Skip to content

Commit 11b8faf

Browse files
committed
fixing toc
1 parent 28abf7d commit 11b8faf

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/sentinel/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -929,7 +929,7 @@
929929
items:
930930
- name: Azure portal
931931
items:
932-
- name: Sample incident investigation
932+
- name: Overview
933933
href: incident-investigation.md
934934
- name: Triage and manage your incidents
935935
href: incident-navigate-triage.md

articles/sentinel/incident-investigation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Investigate incidents with Microsoft Sentinel in the Azure portal - a sample process
3-
description: This article describes Microsoft Sentinel's incident investigation and case management capabilities and features in the Azure portal, taking you through the phases of a typical incident investigation while presenting all the displays and tools available to you to help you along.
2+
title: Microsoft Sentinel incident investigation in the Azure portal
3+
description: This article describes Microsoft Sentinel's incident investigation and case management capabilities and features in the Azure portal.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: concept-article
@@ -10,7 +10,7 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to understand how Microsoft Sentinel incidents in the Azure portal can help me efficiently manage and resolve security threats.
1111
---
1212

13-
# Investigate incidents with Microsoft Sentinel in the Azure portal - a sample process
13+
# Microsoft Sentinel incident investigation in the Azure portal
1414

1515
Microsoft Sentinel gives you a complete, full-featured case management platform for investigating and managing security incidents. **Incidents** are Microsoft Sentinel’s name for files that contain a complete and constantly updated chronology of a security threat, whether it’s individual pieces of evidence (alerts), suspects and parties of interest (entities), insights collected and curated by security experts and AI/machine learning models, or comments and logs of all the actions taken in the course of the investigation.
1616

0 commit comments

Comments
 (0)