Skip to content

Commit e60d8bb

Browse files
update for operational TI
1 parent c123e6d commit e60d8bb

File tree

4 files changed

+34
-27
lines changed

4 files changed

+34
-27
lines changed

articles/sentinel/connect-mdti-data-connector.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ appliesto:
1313
ms.collection: usx-security
1414

1515

16-
#Customer intent: As a security administrator, I want to enable the data connector for Microsoft Defender Threat Intelligence so that I can ingest high fidelity indicators of compromise into my Microsoft Sentinel workspace for enhanced threat monitoring and response.
16+
#Customer intent: As a security administrator, I want to enable the data connector for Microsoft Defender Threat Intelligence so that I can ingest high fidelity threat intelligence into my Microsoft Sentinel workspace for enhanced threat monitoring and response.
1717

1818
---
1919

@@ -23,7 +23,7 @@ Bring public, open-source and high-fidelity indicators of compromise (IOCs) gene
2323

2424
> [!INCLUDE [unified-soc-preview-without-alert](includes/unified-soc-preview-without-alert.md)]
2525
26-
For more information about the benefits of the standard and premium Defender Threat Intelligence data connectors, see [Understand threat intelligence](understand-threat-intelligence.md#add-threat-indicators-to-microsoft-sentinel-with-the-defender-threat-intelligence-data-connector).
26+
For more information about the benefits of the standard and premium Defender Threat Intelligence data connectors, see [Understand threat intelligence](understand-threat-intelligence.md#add-threat-intelligence-to-microsoft-sentinel-with-the-defender-threat-intelligence-data-connector).
2727

2828
## Prerequisites
2929

@@ -35,7 +35,7 @@ For more information on how to get a premium license and explore all the differe
3535

3636
## Install the threat intelligence solution in Microsoft Sentinel
3737

38-
To import threat indicators into Microsoft Sentinel from standard and premium Defender Threat Intelligence, follow these steps:
38+
To import threat intelligence into Microsoft Sentinel from standard and premium Defender Threat Intelligence, follow these steps:
3939

4040
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**.
4141

@@ -59,11 +59,11 @@ For more information about how to manage the solution components, see [Discover
5959

6060
:::image type="content" source="media/connect-mdti-data-connector/premium-connect.png" alt-text="Screenshot that shows the Defender Threat Intelligence Data connector page and the Connect button." lightbox="media/connect-mdti-data-connector/premium-connect.png":::
6161

62-
1. When Defender Threat Intelligence indicators start populating the Microsoft Sentinel workspace, the connector status displays **Connected**.
62+
1. When Defender Threat Intelligence starts populating the Microsoft Sentinel workspace, the connector status displays **Connected**.
6363

64-
At this point, the ingested indicators are now available for use in the `TI map...` analytics rules. For more information, see [Use threat indicators in analytics rules](use-threat-indicators-in-analytics-rules.md).
64+
At this point, the ingested intelligence is now available for use in the `TI map...` analytics rules. For more information, see [Use threat indicators in analytics rules](use-threat-indicators-in-analytics-rules.md).
6565

66-
Find the new indicators on the **Threat intelligence** pane or directly in **Logs** by querying the `ThreatIntelligenceIndicator` table. For more information, see [Work with threat indicators](work-with-threat-indicators.md).
66+
Find the new intelligence in the management interface or directly in **Logs** by querying the `ThreatIntelligenceIndicator` table. For more information, see [Work with threat intelligence](work-with-threat-indicators.md).
6767

6868
## Related content
6969

articles/sentinel/understand-threat-intelligence.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,8 @@ Use threat intelligence in Microsoft Sentinel to detect malicious activity obser
4747
You can integrate threat intelligence into Microsoft Sentinel through the following activities:
4848

