Skip to content

Commit d3a9a64

Browse files
Merge pull request #50296 from KenMAG/main
Revised and updated the treat intelligence connector module with new units
2 parents d61de11 + 73391d8 commit d3a9a64

25 files changed

+227
-57
lines changed

learn-pr/wwl-sci/.openpublishing.redirection.wwl-sci.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -321,6 +321,31 @@
321321
"source_path_from_root": "/learn-pr/wwl-sci/describe-identity-protection-governance-capabilities/5a-describe-entra-permissions-management.yml",
322322
"redirect_url": "https://learn.microsoft.com/training/paths/describe-capabilities-of-microsoft-identity-access/",
323323
"redirect_document_id": false
324+
},
325+
{
326+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/3-connect-threat-intelligence-taxii-connector.yml",
327+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/4-connect-threat-intelligence-taxii-connector/",
328+
"redirect_document_id": false
329+
},
330+
{
331+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/4-connect-threat-intelligence-platforms-connector.yml",
332+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/5-connect-threat-intelligence-platforms-connector/",
333+
"redirect_document_id": false
334+
},
335+
{
336+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/5-view-your-threat-indicators.yml",
337+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/7-view-your-threat-indicators/",
338+
"redirect_document_id": false
339+
},
340+
{
341+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/6-knowledge-check.yml",
342+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/8-knowledge-check/",
343+
"redirect_document_id": false
344+
},
345+
{
346+
"source_path_from_root": "/learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-summary-resources.yml",
347+
"redirect_url": "https://learn.microsoft.com/training/modules/connect-threat-indicators-to-azure-sentinel/9-summary-resources/",
348+
"redirect_document_id": false
324349
}
325350
]
326351
}

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/1-introduction.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 06/27/2022
8-
author: wwlpublish
7+
ms.date: 05/06/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/2-plan-for-threat-intelligence-connectors.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Plan for threat intelligence connectors
44
metadata:
55
title: Plan for threat intelligence connectors
66
description: "Plan for threat intelligence connectors"
7-
ms.date: 06/27/2022
8-
author: wwlpublish
7+
ms.date: 05/06/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-threat-indicators-to-azure-sentinel.defender-threat-intelligence-connector
3+
title: Connect the Defender Threat Intelligence connector
4+
metadata:
5+
title: Connect the Defender Threat Intelligence connector
6+
description: "Learn how to install, configure, and connect the Microsoft Defender Threat Intelligence (MDTI) connector in Microsoft Sentinel."
7+
ms.date: 05/06/2025
8+
author: KenMAG
9+
ms.author: kelawson
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 10
14+
content: |
15+
[!include[](includes/3-connect-defender-threat-intelligence-connector.md)]
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ title: Connect the threat intelligence TAXII connector
44
metadata:
55
title: Connect the threat intelligence TAXII connector
66
description: "Connect the threat intelligence TAXII connector"
7-
ms.date: 06/27/2022
8-
author: wwlpublish
7+
ms.date: 05/06/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
1212
labModal: false
1313
durationInMinutes: 5
1414
content: |
15-
[!include[](includes/3-connect-threat-intelligence-taxii-connector.md)]
15+
[!include[](includes/4-connect-threat-intelligence-taxii-connector.md)]
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ azureSandbox: false
1212
labModal: false
1313
durationInMinutes: 3
1414
content: |
15-
[!include[](includes/4-connect-threat-intelligence-platforms-connector.md)]
15+
[!include[](includes/5-connect-threat-intelligence-platforms-connector.md)]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.connect-threat-indicators-to-azure-sentinel.intelligence-upload-api-connector
3+
title: Connect the threat intelligence Upload API connector
4+
metadata:
5+
title: Connect the threat intelligence Upload API connector
6+
description: "By using the Threat Intelligence Upload API, your organization can ingest custom threat intelligence data into Microsoft Sentinel."
7+
ms.date: 05/05/2025
8+
author: KenMAG
9+
ms.author: kelawson
10+
ms.topic: unit
11+
azureSandbox: false
12+
labModal: false
13+
durationInMinutes: 1
14+
content: |
15+
[!include[](includes/6-connect-threat-intelligence-upload-api-connector.md)]

