Skip to content

Commit bc18238

Browse files
committed
edit pass: sentinel-threat-intelligence-batch2
1 parent 23ade89 commit bc18238

5 files changed

+146
-140
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 48 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -9,128 +9,130 @@ ms.date: 3/14/2024
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
12-
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
12+
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so that I don't lose important information.
1313
---
1414

1515
# Add entities to threat intelligence in Microsoft Sentinel
1616

17-
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise (IOC) in your threat intelligence.
17+
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise in your threat intelligence.
1818

19-
For example, you discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
19+
For example, you might discover an IP address that performs port scans across your network or functions as a command and control node by sending and receiving transmissions from large numbers of nodes in your network.
2020

21-
Microsoft Sentinel allows you to flag these types of entities right from within your incident investigation, and add it to your threat intelligence. You are able to view the added indicators both in **Logs** and **Threat Intelligence**, and use them across your Microsoft Sentinel workspace.
21+
With Microsoft Sentinel, you can flag these types of entities from within your incident investigation and add them to your threat intelligence. You can view the added indicators in **Logs** and **Threat Intelligence** and use them across your Microsoft Sentinel workspace.
2222

2323
## Add an entity to your threat intelligence
2424

25-
The new [incident details page](investigate-incidents.md) gives you another way to add entities to threat intelligence, in addition to the investigation graph. Both ways are shown below.
25+
The [new incident details page](investigate-incidents.md) and the investigation graph give you two ways to add entities to threat intelligence. Both ways are shown here.
2626

2727
# [Incident details page](#tab/incidents)
2828

29-
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
29+
1. On the Microsoft Sentinel menu, select **Incidents**.
3030

31-
1. Select an incident to investigate. In the incident details panel, select **View full details** to open the incident details page.
31+
1. Select an incident to investigate. On the incident details pane, select **View full details** to open the incident details page.
3232

33-
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot of incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
33+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot that shows the incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
3434

35-
1. Find the entity from the **Entities** widget that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
35+
1. On the **Entities** pane, find the entity that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
3636

3737
1. Select the three dots to the right of the entity, and select **Add to TI** from the pop-up menu.
3838

39-
Only the following types of entities can be added as threat indicators:
39+
Only add the following types of entities as threat indicators:
40+
4041
- Domain name
4142
- IP address (IPv4 and IPv6)
4243
- URL
4344
- File (hash)
4445

45-
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot of adding an entity to threat intelligence.":::
46+
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot that shows adding an entity to threat intelligence.":::
4647

4748
# [Investigation graph](#tab/cases)
4849

49-
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. You can use it to add entities to your threat intelligence indicator lists, making them available across your workspace.
50+
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. Use it to add entities to your threat intelligence indicator lists by making them available across your workspace.
51+
52+
1. On the Microsoft Sentinel menu, select **Incidents**.
5053

51-
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
54+
1. Select an incident to investigate. On the incident details pane, select **Actions**, and choose **Investigate** from the pop-up menu to open the investigation graph.
5255

53-
1. Select an incident to investigate. In the incident details panel, select the **Actions** button and choose **Investigate** from the pop-up menu. This will open the investigation graph.
56+
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot that shows selecting an incident from the list to investigate.":::
5457

55-
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot of selecting incident from queue to investigate.":::
58+
1. Select the entity from the graph that you want to add as a threat indicator. On the side pane that opens, select **Add to TI**.
5659

57-
1. Select the entity from the graph that you want to add as a threat indicator. A side panel will open on the right. Select **Add to TI**.
60+
Only add the following types of entities as threat indicators:
5861

59-
Only the following types of entities can be added as threat indicators:
6062
- Domain name
6163
- IP address (IPv4 and IPv6)
6264
- URL
6365
- File (hash)
6466

65-
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot of adding entity to threat intelligence.":::
67+
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot that shows adding an entity to threat intelligence.":::
6668

6769
---
6870

69-
Whichever of the two interfaces you choose, you will end up here:
71+
Whichever of the two interfaces you choose, you end up here.
7072

71-
1. The **New indicator** side panel will open. The following fields will be populated automatically:
73+
1. The **New indicator** side pane opens. The following fields are populated automatically:
7274

73-
- **Type**
74-
- The type of indicator represented by the entity you're adding.
75-
Drop-down with possible values: *ipv4-addr*, *ipv6-addr*, *URL*, *file*, *domain-name*
76-
- Required; automatically populated based on the **entity type**.
75+
- **Types**
76+
- The type of indicator represented by the entity you're adding.
77+
- Dropdown list with possible values: `ipv4-addr`, `ipv6-addr`, `URL`, `file`, and `domain-name`.
78+
- Required. Automatically populated based on the **entity type**.
7779

7880
- **Value**
7981
- The name of this field changes dynamically to the selected indicator type.
8082
- The value of the indicator itself.
81-
- Required; automatically populated by the **entity value**.
83+
- Required. Automatically populated by the **entity value**.
8284

83-
- **Tags**
85+
- **Tags**
8486
- Free-text tags you can add to the indicator.
85-
- Optional; automatically populated by the **incident ID**. You can add others.
87+
- Optional. Automatically populated by the **incident ID**. You can add others.
8688

8789
- **Name**
88-
- Name of the indicator—this is what will be displayed in your list of indicators.
89-
- Optional; automatically populated by the **incident name.**
90+
- Name of the indicator. This name is what appears in your list of indicators.
91+
- Optional. Automatically populated by the **incident name.**
9092

