Skip to content

Commit 0b0ca51

Browse files
Merge pull request #300229 from batamig/wkspc-ga-ii
workspaces ga sentinel
2 parents eff4a6d + 6341317 commit 0b0ca51

File tree

6 files changed

+26
-10
lines changed

6 files changed

+26
-10
lines changed

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: usx-security
1919

2020
The Microsoft Defender XDR connector for Microsoft Sentinel allows you to stream all Microsoft Defender XDR incidents, alerts, and advanced hunting events into Microsoft Sentinel. This connector keeps the incidents synchronized between both portals. Microsoft Defender XDR incidents include alerts, entities, and other relevant information from all the Microsoft Defender products and services. For more information, see [Microsoft Defender XDR integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md).
2121

22-
The Defender XDR connector, especially its incident integration feature, is the foundation of Microsoft's unified security operations platform. If you're onboarding Microsoft Sentinel to the Microsoft Defender portal, you must first enable this connector with incident integration.
22+
The Defender XDR connector, especially its incident integration feature, is the foundation of Microsoft's unified security operations platform.
2323

2424
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2525

@@ -31,7 +31,7 @@ Before you begin, you must have the appropriate licensing, access, and configure
3131
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
3232
- You must have read and write permissions on your Microsoft Sentinel workspace.
3333
- To make any changes to the connector settings, your account must be a member of the same Microsoft Entra tenant with which your Microsoft Sentinel workspace is associated.
34-
- Install the solution for **Microsoft Defender XDR** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
34+
- If you're working in the Azure portal, install the solution for **Microsoft Defender XDR** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md). If you're working in the Defender portal, this solution is automatically installed.
3535
- Grant access to Microsoft Sentinel as appropriate for your organization. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
3636

3737
For on-premises Active Directory sync via Microsoft Defender for Identity:

articles/sentinel/sap/deployment-attack-disrupt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,4 +51,4 @@ For more information, see:
5151

5252
## Related content
5353

54-
For more information, see [Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md).
54+
For more information, see [Microsoft Sentinel in the Microsoft Defender portal](../microsoft-sentinel-defender-portal.md).

articles/sentinel/summary-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ We recommend that you [experiment with your summary rule query](hunts.md) in the
4848

4949
Create a new summary rule to aggregate a specific large set of data into a dynamic table. Configure your rule frequency to determine how often your aggregated data set is updated from the raw data.
5050

51-
1. In the Defender portal, select **Microsoft Sentinel > Configuration > Summary rules (Preview)**. In the Azure portal, from the Microsoft Sentinel navigation menu, under **Configuration**, select **Summary rules (Preview)**. For example:
51+
1. In the Defender portal, select **Microsoft Sentinel > Configuration > Summary rules**. In the Azure portal, from the Microsoft Sentinel navigation menu, under **Configuration**, select **Summary rules (Preview)**. For example:
5252

5353
:::image type="content" source="media/summary-rules/summary-rules-azure.png" alt-text="Screenshot of the Summary rules page in the Azure portal.":::
5454

articles/sentinel/unified-connector-custom-device.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,10 @@ For more information about the related Microsoft Sentinel solution for each of t
3737

3838
The steps for collecting logs from machines hosting applications and appliances follow a general pattern:
3939

40-
1. Create the destination table in Log Analytics (or Advanced Hunting if you're in the Defender portal).
40+
1. Create the destination table in one of the following locations:
41+
42+
- In the Defender portal, use the **Advanced Hunting** page.
43+
- In the Azure portal, use Log Analytics.
4144

4245
1. Create the data collection rule (DCR) for your application or appliance.
4346

articles/sentinel/whats-new.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
44
author: batamig
55
ms.author: bagol
66
ms.topic: concept-article
7-
ms.date: 05/06/2025
7+
ms.date: 05/22/2025
88

99
#Customer intent: As a security team member, I want to stay updated on the latest features and enhancements in Microsoft Sentinel so that I can effectively manage and optimize my organization's security posture.
1010

@@ -20,9 +20,21 @@ The listed features were released in the last three months. For information abou
2020

2121
## May 2025
2222

23+
- [All Microsoft Sentinel use cases generally available in the Defender portal](#all-microsoft-sentinel-use-cases-generally-available-in-the-defender-portal)
2324
- [Unified *IdentityInfo* table](#unified-identityinfo-table)
2425
- [Additions to SOC optimization support (Preview)](#additions-to-soc-optimization-support-preview)
2526

27+
### All Microsoft Sentinel use cases generally available in the Defender portal
28+
29+
All Microsoft Sentinel use cases that are in general availability, including [multi-tenant](/unified-secops-platform/mto-overview) and [multi-workspace](workspaces-defender-portal.md) capabilities and support for all government and commercial clouds, are now also supported for general availability in the Defender portal.
30+
31+
We recommend that you [onboard your workspaces to the Defender portal](/unified-secops-platform/microsoft-sentinel-onboard?toc=%2Fazure%2Fsentinel%2FTOC.json&bc=%2Fazure%2Fsentinel%2Fbreadcrumb%2Ftoc.json) to take advantage of unified security operations. For more information, see:
32+
33+
For more information, see:
34+
35+
- [Microsoft Sentinel in the Microsoft Defender portal](microsoft-sentinel-defender-portal.md)
36+
- [Transition your Microsoft Sentinel environment to the Defender portal](move-to-defender.md)
37+
2638
### Unified *IdentityInfo* table
2739

2840
Customers of Microsoft Sentinel in the Defender portal who have enabled UEBA can now take advantage of a new version of the IdentityInfo table, located in the Defender portal's *Advanced hunting* section, that includes the largest possible set of fields common to both the Defender and Azure portals. This unified table helps enrich your security investigations across the entire unified SecOps experience.
@@ -31,9 +43,10 @@ For more information, see [IdentityInfo table](ueba-reference.md#identityinfo-ta
3143

3244
### Additions to SOC optimization support (Preview)
3345

34-
SOC optimization support for:
35-
- **AI MITRE ATT&CK tagging recommendations (Preview)**: Uses artificial intelligence to suggest tagging security detections with MITRE ATT&CK tactics and techniques.
36-
- **Risk-based recommendations (Preview)**: Recommends implementing controls to address coverage gaps linked to use cases that may result in business risks or financial losses, including operational, financial, reputational, compliance, and legal risks.
46+
SOC optimization support for:
47+
48+
- **AI MITRE ATT&CK tagging recommendations (Preview)**: Uses artificial intelligence to suggest tagging security detections with MITRE ATT&CK tactics and techniques.
49+
- **Risk-based recommendations (Preview)**: Recommends implementing controls to address coverage gaps linked to use cases that may result in business risks or financial losses, including operational, financial, reputational, compliance, and legal risks.
3750

3851
For more information, see [SOC optimization reference](soc-optimization/soc-optimization-reference.md).
3952

articles/sentinel/workspaces-defender-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ appliesto:
1212

1313
---
1414

15-
# Multiple Microsoft Sentinel workspaces in the Defender portal (preview)
15+
# Multiple Microsoft Sentinel workspaces in the Defender portal
1616

1717
The Defender portal allows you to connect to one primary workspace and multiple secondary workspaces for Microsoft Sentinel. In the context of this article, a workspace is a Log Analytics workspace with Microsoft Sentinel enabled.
1818

0 commit comments

Comments
 (0)