Skip to content

Commit 046de12

Browse files
authored
Merge pull request #180181 from batamig/service-rename
fixing filenames and updating xrefs
2 parents d88e883 + 4721ab3 commit 046de12

30 files changed

+62
-42
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46326,6 +46326,26 @@
4632646326
"redirect_url": "/azure/sentinel/monitor-your-data",
4632746327
"redirect_document_id": false
4632846328
},
46329+
{
46330+
"source_path": "articles/sentinel/connect-azure-security-center.md",
46331+
"redirect_url": "/azure/sentinel/connect-defender-for-cloud",
46332+
"redirect_document_id": false
46333+
},
46334+
{
46335+
"source_path": "articles/sentinel/entities-in-azure-sentinel.md",
46336+
"redirect_url": "/azure/sentinel/entities",
46337+
"redirect_document_id": false
46338+
},
46339+
{
46340+
"source_path": "articles/sentinel/azure-sentinel-billing.md",
46341+
"redirect_url": "/azure/sentinel/billing",
46342+
"redirect_document_id": false
46343+
},
46344+
{
46345+
"source_path": "articles/sentinel/automation-in-azure-sentinel.md",
46346+
"redirect_url": "/azure/sentinel/automation",
46347+
"redirect_document_id": false
46348+
},
4632946349
{
4633046350
"source_path": "articles/virtual-desktop/connect-android.md",
4633146351
"redirect_url": "/azure/virtual-desktop/user-documentation/connect-android",

articles/sentinel/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
- name: Roles and permissions
4343
href: roles.md
4444
- name: Costs and billing
45-
href: azure-sentinel-billing.md
45+
href: billing.md
4646
- name: Extend Microsoft Sentinel across workspaces and tenants
4747
href: extend-sentinel-across-workspaces-tenants.md
4848
- name: Security baseline
@@ -68,7 +68,7 @@
6868
- name: ASIM content
6969
href: normalization-content.md
7070
- name: Classifying data with entities
71-
href: entities-in-azure-sentinel.md
71+
href: entities.md
7272
- name: Threat intelligence
7373
items:
7474
- name: Understand threat intelligence in Microsoft Sentinel
@@ -92,7 +92,7 @@
9292
- name: SOAR
9393
items:
9494
- name: Orchestration, automation, and response
95-
href: automation-in-azure-sentinel.md
95+
href: automation.md
9696
- name: Automation rules
9797
href: automate-incident-handling-with-automation-rules.md
9898
- name: Playbooks
@@ -110,7 +110,7 @@
110110
- name: Sample workspace designs
111111
href: sample-workspace-designs.md
112112
- name: Plan and manage costs
113-
href: azure-sentinel-billing.md
113+
href: billing.md
114114
- name: Manage workspace access
115115
href: resource-context-rbac.md
116116
- name: Migrate to Microsoft Sentinel
@@ -133,7 +133,7 @@
133133
- name: Azure Active Directory
134134
href: connect-azure-active-directory.md
135135
- name: Microsoft Defender for Cloud
136-
href: connect-azure-security-center.md
136+
href: connect-defender-for-cloud.md
137137
- name: Microsoft 365 Defender
138138
href: connect-microsoft-365-defender.md
139139
- name: Windows security events
File renamed without changes.

articles/sentinel/best-practices-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This section reviews best practices for collecting data using Microsoft Sentinel
1717

1818
## Prioritize your data connectors
1919

20-
If it's unclear to you which data connectors will best serve your environment, start by enabling all [free data connectors](azure-sentinel-billing.md#free-data-sources).
20+
If it's unclear to you which data connectors will best serve your environment, start by enabling all [free data connectors](billing.md#free-data-sources).
2121

2222
The free data connectors will start showing value from Microsoft Sentinel as soon as possible, while you continue to plan other data connectors and budgets.
2323

@@ -40,7 +40,7 @@ Filter your logs using one of the following methods:
4040
- **Logstash**. Supports filtering message content, including making changes to the log messages. For more information, see [Connect with Logstash](create-custom-connector.md#connect-with-logstash).
4141

4242
> [!IMPORTANT]
43-
> Using Logstash to filter your message content will cause your logs to be ingested as custom logs, causing any [free-tier logs](azure-sentinel-billing.md#free-data-sources) to become paid-tier logs.
43+
> Using Logstash to filter your message content will cause your logs to be ingested as custom logs, causing any [free-tier logs](billing.md#free-data-sources) to become paid-tier logs.
4444
>
4545
> Custom logs also need to be worked into [analytics rules](automate-incident-handling-with-automation-rules.md), [threat hunting](hunting.md), and [workbooks](get-visibility.md), as they aren't automatically added. Custom logs are also not currently supported for [Machine Learning](bring-your-own-ml.md) capabilities.
4646
>

articles/sentinel/best-practices-workspace-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ While fewer workspaces are simpler to manage, you may have specific needs for mu
3232
When determining how many tenants and workspaces to use, consider that most Microsoft Sentinel features operate by using a single workspace or Microsoft Sentinel instance, and Microsoft Sentinel ingests all logs housed within the workspace.
3333

