Skip to content

Commit 53bd213

Browse files
committed
removed EOL note
1 parent 5b4b8b1 commit 53bd213

14 files changed

+14
-58
lines changed

defender/threat-intelligence/analyst-insights.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: overview
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -15,9 +15,6 @@ ms.custom:
1515

1616
# Analyst insights
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
2118
In Microsoft Defender Threat Intelligence (Defender TI), the **Analyst insights** section provides you with quick insights about an artifact that might help determine your next step in an investigation. This section lists any insights that apply to the artifact, and insights that don't apply for extra visibility.
2219

2320
In the following example, you can quickly determine that the IP address is routable, hosts a web server, and had an open port within the past five days. Furthermore, the system displays rules that weren't triggered, which can be equally helpful when kick starting an investigation.

defender/threat-intelligence/data-sets.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: conceptual
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-concept
1212
- cx-ti
@@ -15,9 +15,6 @@ ms.custom:
1515

1616
# Data sets
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
2118
Microsoft centralizes numerous data sets into Microsoft Defender Threat Intelligence (Defender TI), making it easier for Microsoft's customers and community to conduct infrastructure analysis. Microsoft's primary focus is to provide as much data as possible about internet infrastructure to support various security use cases.
2219

2320
Microsoft collects, analyzes, and indexes internet data to help you:

defender/threat-intelligence/gathering-threat-intelligence-and-infrastructure-chaining.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: tutorial
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -16,10 +16,6 @@ ms.custom:
1616

1717
# Tutorial: Gathering threat intelligence and infrastructure chaining
1818

19-
>[!IMPORTANT]
20-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
21-
22-
2319
This tutorial walks you through how to perform several types of indicator searches and gather threat and adversary intelligence using Microsoft Defender Threat Intelligence (Defender TI) in the Microsoft Defender portal.
2420

2521
## Prerequisites

defender/threat-intelligence/gathering-vulnerability-intelligence.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: tutorial
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -15,10 +15,6 @@ ms.custom:
1515

1616
# Tutorial: Gathering vulnerability intelligence
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
21-
2218
This tutorial walks you through how to perform several types of indicator searches to gather vulnerability intelligence using Microsoft Defender Threat Intelligence (Defender TI) in the Microsoft Defender portal.
2319

2420
## Prerequisites

defender/threat-intelligence/infrastructure-chaining.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: conceptual
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -15,9 +15,6 @@ ms.custom:
1515

1616
# Infrastructure chaining
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
2118
Infrastructure chaining uses the relationships between highly connected datasets to build out an investigation. This process is the core of threat infrastructure analysis and allows organizations to surface new connections, group similar attack activity and substantiate assumptions during incident response.
2219

2320
![Infrastructure chaining](media/infrastructureChaining.png)

defender/threat-intelligence/learn-how-to-access-microsoft-defender-threat-intelligence-and-make-customizations-in-your-portal.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: quickstart
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -16,9 +16,6 @@ ms.collection: essentials-get-started
1616

1717
# Quickstart: Learn how to access Microsoft Defender Threat Intelligence and make customizations
1818

19-
>[!IMPORTANT]
20-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
21-
2219
This guide walks you through how to access Microsoft Threat Intelligence (Defender TI) from the Microsoft Defender portal, adjust the portal's theme to make it easier on your eyes when using it, and find sources for enrichment so you can see more results when gathering threat intelligence.
2320

2421
:::image type="content" source="/defender/threat-intelligence/media/quickstart-intel-explorer.png" alt-text="Screenshot of the Microsoft Defender Threat Intelligence Intel explorer in the Microsoft Defender portal." lightbox="/defender/threat-intelligence/media/quickstart-intel-explorer.png":::

defender/threat-intelligence/reputation-scoring.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: overview
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -15,9 +15,6 @@ ms.custom:
1515

1616
# Reputation scoring
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
2118
Microsoft Defender Threat Intelligence (Defender TI) provides proprietary reputation scores for any host, domain, or IP address. Whether validating the reputation of a known or unknown entity, this score helps you quickly understand any detected ties to malicious or suspicious infrastructure. Defender TI provides quick information about the activity of these entities (for example, first- and last-seen timestamps, autonomous system numbers, and associated infrastructure) and a list of rules that affect the reputation score when applicable.
2219

2320
Reputation data is important to understanding the trustworthiness of your own attack surface and is also useful when assessing unknown hosts, domains, or IP addresses that appear in investigations. These scores uncover any prior malicious or suspicious activity that affected the entity, or other known indicators of compromise (IOCs) that should be considered.

defender/threat-intelligence/searching-and-pivoting.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: how-to
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -15,9 +15,6 @@ ms.custom:
1515

1616
# Searching and pivoting
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
2118
Microsoft Defender Threat Intelligence (Defender TI) offers a robust and flexible search engine to streamline the investigation process. Defender TI is designed to let you pivot across various indicators from different data sources, making it easier than ever to discover relationships between disparate infrastructure.
2219

2320
This article helps you understand how to conduct a search and pivot across different data sets to discover relationships between different artifacts.

defender/threat-intelligence/security-copilot-and-defender-threat-intelligence.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,11 @@ ms.custom:
1616
- cx-ti
1717
- cx-mdti
1818
ms.topic: conceptual
19-
ms.date: 12/04/2024
19+
ms.date: 01/15/2025
2020
---
2121

2222
# Microsoft Security Copilot in Microsoft Defender Threat Intelligence
2323

24-
>[!IMPORTANT]
25-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
26-
2724
Microsoft Security Copilot is a cloud-based AI platform that provides natural language copilot experience. It can help support security professionals in different scenarios, like incident response, threat hunting, and intelligence gathering. For more information about what it can do, read [What is Microsoft Security Copilot?](/copilot/security/microsoft-security-copilot).
2825

2926
Security Copilot customers gain for each of their authenticated Copilot users access to Microsoft Defender Threat Intelligence (Defender TI). To ensure that you have access to Copilot, see the [Security Copilot purchase and licensing information](/copilot/security/faq-security-copilot).

defender/threat-intelligence/sorting-filtering-and-downloading-data.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: aroland
66
manager: dolmont
77
ms.service: threat-intelligence
88
ms.topic: how-to
9-
ms.date: 11/18/2024
9+
ms.date: 01/15/2025
1010
ms.custom:
1111
- template-overview
1212
- cx-ti
@@ -15,9 +15,6 @@ ms.custom:
1515

1616
# Sorting, filtering, and downloading data
1717

18-
>[!IMPORTANT]
19-
> On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (`https://ti.defender.microsoft.com`) was retired and is no longer accessible. Customers can continue using Defender TI in the [Microsoft Defender portal](https://aka.ms/mdti-intel-explorer) or with [Microsoft Security Copilot](security-copilot-and-defender-threat-intelligence.md). [Learn more](https://aka.ms/mdti-standaloneportal)
20-
2118
Microsoft Defender Threat Intelligence (Defender TI) lets you access our vast collection of crawling data in an indexed and pivot table format. These data sets can be large, returning expansive amounts of historic and recent data. By letting you appropriately sort and filter the data, we help you surface the connections of interest easily.
2219

2320
In this how-to article, you learn how to sort and filter data for the following data sets:

0 commit comments

Comments
 (0)