Skip to content

Commit 0725511

Browse files
committed
sanity
1 parent 92265b0 commit 0725511

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/sentinel/resources.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,9 @@ The following table compares Microsoft Sentinel playbooks, workbooks, and notebo
3131

3232
|Resource |Persona | Use and examples | Advantages | Challenges |
3333
|---------|---------|---------|---------|---------|
34-
|**[Workbooks](monitor-your-data.md)** | <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li>Visualize and monitor data. For example, creating interactive reports and dashboards to analyze security data, such as to display trends and patterns in security alerts.</li></ul> | <ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Can't integrate with external data </li></ul> |
35-
|**[Notebooks](notebooks.md)** | <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> |<ul><li>Perform advanced data analysis and investigations. </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> For example, analyzing large datasets to identify anomalies or potential threats. | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> |
36-
|**[Playbooks](automate-responses-with-playbooks.md)** | <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> For example, running preconfigured remediation actions to automatically isolate a compromised device. | <ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> |
34+
|**[Workbooks](monitor-your-data.md)** | <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li>Visualize and monitor data. <br><br> For example, creating interactive reports and dashboards to analyze security data, such as to display trends and patterns in security alerts.</li></ul> | <ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Can't integrate with external data </li></ul> |
35+
|**[Notebooks](notebooks.md)** | <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> |<ul><li>Perform advanced data analysis and investigations. </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> <br><br>For example, analyzing large datasets to identify anomalies or potential threats. | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> |
36+
|**[Playbooks](automate-responses-with-playbooks.md)** | <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> <br><br>For example, running preconfigured remediation actions to automatically isolate a compromised device. | <ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> |
3737

3838
## Related content
3939

0 commit comments

Comments
 (0)