4949
- **Import threat intelligence** into Microsoft Sentinel by enabling *data connectors* to various threat intelligence [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
50-
- **Create threat intelligence** individually or import using a file from the management interface.
5150
- **Connect threat intelligence** to Microsoft Sentinel by using the upload API to connect various TI [platforms](connect-threat-intelligence-tip.md) or custom applications.
51+
- **Create threat intelligence** individually or import using a file from the management interface.
5252
- **View and manage** the imported threat intelligence in **Logs** or with advanced search in the user interface.
5353
- **Detect threats** and generate security alerts and incidents by using the built-in **Analytics** rule templates based on your imported threat intelligence.
5454
- **Visualize key information** about your imported threat intelligence in Microsoft Sentinel with the **Threat Intelligence** workbook.
@@ -59,13 +59,13 @@ Threat intelligence also provides useful context within other Microsoft Sentinel
5959

6060
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
6161

62-
## Import threat intelligence with data connectors
62+
## Import and connect threat intelligence
6363

6464
Most threat intelligence is imported using data connectors or an API. Here are the solutions available for Microsoft Sentinel.
6565

6666
- **Microsoft Defender Threat Intelligence data connector** to ingest Microsoft's threat intelligence
6767
- **Threat Intelligence - TAXII** for industry-standard STIX/TAXII feeds
68-
- **Threat Intelligence upload API** for integrated and curated TI feeds using a REST API to connect
68+
- **Threat Intelligence upload API** for integrated and curated TI feeds using a REST API to connect (doesn't require a data connector)
6969
- **Threat Intelligence Platform data connector** also connects TI feeds using a legacy REST API, but is on the path for deprecation
7070

7171
Use any of these solutions in any combination, depending on where your organization sources threat intelligence. All of these are available in **Content hub** as part of the **Threat Intelligence** solution. For more information about this solution, see the Azure Marketplace entry [Threat Intelligence](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-threatintelligence-taxii?tab=Overview).
@@ -133,23 +133,25 @@ To import STIX-formatted threat intelligence to Microsoft Sentinel from a TAXII
133133

134134
For more information, see [Connect Microsoft Sentinel to STIX/TAXII threat intelligence feeds](connect-threat-intelligence-taxii.md).
135135

136-
## View and manage your threat intelligence
136+
## Create threat intelligence
137137

138-
View and manage threat intelligence from the management interface.
139-
- For threat intelligence powered by Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Threat intelligence** > **Intel management**
140-
- For threat intelligence in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Threat intelligence**.
138+
Manually create threat intelligence
141139

142-
Sort, filter, and search your imported threat intelligence without even writing a Log Analytics query.
140+
## View and manage your threat intelligence
141+
142+
View and manage threat intelligence from the management interface. Sort, filter, and search your imported threat intelligence without even writing a Log Analytics query.
143143

144144
:::image type="content" source="media/understand-threat-intelligence/advanced-search.png" alt-text="Screenshot that shows an advanced search interface with source and confidence conditions selected." lightbox="media/understand-threat-intelligence/advanced-search.png":::
145145

146146
Two of the most common threat intelligence tasks are tagging and creating new threat intelligence related to security investigations. Create or edit the threat indicators directly in the management interface.
147147

148148
Tagging threat intelligence is an easy way to group them together to make them easier to find. Typically, you might apply tags related to a particular incident, or if an indicator represents threats from a particular known actor or well-known attack campaign you might create a relationship. After you search for the threat intelligence that you want to work with, tag them individually or multiselect and tag them all at once. Because tagging is free-form, we recommend that you create standard naming conventions for threat intelligence tags.
149149

150-
Validate your indicators and view your successfully imported threat indicators from the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics and workbooks. The tables that support other STIX objects aren't available for public preview yet. For more information about opting into tables supporting STIX objects, check with our customer connection program [http://www.aka.ms/JoinCCP](http://www.aka.ms/JoinCCP).
150+
Validate your indicators and view your successfully imported threat indicators from the Microsoft Sentinel-enabled Log Analytics workspace. The `ThreatIntelligenceIndicator` table under the **Microsoft Sentinel** schema is where all your Microsoft Sentinel threat indicators are stored. This table is the basis for threat intelligence queries performed by other Microsoft Sentinel features, such as analytics and workbooks.
151+
152+
New tables are used to support the new STIX object schema, but aren't available publicly yet. In order to view threat intelligence for STIX objects and unlock the hunting model that uses them, request to opt-in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Either ingest your threat intelligence into only the new tables, `ThreatIntelIndicator` and `ThreatIntelObjects`, or alongside the current table, `ThreatIntelligenceIndicator` with this optional request.
151153

