|
1 | 1 | With the Threat Intelligence area, accessible from the Microsoft Sentinel menu, you can also view, sort, filter, and search your imported threat indicators without even writing a Logs query. This area also allows you to create threat indicators directly within the Microsoft Sentinel interface and perform everyday threat intelligence administrative tasks. These tasks include indicator tagging and creating new indicators related to security investigations. Let's look at two of the most common tasks, creating new threat indicators and tagging indicators for easy grouping and reference.
|
2 | 2 |
|
3 |
| -1. Open the [Azure portal](https://portal.azure.com/?azure-portal=true) and navigate to the Microsoft Sentinel service. |
| 3 | +## [Defender portal](#tab/defender-portal) |
4 | 4 |
|
5 |
| -1. Choose the workspace to which you've imported threat indicators using either threat intelligence data connector. |
| 5 | +1. Open the [Defender portal](https://security.microsoft.com/) and navigate to Microsoft Sentinel. |
6 | 6 |
|
7 |
| -1. Select **Threat intelligence** from the **Threat management** section of the Microsoft Sentinel menu. |
| 7 | +1. From the **Threat management** section of the Microsoft Sentinel menu, select **Threat intelligence**. |
| 8 | + |
| 9 | +1. If you see the *This page has a new home* message. Select the **Open Intel management** button. |
| 10 | + |
| 11 | + :::image type="content" source="../media/threat-intelligence-new-home.png" alt-text="Screenshot of the this page has a new home message for Threat Intelligence in Microsoft Sentinel."::: |
| 12 | + |
| 13 | +1. You're redirected to the *Intel management* page under the *Threat Intelligence* section of the Defender portal navigation menu. |
| 14 | + |
| 15 | + :::image type="content" source="../media/intel-management.png" alt-text="Screenshot of the Defender Intel management page."::: |
| 16 | + |
| 17 | + > [!TIP] |
| 18 | + > As the *Threat intelligence* capabilities in Microsoft Sentinel are being consolidated into the Defender portals *Threat intelligence* section, you can go directly to *Intel management* from there. |
| 19 | +
|
| 20 | +1. On the Select the **Add new** button from the top menu of the page. |
| 21 | + |
| 22 | +1. Choose the indicator type, then complete the required fields marked with a red asterisk (*) on the New indicator panel. Select **Apply**. |
| 23 | + |
| 24 | +## [Azure portal](#tab/azure-portal) |
| 25 | + |
| 26 | +Open the [Azure portal](https://portal.azure.com/?azure-portal=true) and navigate to Microsoft Sentinel. |
| 27 | + |
| 28 | +1. Choose the workspace to which you imported threat indicators using either threat intelligence data connector. |
| 29 | + |
| 30 | +1. From the **Threat management** section of the Microsoft Sentinel menu, select **Threat intelligence**. |
8 | 31 |
|
9 | 32 | 1. Select the **Add new** button from the top menu of the page.
|
10 | 33 |
|
11 |
| -1. Choose the indicator type, then complete the required fields marked with a red asterisk (*) on the New indicator panel. Select **Apply**. |
| 34 | +1. Choose the indicator type, then complete the required fields marked with a red asterisk (*) on the New indicator panel. Select **Apply**. |
12 | 35 |
|
13 |
| -Tagging threat indicators is an easy way to group them to make them easier to find. Typically, you might apply a tag to indicators related to a particular incident or indicators representing threats from a known actor or a well-known attack campaign. You can tag threat indicators individually or multi-select indicators and tag them all at once. Since tagging is free-form, a recommended practice is to create standard naming conventions for threat indicator tags. You can apply multiple tags to each indicator. |
| 36 | +--- |
| 37 | +Tagging threat indicators is an easy way to group them to make them easier to find. Typically, you might apply a tag to indicators related to a particular incident or indicators representing threats from a known actor or a well-known attack campaign. You can tag threat indicators individually or multi-select indicators and tag them all at once. Since tagging is free-form, a recommended practice is to create standard naming conventions for threat indicator tags. You can apply multiple tags to each indicator. |
0 commit comments