Skip to content

Commit e6ab412

Browse files
Merge pull request #50322 from KenMAG/main
Updated the SC-200 Threat intelligence module and improved Acrolinx scores
2 parents 7f18eb5 + 6c0c165 commit e6ab412

File tree

8 files changed

+46
-19
lines changed

8 files changed

+46
-19
lines changed

learn-pr/wwl-sci/utilize-threat-intelligence-azure-sentinel/3-manage-threat-indicators.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ title: Manage your threat indicators
44
metadata:
55
title: Manage your threat indicators
66
description: "Manage your threat indicators"
7-
ms.date: 06/21/2022
8-
author: wwlpublish
9-
ms.author: bneeb
7+
ms.date: 05/07/2025
8+
author: KenMAG
9+
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
1212
labModal: false

learn-pr/wwl-sci/utilize-threat-intelligence-azure-sentinel/4-view-threat-indicators-with-kql.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ title: View your threat indicators with KQL
44
metadata:
55
title: View your threat indicators with KQL
66
description: "View your threat indicators with KQL"
7-
ms.date: 06/21/2022
8-
author: wwlpublish
9-
ms.author: bneeb
7+
ms.date: 05/07/2025
8+
author: KenMAG
9+
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
1212
labModal: false

learn-pr/wwl-sci/utilize-threat-intelligence-azure-sentinel/includes/2-define-threat-intelligence.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,3 @@ You can integrate threat intelligence (TI) into Microsoft Sentinel through the f
1515
- Perform threat hunting with your imported threat intelligence.
1616

1717
:::image type="content" source="../media/sentinel-data-flow.png" alt-text="Screenshot of Threat Intelligence uses in Microsoft Sentinel.":::
18-
Lines changed: 29 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,37 @@
11
With the Threat Intelligence area, accessible from the Microsoft Sentinel menu, you can also view, sort, filter, and search your imported threat indicators without even writing a Logs query. This area also allows you to create threat indicators directly within the Microsoft Sentinel interface and perform everyday threat intelligence administrative tasks. These tasks include indicator tagging and creating new indicators related to security investigations. Let's look at two of the most common tasks, creating new threat indicators and tagging indicators for easy grouping and reference.
22

3-
1. Open the [Azure portal](https://portal.azure.com/?azure-portal=true) and navigate to the Microsoft Sentinel service.
3+
## [Defender portal](#tab/defender-portal)
44

5-
1. Choose the workspace to which you've imported threat indicators using either threat intelligence data connector.
5+
1. Open the [Defender portal](https://security.microsoft.com/) and navigate to Microsoft Sentinel.
66

7-
1. Select **Threat intelligence** from the **Threat management** section of the Microsoft Sentinel menu.
7+
1. From the **Threat management** section of the Microsoft Sentinel menu, select **Threat intelligence**.
8+
9+
1. If you see the *This page has a new home* message. Select the **Open Intel management** button.
10+
11+
:::image type="content" source="../media/threat-intelligence-new-home.png" alt-text="Screenshot of the this page has a new home message for Threat Intelligence in Microsoft Sentinel.":::
12+
13+
1. You're redirected to the *Intel management* page under the *Threat Intelligence* section of the Defender portal navigation menu.
14+
15+
:::image type="content" source="../media/intel-management.png" alt-text="Screenshot of the Defender Intel management page.":::
16+
17+
> [!TIP]
18+
> As the *Threat intelligence* capabilities in Microsoft Sentinel are being consolidated into the Defender portals *Threat intelligence* section, you can go directly to *Intel management* from there.
19+
20+
1. On the Select the **Add new** button from the top menu of the page.
21+
22+
1. Choose the indicator type, then complete the required fields marked with a red asterisk (*) on the New indicator panel. Select **Apply**.
23+
24+
## [Azure portal](#tab/azure-portal)
25+
26+
Open the [Azure portal](https://portal.azure.com/?azure-portal=true) and navigate to Microsoft Sentinel.
27+
28+
1. Choose the workspace to which you imported threat indicators using either threat intelligence data connector.
29+
30+
1. From the **Threat management** section of the Microsoft Sentinel menu, select **Threat intelligence**.
831

