Skip to content

Commit c39d09a

Browse files
update screenshot for GA
1 parent e051e87 commit c39d09a

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

articles/sentinel/connect-threat-intelligence-tip.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: usx-security
2020

2121
> [!NOTE]
2222
> This data connector is on a path for deprecation. More information will be published on the precise timeline. Use the new Threat Intelligence Upload Indicators API data connector for new solutions going forward.
23-
> For more information, see [Connect your threat intelligence platform to Microsoft Sentinel with the Upload Indicators API](connect-threat-intelligence-upload-api.md).
23+
> For more information, see [Connect your threat intelligence platform to Microsoft Sentinel with the STIX objects API](connect-threat-intelligence-upload-api.md).
2424
2525
Many organizations use threat intelligence platform (TIP) solutions to aggregate threat indicator feeds from various sources. From the aggregated feed, the data is curated to apply to security solutions such as network devices, EDR/XDR solutions, or security information and event management (SIEM) solutions such as Microsoft Sentinel. By using the TIP data connector, you can use these solutions to import threat indicators into Microsoft Sentinel.
2626

@@ -145,17 +145,17 @@ The last step in the integration process is to enable the TIP data connector in
145145

146146
1. To configure the TIP data connector, select **Configuration** > **Data connectors**.
147147

148-
1. Find and select the **Threat Intelligence Platforms** data connector, and then select **Open connector page**.
148+
1. Find and select the **Threat Intelligence Platforms - BEING DEPRECATED** data connector, and then select **Open connector page**.
149149

150-
:::image type="content" source="media/connect-threat-intelligence-tip/tip-data-connector-config.png" alt-text="Screenshot that shows the Data connectors page with the Threat Intelligence Platforms data connector listed." lightbox="media/connect-threat-intelligence-tip/tip-data-connector-config.png":::
150+
:::image type="content" source="media/connect-threat-intelligence-tip/threat-intelligence-platforms-data-connector.png" alt-text="Screenshot that shows the Data connectors page with the Threat Intelligence Platforms data connector listed." lightbox="media/connect-threat-intelligence-tip/threat-intelligence-platforms-data-connector.pn":::
151151

152152
1. Because you already finished the app registration and configured your TIP or custom solution to send threat indicators, the only step left is to select **Connect**.
153153

154154
Within a few minutes, threat indicators should begin flowing into this Microsoft Sentinel workspace. You can find the new indicators on the **Threat intelligence** pane, which you can access from the Microsoft Sentinel menu.
155155

156156
## Related content
157157

158-
In this article, you learned how to connect your TIP to Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:
158+
In this article, you learned how to connect your TIP to Microsoft Sentinel using a method on path for deprecation. To connect your TIP using the recommended method, see [Connect your TIP with STIX objects API](connect-threat-intelligence-upload-api.md).
159159

160160
- Learn how to [get visibility into your data and potential threats](get-visibility.md).
161161
- Get started [detecting threats with Microsoft Sentinel](./detect-threats-built-in.md).
152 KB
Loading

0 commit comments

Comments
 (0)