You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Make sure that you have reader access to Micrososft Sentinel resources. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
24
+
21
25
## Access the Overview page
22
26
23
27
If your workspace is onboarded to the unified security operations platform, select **General > Overview**. Otherwise, select **Overview** directly. For example:
@@ -94,19 +98,6 @@ The number of analytics rules in Microsoft Sentinel are shown by status, includi
94
98
95
99
Select the **MITRE view** link to jump to the **MITRE ATT&CK**, where you can view how your environment is protected against MITRE ATT&CK tactics and techniques. Select the **manage analytics rules** link to jump to the **Analytics** page, where you can view and manage the rules that configure how alerts are triggered.
96
100
97
-
<!--unclear what this section is doing here. doesn't seem to have any connection to workbooks?
98
-
## Create new detections
99
-
100
-
Generate detections on the [data sources that you connected to Microsoft Sentinel](connect-data-sources.md) to investigate threats in your organization.
101
-
102
-
When you create a new detection, leverage the detections crafted by Microsoft security researchers that are tailored to the data sources you connected.
103
-
104
-
To view the installed out-of-the-box detections, go to **Analytics** and then **Rule templates**. This tab contains all the installed Microsoft Sentinel rule templates. To find more rule templates, go to the **Content hub** in Microsoft Sentinel to install product solutions or standalone content.
105
-
106
-

107
-
108
-
For more information about getting out-of-the-box detections, see [Get built-in-analytics](detect-threats-built-in.md).
109
-
-->
110
101
## Next steps
111
102
112
103
- Use workbook templates to dive deeper into events generated across your environment. For more information, see [Visualize log and query data with Microsoft Sentinel workbooks](workbooks.md).
Copy file name to clipboardExpand all lines: articles/sentinel/monitor-your-data.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,13 +120,13 @@ To print a workbook, or save it as a PDF, use the options menu to the right of t
120
120
2. In the print screen, adjust your print settings as needed or select **Save as PDF** to save it locally.
121
121
122
122
For example:
123
+
123
124
:::image type="content" source="media/monitor-your-data/print-workbook.png" alt-text="Screenshot that shows how to print your workbook or save as PDF." :::
124
125
125
126
## How to delete workbooks
126
127
127
128
To delete a saved workbook, either a saved template or a customized workbook, select the saved workbook that you want to delete and select **Delete**. This action removes the saved workbook. It also removes the workbook resource and any changes you made to the template. The original template remains available.
128
129
129
-
130
130
## Workbook recommendations
131
131
132
132
This section reviews basic recommendations we have for using Microsoft Sentinel workbooks.
@@ -144,7 +144,7 @@ We recommend that you install the appropriate solution from the **Content hub**
144
144
145
145
For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlight suspicious events across entities.
146
146
147
-

147
+
:::image type="content" source="media/qs-get-visibility/palo-alto-week-query.png" alt-text="Screenshot of the Palo Alto workbook":::
0 commit comments