Skip to content

Commit 29e5a06

Browse files
committed
fixing links
1 parent 816fba3 commit 29e5a06

File tree

2 files changed

+2
-5
lines changed

2 files changed

+2
-5
lines changed

articles/sentinel/mitre-coverage.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,9 +74,6 @@ By default, both currently active scheduled query and near real-time (NRT) rules
7474

7575
For example, select **Hunting queries** to jump to the **Hunting** page. There, you see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
7676

77-
## Filter by threat scenario
78-
79-
Use Filter the entire **MITRE ATT&CK** page by threat scenario
8077
## Simulate possible coverage with available detections
8178

8279
In the MITRE coverage matrix, *simulated* coverage refers to detections that are available, but not currently configured in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.

articles/sentinel/soc-optimization/soc-optimization-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,13 +123,13 @@ Filter the optimizations based on optimization type, or search for a specific op
123123
1. For threat-based coverage optimizations:
124124

125125
- Toggle between the spider charts to understand your coverage across different tactics and techniques, based on the user-defined and out-of-the-box detections active in your environment.
126-
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md&tabs=defender-portal), pre-filtered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
126+
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md?tabs=defender-portal), pre-filtered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
127127

128128
1. Scroll down to the bottom of the details pane for a link to where you can take the recommended actions. For example:
129129

130130
- If an optimization includes recommendations to add analytics rules, select **Go to Content Hub**.
131131
- If an optimization includes recommendations to move a table to basic logs, select **Change plan**.
132-
- For threat-based coverage optimizations, select **View full threat scenario** to see the full list of relevant threats, active and recommended detections, and coverage levels. From there you can jump directly to the **Content hub** to activate any recommended detections, or to the **MITRE ATT&CK** page to view the [full MITRE ATT&CK coverage for the selected scenario](../mitre-coverage.md&tabs=defender-portal). For example:
132+
- For threat-based coverage optimizations, select **View full threat scenario** to see the full list of relevant threats, active and recommended detections, and coverage levels. From there you can jump directly to the **Content hub** to activate any recommended detections, or to the **MITRE ATT&CK** page to view the [full MITRE ATT&CK coverage for the selected scenario](../mitre-coverage.md?tabs=defender-portal). For example:
133133

134134
:::image type="content" source="media/soc-optimization-access/threat-scenario-page.png" alt-text="Screenshot of the SOC optimization threat scenario page.":::
135135

0 commit comments

Comments
 (0)