152-
Here's an example view of a basic query for threat indicators.
154+
Here's an example view of a basic query for for just threat indicators using the current table.
153155

154156
:::image type="content" source="media/understand-threat-intelligence/logs-page-ti-table.png" alt-text="Screenshot that shows the Logs page with a sample query of the ThreatIntelligenceIndicator table." lightbox="media/understand-threat-intelligence/logs-page-ti-table.png":::
155157

articles/sentinel/whats-new.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,16 @@ Get notified when this page is updated by copying and pasting the following URL
2323

2424
## January 2025
2525

26+
- [Threat intelligence management interface updated](#threat-intelligence-management-interface-updated)
2627
- [Threat intelligence upload API now supports more STIX objects](#threat-intelligence-upload-api-now-supports-more-stix-objects)
2728
- [Microsoft Defender Threat Intelligence data connectors now generally available (GA)](#microsoft-defender-threat-intelligence-data-connectors-now-generally-available-ga)
2829
- [Bicep template support for repositories (Preview)](#bicep-template-support-for-repositories-preview)
2930
- [View granular solution content in the Microsoft Sentinel content hub](#view-granular-solution-content-in-the-microsoft-sentinel-content-hub)
3031

32+
### Threat intelligence management interface updated
33+
34+
35+
3136
### Threat intelligence upload API now supports more STIX objects
3237

3338
Make the most of your threat intelligence platforms when you connect them to Microsoft Sentinel with the upload API. Now you can ingest more objects than just indicators, reflecting the varied threat intelligence available. The upload API supports the following STIX objects:
@@ -91,7 +96,7 @@ The **Agentless solution** uses the SAP Cloud Connector and SAP Integration Suit
9196
The **Agentless solution** is compatible with SAP S/4HANA Cloud, Private Edition RISE with SAP, SAP S/4HANA on-premises, and SAP ERP Central Component (ECC), ensuring continued functionality of existing security content, including detections, workbooks, and playbooks.
9297

9398
> [!IMPORTANT]
94-
> Microsoft Sentinel's **Agentless solution** is in limited preview as a prereleased product, which may be substantially modified before its commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here. Access to the **Agentless solution** also requires registration and is only available to approved customers and partners during the preview period.
99+
> Microsoft Sentinel's **Agentless solution** is in limited preview as a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here. Access to the **Agentless solution** also requires registration and is only available to approved customers and partners during the preview period.
95100
96101
For more information, see:
97102

@@ -274,7 +279,7 @@ If you've onboarded Microsoft Sentinel to the Microsoft unified security operati
274279

275280
Your premium license for Microsoft Defender Threat Intelligence (MDTI) now unlocks the ability to ingest all premium indicators directly into your workspace. The premium MDTI data connector adds more to your hunting and research capabilities within Microsoft Sentinel.
276281

277-
For more information, see [Understand threat intelligence](understand-threat-intelligence.md#add-threat-indicators-to-microsoft-sentinel-with-the-defender-threat-intelligence-data-connector).
282+
For more information, see [Understand threat intelligence](understand-threat-intelligence.md#add-threat-intelligence-to-microsoft-sentinel-with-the-defender-threat-intelligence-data-connector).
278283

279284
### Unified AMA-based connectors for syslog ingestion
280285

articles/sentinel/work-with-threat-indicators.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,24 +12,24 @@ appliesto:
1212
ms.collection: usx-security
1313

1414

15-
#Customer intent: As a security analyst, I want to use threat intelligence in Microsoft Sentinel so that I can detect and respond to security threats more effectively.
15+
#Customer intent: As a security analyst, I want to use threat intelligence managed by Microsoft Sentinel so that I can detect and respond to security threats more effectively.
1616

