Skip to content

Commit b0683ff

Browse files
authored
Merge pull request #95628 from jayhaddad/patch-10
Update work-with-threat-indicators.md
2 parents 549e5d4 + 4b47ecd commit b0683ff

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sentinel/work-with-threat-indicators.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ IMPORTANT: Microsoft Sentinel refreshes indicators every 14 days to make sure th
158158
> [!IMPORTANT]
159159
> Matching analytics is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
160160
161-
[Create a rule](detect-threats-built-in.md#use-built-in-analytics-rules) using the built-in **Microsoft Threat Intelligence Matching Analytics** analytics rule template to have Microsoft Sentinel match Microsoft-generated threat intelligence data with the logs you've ingested in to Microsoft Sentinel.
161+
[Create a rule](detect-threats-built-in.md#use-built-in-analytics-rules) using the built-in **Microsoft Threat Intelligence Analytics** analytics rule template to have Microsoft Sentinel match Microsoft-generated threat intelligence data with the logs you've ingested in to Microsoft Sentinel.
162162

163163
Matching threat intelligence data with your logs helps to generate high-fidelity alerts and incidents, with appropriate severities applied. When a match is found, any alerts generated are grouped into incidents.
164164

@@ -168,9 +168,9 @@ Alerts are grouped on a per-observable basis, over a 24-hour timeframe. So, for
168168

169169
If you have a match found, any alerts generated are grouped into incidents.
170170

171-
Use the following steps to triage through the incidents generated by the **Microsoft Threat Intelligence Matching Analytics** rule:
171+
Use the following steps to triage through the incidents generated by the **Microsoft Threat Intelligence Analytics** rule:
172172

173-
1. In the Microsoft Sentinel workspace where you've enabled the **Microsoft Threat Intelligence Matching Analytics** rule, select **Incidents** and search for **Microsoft Threat Intelligence Analytics**.
173+
1. In the Microsoft Sentinel workspace where you've enabled the **Microsoft Threat Intelligence Analytics** rule, select **Incidents** and search for **Microsoft Threat Intelligence Analytics**.
174174

175175
Any incidents found are shown in the grid.
176176

0 commit comments

Comments
 (0)