Intel 471 Threat Intelligence

Important

Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

Intel 471 delivers relevant and timely insights into the cyber underground.

You can use the Intel 471 Threat Intelligence plugin with Microsoft Copilot for Security to provide:

  • Rich context about threats through indicators of compromise to facilitate responding to active threats found in the networks and CTI analysis.
  • Relevant and timely intelligence information about the threat actors and adversary scenarios.
  • Visibility of potential third-party breaches to improve the risk posture and change the odds of a successful attack.
  • Vulnerability intelligence, including the precursors to such activity such as an increase in interest levels amongst threat actors, proof-of-concept (POC) code being developed, traded or sold, and more.

Note

This article contains information about third-party plugins. This is provided to help complete integration scenarios. However, Microsoft does not provide troubleshooting support for third-party plugins. Contact the third-party vendor for support.

Know before you begin

Integration with Copilot for Security requires Intel 471 API credentials, which are available as part of Intel 471's paid subscriptions. For more information, please contact sales@intel471.com. You'll need to take the following steps before using the plugin.

  1. Get your Intel 471 user account and password.

  2. Sign in to Microsoft Copilot for Security.

  3. Access Manage Plugins by selecting the Sources button from the prompt bar.

  4. Next to Intel 471 Threat Intelligence, select Set up.

    Screenshot showing the Intel 471 plugin.

  5. In the Intel 471 Threat Intelligence settings pane, provide your Intel 471 user account and password.

  6. Save your changes.

Sample Intel 471 Threat Intelligence prompts

After the Intel 471 Threat Intelligence plugin is configured, you can use natural language prompts such as the examples provided in the the following image. You can also choose them from the prompts menu located in the prompt input.

Screenshot showing the Intel 471 plugin example uses.

The following table provides examples you can try:

Capability Prompt Suggestion Example natural language prompt
Malware Intelligence - Search for Malware Intelligence Indicator with sha256 hash cdf2489960aa1acefedf4f1ab4165365db481591a17e31e7b5fca03cc0ccff0f

- Search for reports on operaloader malware family
Vunerability Intelligence - Search for vulnerability report on CVE-2023-6553
Breach Intelligence - Find a breach alert for victim TTEC

- What is the source of the information for breach of TTEC by actor netsher?
Adversary Intelligence - Find information regarding threat actor with handle netnsher. Use Intel 471 plugin

Provide feedback

To provide feedback, contact Intel 471 Threat Intelligence.

See also

Other plugins for Microsoft Copilot for Security

Manage plugins in Microsoft Copilot for Security