3434
> [!IMPORTANT]
35-
> Costs are one of the main considerations when determining Microsoft Sentinel architecture. For more information, see [Microsoft Sentinel costs and billing](azure-sentinel-billing.md).
35+
> Costs are one of the main considerations when determining Microsoft Sentinel architecture. For more information, see [Microsoft Sentinel costs and billing](billing.md).
3636
>
3737
### Working with multiple tenants
3838

articles/sentinel/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The Microsoft Sentinel documentation has best practice guidance scattered throug
3131
- [Design your Microsoft Sentinel workspace architecture](design-your-workspace-architecture.md)
3232
- [Microsoft Sentinel sample workspace designs](sample-workspace-designs.md)
3333
- [Data collection best practices](best-practices-data.md)
34-
- [Microsoft Sentinel costs and billing](azure-sentinel-billing.md)
34+
- [Microsoft Sentinel costs and billing](billing.md)
3535
- [Permissions in Microsoft Sentinel](roles.md)
3636
- [Protecting MSSP intellectual property in Microsoft Sentinel](mssp-protect-intellectual-property.md)
3737
- [Threat intelligence integration in Microsoft Sentinel](threat-intelligence-integration.md)

articles/sentinel/azure-sentinel-billing.md renamed to articles/sentinel/billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Try Microsoft Sentinel free for the first 31 days. Microsoft Sentinel can be ena
129129

130130
Only the Microsoft Sentinel charges are waived during the 31-day trial period.
131131

132-
Usage beyond these limits will be charged per the pricing listed on the [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel) page. Charges related to extra capabilities for [automation](automation-in-azure-sentinel.md) and [bring your own machine learning](bring-your-own-ml.md) are still applicable during the free trial.
132+
Usage beyond these limits will be charged per the pricing listed on the [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel) page. Charges related to extra capabilities for [automation](automation.md) and [bring your own machine learning](bring-your-own-ml.md) are still applicable during the free trial.
133133

134134
> [!TIP]
135135
> During your free trial, find resources for cost management, training, and more on the **News & guides > Free trial** tab in Microsoft Sentinel.

articles/sentinel/bookmarks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Now you can identify and address gaps in MITRE ATT&CK technique coverage, across
2626
>
2727
> The mapping of MITRE ATT&CK techniques to bookmarks is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2828
29-
You can also investigate more types of entities while hunting with bookmarks, by mapping the full set of entity types and identifiers supported by Microsoft Sentinel Analytics in your custom queries. This enables you to use bookmarks to explore the entities returned in hunting query results using [entity pages](entities-in-azure-sentinel.md#entity-pages), [incidents](investigate-cases.md) and the [investigation graph](investigate-cases.md#use-the-investigation-graph-to-deep-dive). If a bookmark captures results from a hunting query, it automatically inherits the query's MITRE ATT&CK technique and entity mappings.
29+
You can also investigate more types of entities while hunting with bookmarks, by mapping the full set of entity types and identifiers supported by Microsoft Sentinel Analytics in your custom queries. This enables you to use bookmarks to explore the entities returned in hunting query results using [entity pages](entities.md#entity-pages), [incidents](investigate-cases.md) and the [investigation graph](investigate-cases.md#use-the-investigation-graph-to-deep-dive). If a bookmark captures results from a hunting query, it automatically inherits the query's MITRE ATT&CK technique and entity mappings.
3030

3131
> [!IMPORTANT]
3232
>

articles/sentinel/connect-azure-windows-microsoft-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This article presents information that is common to groups of connectors. See th
2828
The following integrations are both more unique and more popular, and are treated individually, with their own articles:
2929

3030
- [Microsoft 365 Defender](connect-microsoft-365-defender.md)
31-
- [Microsoft Defender for Cloud](connect-azure-security-center.md)
31+
- [Microsoft Defender for Cloud](connect-defender-for-cloud.md)
3232
- [Azure Active Directory](connect-azure-active-directory.md)
3333
- [Windows Security Events](connect-windows-security-events.md)
3434
- [Amazon Web Services (AWS) CloudTrail](connect-aws.md)

articles/sentinel/connect-azure-security-center.md renamed to articles/sentinel/connect-defender-for-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ As Defender for Cloud itself is enabled per subscription, the Defender for Cloud
6464
6565
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector). The value for each subscription in this column will either be blank (meaning no Defender plans are enabled), "All enabled," or "Some enabled." Those that say "Some enabled" will also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable. The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether.
6666

67-
:::image type="content" source="./media/connect-azure-security-center/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration":::
67+
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration":::
6868

6969
1. You can select whether you want the alerts from Microsoft Defender for Cloud to automatically generate incidents in Microsoft Sentinel. Under **Create incidents**, select **Enabled** to turn on the default analytics rule that automatically [creates incidents from alerts](create-incidents-from-alerts.md). You can then edit this rule under **Analytics**, in the **Active rules** tab.
7070

0 commit comments

Comments
 (0)