Skip to content

Commit e63d3fe

Browse files
add tabbed navigation selection
1 parent bd336d8 commit e63d3fe

File tree

3 files changed

+20
-11
lines changed

3 files changed

+20
-11
lines changed
20.2 KB
Loading
11.5 KB
Loading

articles/sentinel/work-with-threat-indicators.md

Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,20 +13,31 @@ ms.collection: usx-security
1313
#Customer intent: As a security analyst, I want to use threat intelligence managed by Microsoft Sentinel so that I can detect and respond to security threats more effectively.
1414
---
1515

16-
# Work with threat intelligence in Microsoft Sentinel
16+
# Work with Microsoft Sentinel threat intelligence
1717

18-
This article demonstrates how to make the most of threat intelligence (TI) integration in the management interface with these activities:
18+
Accelerate threat detection and remediation with streamlined creation and management of threat intelligence. This article demonstrates how to make the most of threat intelligence integration in the management interface, whether you're accessing it from Microsoft Sentinel in the Azure portal or using Microsoft's unified SecOps platform.
1919

20-
- Create TI in the management interface
21-
- Manage TI by viewing, curating, and visualizing
22-
23-
All of these activities have the same steps except the management interface is accessed differently depending which portal you use.
24-
25-
- For Microsoft Sentinel-powered threat intelligence in the Defender portal, navigate to **Threat intelligence** > **Intel management**.
26-
- For Microsoft Sentinel in the Azure portal, navigate to **Threat management** > **Threat intelligence**.
20+
- Create threat intelligence objects using the standard known as structured threat information expression (STIX)
21+
- Manage threat intelligence by viewing, curating, and visualizing
2722

2823
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2924

25+
## Access the management interface
26+
27+
Use one of the following tabs, depending on whether you're working in the Azure portal or the Defender portal. Even though the management interface is accessed differently depending which portal you use, the creation and management tasks have the same steps.
28+
29+
### [Defender portal](#tab/defender-portal)
30+
31+
For Microsoft Sentinel-powered threat intelligence in the Defender portal, navigate to **Threat intelligence** > **Intel management**.
32+
33+
:::image type="content" source="media/work-with-threat-indicators/intel-management-navigation.png" alt-text="Screenshot showing the intel management menu item in the Defender portal.":::
34+
35+
### [Azure portal](#tab/azure-portal)
36+
37+
For Microsoft Sentinel in the Azure portal, navigate to **Threat management** > **Threat intelligence**.
38+
39+
:::image type="content" source="media/work-with-threat-indicators/threat-intelligence-sentinel.png" alt-text="Screenshot showing threat intelligence menu for Microsoft Sentinel in the Azure portal.":::
40+
3041
## Create threat intelligence in the management interface
3142

3243
Use the management interface to create threat intelligence objects and perform other common threat intelligence tasks such as indicator tagging and establishing connections between objects security investigations.
@@ -94,8 +105,6 @@ To view your threat intelligence indicators in **Logs**:
94105

95106
:::image type="content" source="media/work-with-threat-indicators/ti-table-results.png" alt-text="Screenshot that shows sample ThreatIntelligenceIndicator table results with the details expanded." lightbox="media/work-with-threat-indicators/ti-table-results.png":::
96107

97-
98-
99108
### Tag and edit threat indicators
100109

101110
Tagging threat indicators is an easy way to group them together to make them easier to find. Typically, you might apply tags to an indicator related to a particular incident, or if the indicator represents threats from a particular known actor or well-known attack campaign. After you search for the indicators you want to work with, tag them individually. Multiselect indicators and tag them all at once with one or more tags. Because tagging is free-form, we recommend that you create standard naming conventions for threat indicator tags.

0 commit comments

Comments
 (0)