You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-threat-indicators.md
+20-11Lines changed: 20 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,20 +13,31 @@ ms.collection: usx-security
13
13
#Customer intent: As a security analyst, I want to use threat intelligence managed by Microsoft Sentinel so that I can detect and respond to security threats more effectively.
14
14
---
15
15
16
-
# Work with threat intelligence in Microsoft Sentinel
16
+
# Work with Microsoft Sentinel threat intelligence
17
17
18
-
This article demonstrates how to make the most of threat intelligence (TI) integration in the management interface with these activities:
18
+
Accelerate threat detection and remediation with streamlined creation and management of threat intelligence. This article demonstrates how to make the most of threat intelligence integration in the management interface, whether you're accessing it from Microsoft Sentinel in the Azure portal or using Microsoft's unified SecOps platform.
19
19
20
-
- Create TI in the management interface
21
-
- Manage TI by viewing, curating, and visualizing
22
-
23
-
All of these activities have the same steps except the management interface is accessed differently depending which portal you use.
24
-
25
-
- For Microsoft Sentinel-powered threat intelligence in the Defender portal, navigate to **Threat intelligence** > **Intel management**.
26
-
- For Microsoft Sentinel in the Azure portal, navigate to **Threat management** > **Threat intelligence**.
20
+
- Create threat intelligence objects using the standard known as structured threat information expression (STIX)
21
+
- Manage threat intelligence by viewing, curating, and visualizing
Use one of the following tabs, depending on whether you're working in the Azure portal or the Defender portal. Even though the management interface is accessed differently depending which portal you use, the creation and management tasks have the same steps.
28
+
29
+
### [Defender portal](#tab/defender-portal)
30
+
31
+
For Microsoft Sentinel-powered threat intelligence in the Defender portal, navigate to **Threat intelligence** > **Intel management**.
32
+
33
+
:::image type="content" source="media/work-with-threat-indicators/intel-management-navigation.png" alt-text="Screenshot showing the intel management menu item in the Defender portal.":::
34
+
35
+
### [Azure portal](#tab/azure-portal)
36
+
37
+
For Microsoft Sentinel in the Azure portal, navigate to **Threat management** > **Threat intelligence**.
38
+
39
+
:::image type="content" source="media/work-with-threat-indicators/threat-intelligence-sentinel.png" alt-text="Screenshot showing threat intelligence menu for Microsoft Sentinel in the Azure portal.":::
40
+
30
41
## Create threat intelligence in the management interface
31
42
32
43
Use the management interface to create threat intelligence objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects security investigations.
@@ -94,8 +105,6 @@ To view your threat intelligence indicators in **Logs**:
94
105
95
106
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
96
107
97
-
98
-
99
108
### Tag and edit threat indicators
100
109
101
110
Tagging threat indicators is an easy way to group them together to make them easier to find. Typically, you might apply tags to an indicator related to a particular incident, or if the indicator represents threats from a particular known actor or well-known attack campaign. After you search for the indicators you want to work with, tag them individually. Multiselect indicators and tag them all at once with one or more tags. Because tagging is free-form, we recommend that you create standard naming conventions for threat indicator tags.
0 commit comments