932
1. Select the **Add new** button from the top menu of the page.
1033

11-
1. Choose the indicator type, then complete the required fields marked with a red asterisk (*) on the New indicator panel. Select **Apply**.
34+
1. Choose the indicator type, then complete the required fields marked with a red asterisk (*) on the New indicator panel. Select **Apply**.
1235

13-
Tagging threat indicators is an easy way to group them to make them easier to find. Typically, you might apply a tag to indicators related to a particular incident or indicators representing threats from a known actor or a well-known attack campaign. You can tag threat indicators individually or multi-select indicators and tag them all at once. Since tagging is free-form, a recommended practice is to create standard naming conventions for threat indicator tags. You can apply multiple tags to each indicator.
36+
---
37+
Tagging threat indicators is an easy way to group them to make them easier to find. Typically, you might apply a tag to indicators related to a particular incident or indicators representing threats from a known actor or a well-known attack campaign. You can tag threat indicators individually or multi-select indicators and tag them all at once. Since tagging is free-form, a recommended practice is to create standard naming conventions for threat indicator tags. You can apply multiple tags to each indicator.
Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
1-
The indicators reside in the *ThreatIntelligenceIndicator* table. This table is the basis for queries performed by other Microsoft Sentinel features such as Analytics and Workbooks. Here's how to find and view your threat indicators in the ThreatIntelligenceIndicator table.
1+
The indicators reside in the *ThreatIntelligenceIndicator* table. This table is the basis for queries performed by other Microsoft Sentinel features such as Analytics and Workbooks. Here's how to find and view your threat indicators in the ThreatIntelligenceIndicator table.
22

3-
To view your threat indicators with KQL. Select **Logs** from the General section of the Microsoft Sentinel menu. Then run a query on the ThreatIntelligenceIndicator table.
3+
To view your threat indicators with KQL. Select **Logs** from the General section of the Microsoft Sentinel menu. Then run a query on the ThreatIntelligenceIndicator table.
44

55
```kusto
6-
ThreatIntelligenceIndicator
6+
`ThreatIntelligenceIndicator`
77
88
```
99

10+
> [!IMPORTANT]
11+
> On April 3, 2025, we publicly previewed two new tables to support STIX indicator and object schemas: `ThreatIntelIndicators` and `ThreatIntelObjects`. Microsoft Sentinel will ingest all threat intelligence into these new tables, while continuing to ingest the same data into the legacy `ThreatIntelligenceIndicator` table until July 31, 2025.
12+
> **Be sure to update your custom queries, analytics and detection rules, workbooks, and automation to use the new tables by July 31, 2025.** After this date, Microsoft Sentinel will stop ingesting data to the legacy `ThreatIntelligenceIndicator` table. We're updating all out-of-the-box threat intelligence solutions in Content hub to leverage the new tables. For more information about the new table schemas, see [ThreatIntelIndicators](/azure/azure-monitor/reference/tables/threatintelindicators) and [ThreatIntelObjects](/azure/azure-monitor/reference/tables/threatintelobjects).

learn-pr/wwl-sci/utilize-threat-intelligence-azure-sentinel/index.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,17 @@ uid: learn.wwl.utilize-threat-intelligence-azure-sentinel
33
metadata:
44
title: Utilize threat intelligence in Microsoft Sentinel
55
description: "Utilize threat intelligence in Microsoft Sentinel"
6-
ms.date: 06/21/2022
7-
author: wwlpublish
6+
ms.date: 05/07/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Utilize threat intelligence in Microsoft Sentinel
1212
summary: Learn how the Microsoft Sentinel Threat Intelligence page enables you to manage threat indicators.
1313
abstract: |
14-
Upon completion of this module, the learner will be able to:
14+
Upon completion of this module, the learner is able to:
1515
- Manage threat indicators in Microsoft Sentinel
16+
- Manage threat indicators in Microsoft Defender
1617
- Use KQL to access threat indicators in Microsoft Sentinel
1718
prerequisites: |
1819
Basic knowledge of security operational concepts such as monitoring, logging, and alerting.
@@ -22,7 +23,7 @@ levels:
2223
roles:
2324
- security-operations-analyst
2425
products:
25-
- azure
26+
- microsoft-defender
2627
- microsoft-sentinel
2728
subjects:
2829
- cloud-security
349 KB
Loading
103 KB
Loading

0 commit comments

Comments
 (0)