Choosing the right intel feeds for your needs
With Microsoft Sentinel, you can import TI from multiple sources to improve the ability of a security analyst to identify and prioritize known threats and IoCs. When configured, several optional features become available within the following Microsoft Sentinel tools:
- Analytics: Provides the ability to include the
ThreatIntelligenceIndicator
field to ensure the analytics rule can match log events to identified domains, email accounts, file hashes, IP addresses, or URLs. - Workbooks: There is a new workbook created to show the volume, type, and confidence level of the TI that is ingested into Microsoft Sentinel and how many alerts were generated from analytics rules that match your threat indicators.
- Hunting: Like analytics rules, enabling TI provides the hunting queries the capability of comparing log events to TI information, allowing security investigators greater ability in their hunting scenarios.
- Notebooks: Notebooks...