Summary
In this chapter, you learned about the importance of threat intelligence and how it can be used to gain information about current threat actors and their techniques and, in some circumstances, to predict their next steps. You learned why threat intelligence matters and how you can share intelligence for better IR processes. Then, you learned how to leverage threat intelligence from the open source community using free tools as well as commercial tools.
After that, you learned how Microsoft integrates threat intelligence as part of its products and services and how to use Azure Sentinel not only to consume threat intelligence but also to visualize potentially compromised features of your environment based on the threat intelligence acquired. Lastly, you learned about the investigation feature of Azure Sentinel and how this feature can be used by the IR team to find the root cause of a security issue.