intel-create-analytics-rule.png" alt-text="Screenshot of the create analytics rule configuration wizard.":::
4343

4444
1. The rule logic portion of the wizard has been pre-populated with the following items:
4545

0 commit comments

Comments
 (0)