Skip to content

Commit 0f2257d

Browse files
committed
PR review fixes
1 parent 6e6f67a commit 0f2257d

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,12 +83,12 @@ Whichever of the two interfaces you choose, you will end up here:
8383
- Optional; automatically populated by the **incident ID**. You can add others.
8484

8585
- **Name**
86-
- Name of the indicator - this is what will be displayed in your list of indicators.
86+
- Name of the indicator—this is what will be displayed in your list of indicators.
8787
- Optional; automatically populated by the **incident name.**
8888

8989
- **Created by**
9090
- Creator of the indicator.
91-
- Optional; automatically-populated by the user logged into Microsoft Sentinel.
91+
- Optional; automatically populated by the user logged into Microsoft Sentinel.
9292

9393
Fill in the remaining fields accordingly.
9494

articles/sentinel/investigate-incidents.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ Select an entity to see its full details. When you select an entity, you will mo
275275

276276
The **Entities tab** shows a list of all the entities in the incident.
277277

278-
:::image type="content" source="media/investigate-incidents/entities-tab.png" alt-text="Screenshot of entities tab in incident details page.":::
278+
:::image type="content" source="media/investigate-incidents/entities-tab.png" alt-text="Screenshot of entities tab in incident details page." lightbox="media/investigate-incidents/entities-tab.png":::
279279

280280
Like the entities widget, this list can also be searched and filtered by entity type. Searches and filters applied in one list won't apply to the other.
281281

@@ -329,7 +329,7 @@ However you end up on the Logs panel, if you've run a query whose results you wa
329329

330330
1. After creating the bookmark (or if you choose not to), select **Done** to close the **Logs** panel.
331331

332-
:::image type="content" source="media/investigate-incidents/logs-panel.png" alt-text="Screenshot of Logs panel open in incident details page.":::
332+
:::image type="content" source="media/investigate-incidents/logs-panel.png" alt-text="Screenshot of Logs panel open in incident details page." lightbox="media/investigate-incidents/logs-panel.png":::
333333

334334
## Audit and comment on incidents
335335

@@ -421,7 +421,7 @@ To use the investigation graph:
421421

422422
For example, you can request related alerts. If you select an exploration query, the resulting entitles are added back to the graph. In this example, selecting **Related alerts** returned the following alerts into the graph:
423423

424-
:::image type="content" source="media/investigate-incidents/related-alerts.png" alt-text="Screenshot: view related alerts" lightbox="media/investigate-incidents/related-alerts.png":::
424+
:::image type="content" source="media/investigate-incidents/related-alerts.png" alt-text="Screenshot: view related alerts." lightbox="media/investigate-incidents/related-alerts.png":::
425425

426426
See that the related alerts appear connected to the entity by dotted lines.
427427

Binary file not shown.

articles/sentinel/relate-alerts-to-incidents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ One thing that this feature allows you to do is to include alerts from one data
2121

2222
This feature is built into the latest version of the Microsoft Sentinel API, which means that it's available to the Logic Apps connector for Microsoft Sentinel. So you can use playbooks to automatically add an alert to an incident if certain conditions are met.
2323

24-
You can also use this automation to add alerts to [manually-created incidents](create-incident-manually.md), to create custom correlations, or to define custom criteria for grouping alerts into incidents when they're created.
24+
You can also use this automation to add alerts to [manually created incidents](create-incident-manually.md), to create custom correlations, or to define custom criteria for grouping alerts into incidents when they're created.
2525

2626
### Limitations
2727

0 commit comments

Comments
 (0)