Skip to content

Commit be88c7e

Browse files
committed
edit pass: sentinel-threat-intelligence-batch2
1 parent bc18238 commit be88c7e

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Whichever of the two interfaces you choose, you end up here.
128128

129129
1. When all the fields are filled in to your satisfaction, select **Apply**. A confirmation message appears in the upper-right corner stating that your indicator was created.
130130

131-
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat Intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
131+
1. The entity is added as a threat indicator in your workspace. You can find it [in the list of indicators on the Threat Intelligence page](work-with-threat-indicators.md#find-and-view-your-indicators-on-the-threat-intelligence-page). You can also find it [in the ThreatIntelligenceIndicators table in Logs](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
132132

133133
## Related content
134134

articles/sentinel/connect-threat-intelligence-taxii.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ ms.collection: usx-security
1515

1616
# Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds
1717

18-
The most widely adopted industry standard for the transmission of threat intelligence is a [combination of the STIX data format and the TAXII protocol](https://oasis-open.github.io/cti-documentation/). If your organization receives threat indicators from solutions that support the current STIX/TAXII version (2.0 or 2.1), you can use the Threat intelligence - TAXII data connector to bring your threat indicators into Microsoft Sentinel. This connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
18+
The most widely adopted industry standard for the transmission of threat intelligence is a [combination of the STIX data format and the TAXII protocol](https://oasis-open.github.io/cti-documentation/). If your organization receives threat indicators from solutions that support the current STIX/TAXII version (2.0 or 2.1), you can use the Threat Intelligence - TAXII data connector to bring your threat indicators into Microsoft Sentinel. This connector enables a built-in TAXII client in Microsoft Sentinel to import threat intelligence from TAXII 2.x servers.
1919

2020
:::image type="content" source="media/connect-threat-intelligence-taxii/threat-intel-taxii-import-path.png" alt-text="Screenshot that shows a TAXII import path.":::
2121

22-
To import STIX-formatted threat indicators to Microsoft Sentinel from a TAXII server, you must get the TAXII server API root and collection ID. Then you enable the Threat intelligence - TAXII data connector in Microsoft Sentinel.
22+
To import STIX-formatted threat indicators to Microsoft Sentinel from a TAXII server, you must get the TAXII server API root and collection ID. Then you enable the Threat Intelligence - TAXII data connector in Microsoft Sentinel.
2323

2424
Learn more about [threat intelligence](understand-threat-intelligence.md) in Microsoft Sentinel, and specifically about the [TAXII threat intelligence feeds](threat-intelligence-integration.md#taxii-threat-intelligence-feeds) that you can integrate with Microsoft Sentinel.
2525

@@ -56,11 +56,11 @@ To import threat indicators into Microsoft Sentinel from a TAXII server, follow
5656

5757
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](sentinel-solutions-deploy.md).
5858

59-
## Enable the Threat intelligence - TAXII data connector
59+
## Enable the Threat Intelligence - TAXII data connector
6060

6161
1. To configure the TAXII data connector, select the **Data connectors** menu.
6262

63-
1. Find and select the **Threat intelligence - TAXII** data connector, and then select **Open connector page**.
63+
1. Find and select the **Threat Intelligence - TAXII** data connector, and then select **Open connector page**.
6464

6565
:::image type="content" source="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png" alt-text="Screenshot that shows the Data connectors page with the TAXII data connector listed." lightbox="media/connect-threat-intelligence-taxii/taxii-data-connector-config.png":::
6666

articles/sentinel/indicators-bulk-file-import.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: usx-security
1616

1717
# Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file
1818

19-
In this how-to guide, you add indicators from a CSV or JSON file into Microsoft Sentinel threat intelligence. Threat intelligence sharing still happens across emails and other informal channels during an ongoing investigation. The ability to import indicators directly into Microsoft Sentinel threat intelligence allows you to quickly socialize emerging threats for your team. You make the threats available to power other analytics, such as producing security alerts, incidents, and automated responses.
19+
In this article, you add indicators from a CSV or JSON file into Microsoft Sentinel threat intelligence. Threat intelligence sharing still happens across emails and other informal channels during an ongoing investigation. You have the ability to import indicators directly into Microsoft Sentinel threat intelligence so that you can quickly relay emerging threats to your team. You make the threats available to power other analytics, such as producing security alerts, incidents, and automated responses.
2020

2121
> [!IMPORTANT]
2222
> This feature is currently in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for more legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -25,7 +25,7 @@ In this how-to guide, you add indicators from a CSV or JSON file into Microsoft
2525
2626
## Prerequisites
2727

28-
- You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
28+
You must have read and write permissions to the Microsoft Sentinel workspace to store your threat indicators.
2929

3030
## Select an import template for your indicators
3131

@@ -45,7 +45,7 @@ Add multiple indicators to your threat intelligence with a specially crafted CSV
4545
:::image type="content" source="media/indicators-bulk-file-import/import-using-file-menu-defender-portal.png" alt-text="Screenshot that shows the menu options to import indicators by using a file menu from the Defender portal." lightbox="media/indicators-bulk-file-import/import-using-file-menu-defender-portal.png":::
4646
---
4747

48-
1. Choose **CSV** or **JSON** from the **File format** dropdown menu.
48+
1. On the **File format** dropdown menu, select **CSV** or **JSON**.
4949

5050
:::image type="content" source="media/indicators-bulk-file-import/format-select-and-download.png" alt-text="Screenshot that shows the dropdown menu to upload a CSV or JSON file, choose a template to download, and specify a source.":::
5151

articles/sentinel/work-with-threat-indicators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ Here's how to find the threat intelligence workbook provided in Microsoft Sentin
128128
| summarize count() by ThreatType
129129
```
130130
131-
1. In the **Visualization** dropdown list, select **Bar chart**.
131+
1. On the **Visualization** dropdown menu, select **Bar chart**.
132132
133133
1. Select **Done editing**, and view the new chart for your workbook.
134134

0 commit comments

Comments
 (0)