Skip to content

Commit ad61c85

Browse files
add whats new ingestion rules
1 parent 7623bb9 commit ad61c85

File tree

5 files changed

+12
-7
lines changed

5 files changed

+12
-7
lines changed
108 KB
Loading

articles/sentinel/understand-threat-intelligence.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following STIX objects are available in Microsoft Sentinel:
152152

153153
### Configure ingestion rules
154154

155-
Take full control of threat intelligence feeds by filtering and optimizing the intel before it's delivered to your workspace. Ingestion rules update attributes, or filter objects out all together. The following table lists some use cases:
155+
Optimize threat intelligence feeds by filtering and enhancing objects before they're delivered to your workspace. Ingestion rules update attributes, or filter objects out all together. The following table lists some use cases:
156156

157157
| Ingestion rule use case | Description |
158158
|---|---|
@@ -163,7 +163,7 @@ Take full control of threat intelligence feeds by filtering and optimizing the i
163163
:::image type="content" source="media/understand-threat-intelligence/ingestion-rules-overview.png" alt-text="Screenshot shows four ingestion rules matching the use cases.":::
164164

165165
Keep in mind the following tips for using ingestion rules:
166-
- All rules apply in order. Threat intelligence objects being ingested will get processed by each rule until a `Delete` action is taken.
166+
- All rules apply in order. Threat intelligence objects being ingested will get processed by each rule until a `Delete` action is taken. If no action is taken on an object, it is ingested from the source as is.
167167
- The `Delete` action means the threat intelligence object is skipped for ingestion, meaning it's removed from the pipeline. Any previous versions of the object already ingested aren't affected.
168168
- New and edited rules take up to 15 minutes to take effect.
169169

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Microsoft Sentinel
44
description: This article explains how to detect threats with Microsoft-generated threat intelligence in Microsoft Sentinel.
55
author: austinmccollum
66
ms.topic: how-to
7-
ms.date: 3/14/2024
7+
ms.date: 01/28/2025
88
ms.author: austinmc
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
@@ -20,10 +20,6 @@ ms.collection: usx-security
2020

2121
Take advantage of threat intelligence produced by Microsoft to generate high-fidelity alerts and incidents with the **Microsoft Defender Threat Intelligence Analytics** rule. This built-in rule in Microsoft Sentinel matches indicators with Common Event Format (CEF) logs, Windows DNS events with domain and IPv4 threat indicators, syslog data, and more.
2222

23-
> [!IMPORTANT]
24-
> Matching analytics is currently in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for more legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
25-
>
26-
2723
## Prerequisites
2824

2925
You must install one or more of the supported data connectors to produce high-fidelity alerts and incidents. A premium Microsoft Defender Threat Intelligence license isn't required. Install the appropriate solutions from the **Content hub** to connect these data sources:

articles/sentinel/whats-new.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,20 @@ Get notified when this page is updated by copying and pasting the following URL
2323

2424
## January 2025
2525

26+
-[Optimize threat intelligence feeds with ingestion rules](#optimize-threat-intelligence-feeds-with-ingestion-rules)
2627
- [Threat intelligence management interface updated](#threat-intelligence-management-interface-has-moved)
2728
- [Unlock advanced hunting with new STIX objects by opting in to new threat intelligence tables](#unlock-advanced-hunting-with-new-stix-objects-by-opting-in-to-new-threat-intelligence-tables)
2829
- [Threat intelligence upload API now supports more STIX objects](#threat-intelligence-upload-api-now-supports-more-stix-objects)
2930
- [Microsoft Defender Threat Intelligence data connectors now generally available (GA)](#microsoft-defender-threat-intelligence-data-connectors-now-generally-available-ga)
3031
- [Bicep template support for repositories (Preview)](#bicep-template-support-for-repositories-preview)
3132
- [View granular solution content in the Microsoft Sentinel content hub](#view-granular-solution-content-in-the-microsoft-sentinel-content-hub)
3233

34+
### Optimize threat intelligence feeds with ingestion rules
35+
36+
Optimize threat intelligence feeds by filtering and enhancing objects before they're delivered to your workspace. Ingestion rules update threat intel object attributes, or filter objects out all together.
37+
38+
For more information, see [Understand threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules)
39+
3340
### Threat intelligence management interface has moved
3441

3542
Threat intelligence for Microsoft Sentinel in the Defender portal has changed! We've renamed the page **Intel management** and moved it with other threat intelligence workflows. There's no change for customers using Microsoft Sentinel in the Azure experience.

articles/sentinel/work-with-threat-indicators.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,8 @@ Reduce noise from your TI feeds, extend the validity of high value indicators, a
8989

9090
:::image type="content" source="media/work-with-threat-indicators/new-ingestion-rule.png" alt-text="Screenshot showing new ingestion rule creation for extending valid until date.":::
9191

92+
For more information, see [Understand threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules).
93+
9294
### Curate threat intelligence with the relationship builder
9395

9496
Connect threat intelligence objects with the relationship builder. There's a maximum of 20 relationships in the builder at once, but more connections can be created through multiple iterations and by adding relationship target references for new objects.

0 commit comments

Comments
 (0)