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/5-view-your-threat-indicators.yml renamed to learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-view-your-threat-indicators.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
### YamlMime:ModuleUnit
2-
uid: learn.wwl.connect-threat-indicators-to-azure-sentinel.view-your-with-kql
2+
uid: learn.wwl.connect-threat-indicators-to-azure-sentinel.view-your-threat-indicators
3+
34
title: View your threat indicators with KQL
45
metadata:
56
title: View your threat indicators with KQL
@@ -12,4 +13,4 @@ azureSandbox: false
1213
labModal: false
1314
durationInMinutes: 3
1415
content: |
15-
[!include[](includes/5-view-your-threat-indicators.md)]
16+
[!include[](includes/7-view-your-threat-indicators.md)]
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.connect-threat-indicators-to-azure-sentinel.knowledge-check
3+
34
title: Module assessment
45
metadata:
56
title: Module assessment
67
description: "Knowledge check"
7-
ms.date: 06/27/2022
8-
author: wwlpublish
8+
ms.date: 05/06/2025
9+
author: KenMAG
910
ms.author: kelawson
1011
ms.topic: unit
1112
azureSandbox: false
1213
labModal: false
1314
durationInMinutes: 3
1415
content: |
15-
[!include[](includes/6-knowledge-check.md)]
16+
[!include[](includes/8-knowledge-check.md)]
1617
quiz:
1718
title: "Check your knowledge"
1819
questions:
@@ -31,21 +32,21 @@ quiz:
3132
choices:
3233
- content: "1.1"
3334
isCorrect: false
34-
explanation: "Incorrect. TAXII version 2.0 and 2.1 are supported."
35+
explanation: "Incorrect. TAXII version 2.0 and 2.1 are supported."
3536
- content: "1.0"
3637
isCorrect: false
37-
explanation: "Incorrect. TAXII version 2.0 and 2.1 are supported."
38+
explanation: "Incorrect. TAXII version 2.0 and 2.1 are supported."
3839
- content: "2.1"
3940
isCorrect: true
40-
explanation: "Correct. TAXII version 2.0 and 2.1 are supported."
41-
- content: "Threat Intelligence Platform connector uses which technology to send data to Microsoft Sentinel?"
41+
explanation: "Correct. TAXII version 2.0 and 2.1 are supported."
42+
- content: "Threat Intelligence Upload API uses which technology to authenticate with Microsoft Entra ID?"
4243
choices:
43-
- content: "Azure Functions"
44+
- content: "Microsoft Azure managed identities"
4445
isCorrect: false
45-
explanation: "Incorrect. The Microsoft Graph Security API is utilized."
46-
- content: "App Service"
46+
explanation: "Incorrect. OAuth 2.0 authentication is utilized."
47+
- content: "Multifactor authentication"
4748
isCorrect: false
48-
explanation: "Incorrect. The Microsoft Graph Security API is utilized."
49-
- content: "Microsoft Graph Security API"
49+
explanation: "Incorrect. OAuth 2.0 authentication is utilized."
50+
- content: "OAuth 2.0 authentication"
5051
isCorrect: true
51-
explanation: "Correct. The Microsoft Graph Security API is utilized."
52+
explanation: "Correct. OAuth 2.0 authentication is utilized."

learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/7-summary-resources.yml renamed to learn-pr/wwl-sci/connect-threat-indicators-to-azure-sentinel/9-summary-resources.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.connect-threat-indicators-to-azure-sentinel.summary-resources
3+
34
title: Summary and resources
45
metadata:
56
title: Summary and resources
@@ -12,4 +13,4 @@ azureSandbox: false
1213
labModal: false
1314
durationInMinutes: 3
1415
content: |
15-
[!include[](includes/7-summary-resources.md)]
16+
[!include[](includes/9-summary-resources.md)]

0 commit comments

Comments
 (0)