1717
---
1818

19-
# Work with threat indicators in Microsoft Sentinel
19+
# Work with threat intelligence in Microsoft Sentinel
2020

21-
Integrate threat intelligence into Microsoft Sentinel through the following activities:
21+
Manage your threat intelligence with the following features:
2222

2323
- **Import threat intelligence** into Microsoft Sentinel by enabling *data connectors* to various threat intelligence [platforms](connect-threat-intelligence-tip.md) and [feeds](connect-threat-intelligence-taxii.md).
24-
- **View and manage** the imported threat intelligence in **Logs** and on the Microsoft Sentinel **Threat intelligence** page.
24+
- **View and manage** the imported threat intelligence in **Logs** and the management interface.
2525
- **Detect threats** and generate security alerts and incidents by using the built-in **Analytics** rule templates based on your imported threat intelligence.
2626
- **Visualize key information** about your imported threat intelligence in Microsoft Sentinel with the **Threat Intelligence workbook**.
2727

2828
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2929

30-
## View your threat indicators in Microsoft Sentinel
30+
## View your threat intelligence in Microsoft Sentinel
3131

32-
Learn how to work with threat intelligence indicators throughout Microsoft Sentinel.
32+
Learn how to work with threat intelligence intelligence throughout Microsoft Sentinel.
3333

3434
### Find and view your indicators on the Threat intelligence page
3535

@@ -43,7 +43,7 @@ To view your threat intelligence indicators on the **Threat intelligence** page:
4343

4444
1. From the grid, select the indicator for which you want to view more information. The indicator's information includes confidence levels, tags, and threat types.
4545

46-
Microsoft Sentinel only displays the most current version of indicators in this view. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-and-manage-your-threat-indicators).
46+
Microsoft Sentinel only displays the most current version of indicators in this view. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-and-manage-your-threat-intelligence).
4747

4848
IP and domain name indicators are enriched with extra `GeoLocation` and `WhoIs` data. This data provides more context for investigations where the selected indicator is found.
4949

@@ -98,7 +98,7 @@ Tagging threat indicators is an easy way to group them together to make them eas
9898

9999
:::image type="content" source="media/work-with-threat-indicators/threat-intel-tagging-indicators.png" alt-text="Screenshot that shows applying tags to threat indicators." lightbox="media/work-with-threat-indicators/threat-intel-tagging-indicators.png":::
100100

101-
With Microsoft Sentinel, you can also edit indicators, whether they were created directly in Microsoft Sentinel or come from partner sources, like TIP and TAXII servers. For indicators created in Microsoft Sentinel, all fields are editable. For indicators that come from partner sources, only specific fields are editable, including tags, **Expiration date**, **Confidence**, and **Revoked**. Either way, only the latest version of the indicator appears on the **Threat Intelligence** page. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-and-manage-your-threat-indicators).
101+
With Microsoft Sentinel, you can also edit indicators, whether they were created directly in Microsoft Sentinel or come from partner sources, like TIP and TAXII servers. For indicators created in Microsoft Sentinel, all fields are editable. For indicators that come from partner sources, only specific fields are editable, including tags, **Expiration date**, **Confidence**, and **Revoked**. Either way, only the latest version of the indicator appears on the **Threat Intelligence** page. For more information on how indicators are updated, see [Understand threat intelligence](understand-threat-intelligence.md#view-and-manage-your-threat-intelligence).
102102

103103
## Gain insights about your threat intelligence with workbooks
104104

@@ -149,7 +149,7 @@ There's also a rich resource for [Azure Monitor workbooks on GitHub](https://git
149149
150150
## Related content
151151
152-
For more about threat intelligence in Microsoft Sentinel, see the following articles:
152+
For more information, see the following articles:
153153
154154
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md).
155155
- Connect Microsoft Sentinel to [STIX/TAXII threat intelligence feeds](./connect-threat-intelligence-taxii.md).

0 commit comments

Comments
 (0)