Skip to content

Commit cbe4535

Browse files
authored
Merge pull request #209435 from yelevin/yelevin/add-entity-ti
Add Entity to TI
2 parents 8af2f18 + 11e957b commit cbe4535

File tree

7 files changed

+123
-2
lines changed

7 files changed

+123
-2
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -286,6 +286,8 @@
286286
href: indicators-bulk-file-import.md
287287
- name: Work with threat indicators
288288
href: work-with-threat-indicators.md
289+
- name: Add entity to threat indicators
290+
href: add-entity-to-threat-intelligence.md
289291
- name: Monitor and visualize data
290292
items:
291293
- name: Visualize collected data
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Add entities to threat intelligence in Microsoft Sentinel
3+
description: This article shows you, if you discover a malicious entity in an incident investigation, how to add the entity to your threat intelligence indicator lists in Microsoft Sentinel.
4+
author: yelevin
5+
ms.topic: how-to
6+
ms.date: 08/25/2022
7+
ms.author: yelevin
8+
---
9+
10+
# Add entities to threat intelligence in Microsoft Sentinel
11+
12+
When investigating an incident, you examine entities and their context as an important part of understanding the scope and nature of the incident. In the course of the investigation, you may discover a domain name, URL, file, or IP address in the incident that should be labeled and tracked as an indicator of compromise (IOC), a threat indicator.
13+
14+
For example, you may discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
15+
16+
Microsoft Sentinel allows you to flag these types of entities as malicious, right from within the investigation graph, and add it to your threat indicator lists. You'll then be able to view the added indicators both in Logs and in the Threat Intelligence blade, and use them across your Microsoft Sentinel workspace.
17+
18+
> [!IMPORTANT]
19+
> Adding entities as TI indicators is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
20+
21+
## Add an entity to your indicators list
22+
23+
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. You can use it to add entities to your threat intelligence indicator lists, making them available across your workspace.
24+
25+
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
26+
27+
1. Select an incident to investigate. In the incident details panel, select the **Actions** button and choose **Investigate** from the pop-up menu. This will open the investigation graph.
28+
29+
:::image type="content" source="media/add-entity-to-threat-intelligence/select-incident-to-investigate.png" alt-text="Screenshot of selecting incident from queue to investigate.":::
30+
31+
1. Select the entity from the graph that you want to add as a threat indicator. A side panel will open on the right. Select **Add to TI**.
32+
33+
Only the following types of entities can be added as threat indicators:
34+
- Domain name
35+
- IP address (IPv4 and IPv6)
36+
- URL
37+
- File (hash)
38+
39+
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot of adding entity to threat intelligence.":::
40+
41+
1. The **New indicator** side panel will open. The following fields will be populated automatically:
42+
43+
- **Type**
44+
- The type of indicator represented by the entity you're adding.
45+
Drop-down with possible values: *ipv4-addr*, *ipv6-addr*, *URL*, *file*, *domain-name*
46+
- Required; automatically populated based on the **entity type**.
47+
48+
- **Value**
49+
- The name of this field changes dynamically to the selected indicator type.
50+
- The value of the indicator itself.
51+
- Required; automatically populated by the **entity value**.
52+
53+
- **Tags**
54+
- Free-text tags you can add to the indicator.
55+
- Optional; automatically populated by the **incident ID**. You can add others.
56+
57+
- **Name**
58+
- Name of the indicator - this is what will be displayed in your list of indicators.
59+
- Optional; automatically populated by the **incident name.**
60+
61+
- **Created by**
62+
- Creator of the indicator.
63+
- Optional; automatically-populated by the user logged into Microsoft Sentinel.
64+
65+
Fill in the remaining fields accordingly.
66+
67+
- **Threat type**
68+
- The threat type represented by the indicator.
69+
- Optional; free text.
70+
71+
- **Description**
72+
- Description of the indicator.
73+
- Optional; free text.
74+
75+
- **Revoked**
76+
- Revoked status of the indicator. Mark checkbox to revoke the indicator, clear checkbox to make it active.
77+
- Optional; boolean.
78+
79+
- **Confidence**
80+
- Score reflecting confidence in the correctness of the data, by percent.
81+
- Optional; integer, 1-100
82+
83+
- **Kill chain**
84+
- Phases in the [*Lockheed Martin Cyber Kill Chain*](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html#OVERVIEW) to which the indicator corresponds.
85+
- Optional; free text
86+
87+
- **Valid from**
88+
- The time from which this indicator is considered valid.
89+
- Required; date/time
90+
91+
- **Valid until**
92+
- The time at which this indicator should no longer be considered valid.
93+
- Optional; date/time
94+
95+
:::image type="content" source="media/add-entity-to-threat-intelligence/new-indicator-panel.png" alt-text="Screenshot of entering information in new threat indicator panel.":::
96+
97+
1. When all the fields are filled in to your satisfaction, select **Apply**. You'll see a confirmation message in the upper-right-hand corner that your indicator was created.
98+
99+
1. The entity will be added as a threat indicator in your workspace. You can find it [in the list of indicators in the **Threat intelligence** page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page), and also [in the *ThreatIntelligenceIndicators* table in **Logs**](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
100+
101+
## Next steps
102+
103+
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
104+
105+
- [Investigate incidents with Microsoft Sentinel](investigate-cases.md)
106+
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md)
107+
- [Work with threat indicators in Microsoft Sentinel](work-with-threat-indicators.md)
90.8 KB
Loading
121 KB
Loading
550 KB
Loading

articles/sentinel/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: A description of what's new and changed in Azure Sentinel from six
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
7-
ms.date: 11/22/2021
7+
ms.date: 08/31/2022
88
ms.custom: ignite-fall-2021
99
---
1010

articles/sentinel/whats-new.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes new features in Microsoft Sentinel from the
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
7-
ms.date: 08/08/2022
7+
ms.date: 08/31/2022
88
ms.custom: ignite-fall-2021
99
---
1010

@@ -25,6 +25,18 @@ If you're looking for items older than six months, you'll find them in the [Arch
2525
>
2626
> You can also contribute! Join us in the [Microsoft Sentinel Threat Hunters GitHub community](https://github.com/Azure/Azure-Sentinel/wiki).
2727
28+
## September 2022
29+
30+
- [Add entities to threat intelligence (Preview)](#add-entities-to-threat-intelligence-preview)
31+
32+
### Add entities to threat intelligence (Preview)
33+
34+
When investigating an incident, you examine entities and their context as an important part of understanding the scope and nature of the incident. In the course of the investigation, you may discover an entity in the incident that should be labeled and tracked as an indicator of compromise (IOC), a threat indicator.
35+
36+
Microsoft Sentinel allows you to flag the entity as malicious, right from within the investigation graph. You'll then be able to view this indicator both in Logs and in the Threat Intelligence blade in Sentinel.
37+
38+
Learn how to [add an entity to your threat intelligence](add-entity-to-threat-intelligence.md).
39+
2840
## August 2022
2941

3042
- [Heads up: Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#heads-up-microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)

0 commit comments

Comments
 (0)