Skip to content

Commit 0fc35ea

Browse files
authored
Merge pull request #50328 from KenMAG/main
Removed obsolete unit and updated the view threat intelligence unit
2 parents 9d224af + 80ed3b8 commit 0fc35ea

13 files changed

+44
-57
lines changed

learn-pr/wwl-sci/.openpublishing.redirection.wwl-sci.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,31 @@
342342
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/8-knowledge-check/",
343343
"redirect_document_id": false
344344
},
345+
{
346+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/5-connect-threat-intelligence-platforms-connector.yml",
347+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/5-connect-threat-intelligence-upload-api-connector/",
348+
"redirect_document_id": false
349+
},
350+
{
351+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/6-connect-threat-intelligence-upload-api-connector.yml",
352+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/5-connect-threat-intelligence-upload-api-connector/",
353+
"redirect_document_id": false
354+
},
355+
{
356+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-view-your-threat-indicators.yml",
357+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/6-view-your-threat-indicators/",
358+
"redirect_document_id": false
359+
},
360+
{
361+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/8-knowledge-check.yml",
362+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/7-knowledge-check/",
363+
"redirect_document_id": false
364+
},
365+
{
366+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/9-summary-resources.yml",
367+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/8-summary-resources/",
368+
"redirect_document_id": false
369+
},
345370
{
346371
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-summary-resources.yml",
347372
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/9-summary-resources/",

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/5-connect-threat-intelligence-platforms-connector.yml

Lines changed: 0 additions & 15 deletions
This file was deleted.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ azureSandbox: false
1212
labModal: false
1313
durationInMinutes: 1
1414
content: |
15-
[!include[](includes/6-connect-threat-intelligence-upload-api-connector.md)]
15+
[!include[](includes/5-connect-threat-intelligence-upload-api-connector.md)]

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-view-your-threat-indicators.yml renamed to learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/6-view-your-threat-indicators.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ title: View your threat indicators with KQL
55
metadata:
66
title: View your threat indicators with KQL
77
description: "View your threat indicators with KQL"
8-
ms.date: 06/27/2022
9-
author: wwlpublish
8+
ms.date: 05/07/2025
9+
author: KenMAG
1010
ms.author: kelawson
1111
ms.topic: unit
1212
azureSandbox: false
1313
labModal: false
14-
durationInMinutes: 3
14+
durationInMinutes: 5
1515
content: |
16-
[!include[](includes/7-view-your-threat-indicators.md)]
16+
[!include[](includes/6-view-your-threat-indicators.md)]

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/8-knowledge-check.yml renamed to learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-knowledge-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ azureSandbox: false
1313
labModal: false
1414
durationInMinutes: 3
1515
content: |
16-
[!include[](includes/8-knowledge-check.md)]
16+
[!include[](includes/7-knowledge-check.md)]
1717
quiz:
1818
title: "Check your knowledge"
1919
questions:

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/9-summary-resources.yml renamed to learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/8-summary-resources.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ azureSandbox: false
1313
labModal: false
1414
durationInMinutes: 3
1515
content: |
16-
[!include[](includes/9-summary-resources.md)]
16+
[!include[](includes/8-summary-resources.md)]

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/includes/5-connect-threat-intelligence-platforms-connector.md

Lines changed: 0 additions & 25 deletions
This file was deleted.
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
The indicators reside in the ThreatIntelligenceIndicator table. This table is the basis for queries performed by other Microsoft Sentinel features such as Analytics and Workbooks. Here's how to find and view your threat indicators in the ThreatIntelligenceIndicator table.
2+
3+
To view your threat indicators with KQL. Select Logs from the General section of the Microsoft Sentinel menu. Then run a query on the ThreatIntelligenceIndicator.
4+
5+
```kusto
6+
`ThreatIntelligenceIndicator`
7+
8+
```
9+
10+
> [!IMPORTANT]
11+
> On April 3, 2025, we publicly previewed two new tables to support STIX indicator and object schemas: `ThreatIntelIndicators` and `ThreatIntelObjects`. Microsoft Sentinel will ingest all threat intelligence into these new tables, while continuing to ingest the same data into the legacy `ThreatIntelligenceIndicator` table until July 31, 2025.
12+
> **Be sure to update your custom queries, analytics and detection rules, workbooks, and automation to use the new tables by July 31, 2025.** After this date, Microsoft Sentinel will stop ingesting data to the legacy `ThreatIntelligenceIndicator` table. We're updating all out-of-the-box threat intelligence solutions in Content hub to leverage the new tables. For more information about the new table schemas, see [ThreatIntelIndicators](/azure/azure-monitor/reference/tables/threatintelindicators) and [ThreatIntelObjects](/azure/azure-monitor/reference/tables/threatintelobjects).

0 commit comments

Comments
 (0)