Skip to content

Commit 04b9f31

Browse files
author
cabailey
committed
Merge branch 'release-ga-sentinel' of https://github.com/MicrosoftDocs/azure-docs-pr into cabailey-azuredocs-bookmarks
2 parents fbafd4d + a8673b3 commit 04b9f31

40 files changed

+167
-157
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26034,6 +26034,11 @@
2603426034
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-autoscale-powershell",
2603526035
"redirect_document_id": false
2603626036
},
26037+
{
26038+
"source_path": "articles/sentinel/tutorial-detect-threats.md",
26039+
"redirect_url": "/azure/sentinel/tutorial-detect-threats-built-in",
26040+
"redirect_document_id": false
26041+
},
2603726042
{
2603826043
"source_path": "articles/sentinel/user-analytics.md",
2603926044
"redirect_url": "/azure/sentinel/overview",

articles/sentinel/TOC.yml

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,10 @@
1111
href: quickstart-get-visibility.md
1212
- name: Tutorials
1313
items:
14-
- name: Detect suspicious threats
15-
href: tutorial-detect-threats.md
16-
items:
17-
- name: Use built-in analytics
18-
href: tutorial-detect-threats-built-in.md
19-
- name: Use custom rules
20-
href: tutorial-detect-threats-custom.md
14+
- name: Use built-in analytics to detect threats
15+
href: tutorial-detect-threats-built-in.md
16+
- name: Create custom rules to detect threats
17+
href: tutorial-detect-threats-custom.md
2118
- name: Monitor your data
2219
href: tutorial-monitor-your-data.md
2320
- name: Investigate incidents

articles/sentinel/connect-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 09/10/2019
15+
ms.date: 09/23/2019
1616
ms.author: rkarlin
1717

1818
---

articles/sentinel/connect-azure-active-directory.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/10/2019
17+
ms.date: 09/23/2019
1818
ms.author: rkarlin
1919

2020
---
@@ -37,9 +37,11 @@ Azure Sentinel enables you to collect data from [Azure Active Directory](../acti
3737

3838
1. In Azure Sentinel, select **Data connectors** and then click the **Azure Active Directory** tile.
3939

40-
2. Next to the logs you want to stream into Azure Sentinel, click **Connect**.
40+
1. Next to the logs you want to stream into Azure Sentinel, click **Connect**.
4141

42-
6. To use the relevant schema in Log Analytics for the Azure AD alerts, search for **SigninLogs** and **AuditLogs**.
42+
1. You can select whether you want the alerts from Azure AD to automatically generate incidents in Azure Sentinel automatically. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
43+
44+
1. To use the relevant schema in Log Analytics for the Azure AD alerts, search for **SigninLogs** and **AuditLogs**.
4345

4446

4547

articles/sentinel/connect-azure-activity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/10/2019
17+
ms.date: 09/23/2019
1818
ms.author: rkarlin
1919

2020
---

articles/sentinel/connect-azure-ad-identity-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/10/2019
17+
ms.date: 09/23/2019
1818
ms.author: rkarlin
1919

2020
---

articles/sentinel/connect-azure-atp.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 09/10/2019
16+
ms.date: 09/23/2019
1717
ms.author: rkarlin
1818

1919
---
@@ -39,9 +39,11 @@ If Azure ATP is deployed and ingesting your data, the suspicious alerts can easi
3939

4040
1. In Azure Sentinel, select **Data connectors** and then click the **Azure ATP** tile.
4141

42-
2. Click **Connect**.
42+
1. You can select whether you want the alerts from Azure ATP to automatically generate incidents in Azure Sentinel automatically. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
4343

44-
6. To use the relevant schema in Log Analytics for the Azure ATP alerts, search for **SecurityAlert**.
44+
1. Click **Connect**.
45+
46+
1. To use the relevant schema in Log Analytics for the Azure ATP alerts, search for **SecurityAlert**.
4547

4648
> [!NOTE]
4749
> If the alerts are larger than 30 KB, Azure Sentinel stops displaying the Entities field in the alerts.

articles/sentinel/connect-azure-security-center.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/10/2019
17+
ms.date: 09/23/2019
1818
ms.author: rkarlin
1919

2020
---
@@ -38,8 +38,11 @@ Azure Sentinel enables you to connect alerts from [Azure Security Center](../sec
3838
## Connect to Azure Security Center
3939

4040
1. In Azure Sentinel, select **Data connectors** and then click the **Azure Security Center** tile.
41+
4142
1. In the right, click **Connect** next to each subscription whose alerts you want to stream into Azure Sentinel. Make sure to upgrade each subscription to Azure Security Center Standard tier to stream alerts to Azure Sentinel.
4243

44+
1. You can select whether you want the alerts from Azure Security Center to automatically generate incidents in Azure Sentinel automatically. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
45+
4346
3. Click **Connect**.
4447

4548
4. To use the relevant schema in Log Analytics for the Azure Security Center alerts, search for **SecurityAlert**.

articles/sentinel/connect-azure-stack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.devlang: na
1111
ms.topic: conceptual
1212
ms.tgt_pltfrm: na
1313
ms.workload: na
14-
ms.date: 09/10/2019
14+
ms.date: 09/23/2019
1515
ms.author: rkarlin
1616

1717
---

articles/sentinel/connect-barracuda.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/10/2019
17+
ms.date: 09/23/2019
1818
ms.author: rkarlin
1919

2020
---

0 commit comments

Comments
 (0)