9193
- **Created by**
9294
- Creator of the indicator.
93-
- Optional; automatically populated by the user logged into Microsoft Sentinel.
95+
- Optional. Automatically populated by the user signed in to Microsoft Sentinel.
9496

9597
Fill in the remaining fields accordingly.
9698

97-
- **Threat type**
99+
- **Threat types**
98100
- The threat type represented by the indicator.
99-
- Optional; free text.
101+
- Optional. Free text.
100102

101103
- **Description**
102104
- Description of the indicator.
103-
- Optional; free text.
105+
- Optional. Free text.
104106

105107
- **Revoked**
106-
- Revoked status of the indicator. Mark checkbox to revoke the indicator, clear checkbox to make it active.
107-
- Optional; boolean.
108+
- Revoked status of the indicator. Select the checkbox to revoke the indicator. Clear the checkbox to make it active.
109+
- Optional. Boolean.
108110

109111
- **Confidence**
110-
- Score reflecting confidence in the correctness of the data, by percent.
111-
- Optional; integer, 1-100
112+
- Score that reflects confidence in the correctness of the data, by percent.
113+
- Optional. Integer, 1-100.
112114

113-
- **Kill chain**
114-
- Phases in the [*Lockheed Martin Cyber Kill Chain*](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
115-
- Optional; free text
115+
- **Kill chains**
116+
- Phases in the [Lockheed Martin Cyber Kill Chain](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
117+
- Optional. Free text.
116118

117119
- **Valid from**
118120
- The time from which this indicator is considered valid.
119-
- Required; date/time
121+
- Required. Date/time.
120122

121123
- **Valid until**
122124
- The time at which this indicator should no longer be considered valid.
123-
- Optional; date/time
125+
- Optional. Date/time.
124126

125-
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot of entering information in new threat indicator panel.":::
127+
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot that shows entering information in the new threat indicator pane.":::
126128

127-
1. When all the fields are filled in to your satisfaction, select **Apply**. You'll see a confirmation message in the upper-right-hand corner that your indicator was created.
129+
1. When all the fields are filled in to your satisfaction, select **Apply**. A confirmation message appears in the upper-right corner stating that your indicator was created.
128130

129-
1. The entity will be added as a threat indicator in your workspace. You can find it [in the list of indicators in the **Threat intelligence** page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page), and also [in the *ThreatIntelligenceIndicators* table in **Logs**](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
131+
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat Intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
130132

131133
## Related content
132134

133-
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
135+
In this article, you learned how to add entities to your threat indicator lists. For more information, see the following articles:
134136

135137
- [Investigate incidents with Microsoft Sentinel](investigate-incidents.md)
136138
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md)

articles/sentinel/connect-threat-intelligence-taxii.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ For more information, see [Connect your threat intelligence platform (TIP) to Mi
3131

3232
## Prerequisites
3333

34-
- To install, update and delete standalone content or solutions in the **Content hub**, you need the Microsoft Sentinel Contributor role at the resource group level.
34+
- To install, update, and delete standalone content or solutions in the **Content hub**, you need the Microsoft Sentinel Contributor role at the resource group level.
3535
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
3636
- You must have a TAXII 2.0 or TAXII 2.1 API root URI and collection ID.
3737

@@ -46,7 +46,9 @@ TAXII 2.x servers advertise API roots, which are URLs that host collections of t
4646

4747
To import threat indicators into Microsoft Sentinel from a TAXII server, follow these steps:
4848

49-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**. <br>For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Content management** > **Content hub**.
49+
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**.
50+
51+
For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Content management** > **Content hub**.
5052

5153
1. Find and select the **Threat Intelligence** solution.
5254

@@ -58,7 +60,7 @@ For more information about how to manage the solution components, see [Discover
5860

5961
1. To configure the TAXII data connector, select the **Data connectors** menu.
6062

61-
1. Find and select the **Threat intelligence - TAXII** data connector and then select **Open connector page**.
63+
1. Find and select the **Threat intelligence - TAXII** data connector, and then select **Open connector page**.
6264

6365
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot that shows the Data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
6466

articles/sentinel/indicators-bulk-file-import.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,9 @@ In this how-to guide, you add indicators from a CSV or JSON file into Microsoft
3131

3232
Add multiple indicators to your threat intelligence with a specially crafted CSV or JSON file. Download the file templates to get familiar with the fields and how they map to the data you have. Review the required fields for each template type to validate your data before you import it.
3333

34-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Threat intelligence**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Threat intelligence**.
34+
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Threat intelligence**.
35+
36+
For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Threat intelligence**.
3537

3638
1. Select **Import** > **Import using a file**.
3739

@@ -68,7 +70,7 @@ The templates provide all the fields you need to create a single valid indicator
6870

6971
:::image type="content" source="media/indicators-bulk-file-import/upload-file-pane.png" alt-text="Screenshot that shows the dropdown menu to upload a CSV or JSON file, choose a template, and specify a source highlighting the Import button.":::
7072

71-
1. Select the **Import** button.
73+
1. Select **Import**.
7274

7375
## Manage file imports
7476

@@ -94,7 +96,7 @@ Review each template to ensure that your indicators are imported successfully. B
9496

9597
### CSV template structure
9698

97-
1. Choose between the **File indicators** or **All other indicator types** option from the **Indicator type** dropdown menu when you select **CSV**.
99+
1. On the **Indicator type** dropdown menu, select **CSV**. Then choose between the **File indicators** or **All other indicator types** options.
98100

99101
The CSV template needs multiple columns to accommodate the file indicator type because file indicators can have multiple hash types like MD5 and SHA256. All other indicator types like IP addresses only require the observable type and the observable value.
100102

0 commit comments

Comments
 (0)