Skip to content

Commit 215d71f

Browse files
committed
More
1 parent 35258ea commit 215d71f

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/sentinel/log-plans.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,9 @@ This category encompasses logs whose individual security value is limited but ar
6464

6565
Some examples of secondary data log sources are cloud storage access logs, NetFlow logs, TLS/SSL certificate logs, firewall logs, proxy logs, and IoT logs. To learn more about how each of these sources brings value to security detections without being needed all the time, see [Log sources to use for Auxiliary Logs ingestion](basic-logs-use-cases.md).
6666

67-
Logs containing secondary security data should be stored using the [**Auxiliary logs**](#auxiliary-logs-plan) plan described later in this article.
67+
Logs containing secondary security data should be stored using the [**Auxiliary logs**](#auxiliary-logs-plan) plan (now in Preview) described later in this article.
68+
69+
For a non-preview option, you can use [**Basic logs**](#basic-logs-plan) instead.
6870

6971
## Log management plans
7072

0 commit comments

Comments
 (0)