Intel 471 Threat Intelligence
Important
Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Intel 471 delivers relevant and timely insights into the cyber underground.
You can use the Intel 471 Threat Intelligence plugin with Microsoft Copilot for Security to provide:
- Rich context about threats through indicators of compromise to facilitate responding to active threats found in the networks and CTI analysis.
- Relevant and timely intelligence information about the threat actors and adversary scenarios.
- Visibility of potential third-party breaches to improve the risk posture and change the odds of a successful attack.
- Vulnerability intelligence, including the precursors to such activity such as an increase in interest levels amongst threat actors, proof-of-concept (POC) code being developed, traded or sold, and more.
Note
This article contains information about third-party plugins. This is provided to help complete integration scenarios. However, Microsoft does not provide troubleshooting support for third-party plugins. Contact the third-party vendor for support.
Know before you begin
Integration with Copilot for Security requires Intel 471 API credentials, which are available as part of Intel 471's paid subscriptions. For more information, please contact sales@intel471.com. You'll need to take the following steps before using the plugin.
Get your Intel 471 user account and password.
Sign in to Microsoft Copilot for Security.
Access Manage Plugins by selecting the Sources button from the prompt bar.
Next to Intel 471 Threat Intelligence, select Set up.
In the Intel 471 Threat Intelligence settings pane, provide your Intel 471 user account and password.
Save your changes.
Sample Intel 471 Threat Intelligence prompts
After the Intel 471 Threat Intelligence plugin is configured, you can use natural language prompts such as the examples provided in the the following image. You can also choose them from the prompts menu located in the prompt input.
The following table provides examples you can try:
Capability Prompt Suggestion | Example natural language prompt |
---|---|
Malware Intelligence | - Search for Malware Intelligence Indicator with sha256 hash cdf2489960aa1acefedf4f1ab4165365db481591a17e31e7b5fca03cc0ccff0f - Search for reports on operaloader malware family |
Vunerability Intelligence | - Search for vulnerability report on CVE-2023-6553 |
Breach Intelligence | - Find a breach alert for victim TTEC - What is the source of the information for breach of TTEC by actor netsher? |
Adversary Intelligence | - Find information regarding threat actor with handle netnsher. Use Intel 471 plugin |
Provide feedback
To provide feedback, contact Intel 471 Threat Intelligence.