Skip to content

Commit 3f6c242

Browse files
committed
Fix broken bookmark links
1 parent 8e35241 commit 3f6c242

7 files changed

+7
-7
lines changed

articles/sentinel/fusion.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Since Fusion correlates multiple signals from various products to detect advance
2323

2424
### Configure Fusion
2525

26-
Fusion is enabled by default in Microsoft Sentinel, as an [analytics rule](detect-threats-built-in.md#view-built-in-detections) called **Advanced multistage attack detection**. You can view and change the status of the rule, configure source signals to be included in the Fusion ML model, or exclude specific detection patterns that may not be applicable to your environment from Fusion detection. Learn how to [configure the Fusion rule](configure-fusion-rules.md).
26+
Fusion is enabled by default in Microsoft Sentinel, as an [analytics rule](detect-threats-built-in.md) called **Advanced multistage attack detection**. You can view and change the status of the rule, configure source signals to be included in the Fusion ML model, or exclude specific detection patterns that may not be applicable to your environment from Fusion detection. Learn how to [configure the Fusion rule](configure-fusion-rules.md).
2727

2828
> [!NOTE]
2929
> Microsoft Sentinel currently uses 30 days of historical data to train the Fusion engine's machine learning algorithms. This data is always encrypted using Microsoft’s keys as it passes through the machine learning pipeline. However, the training data is not encrypted using [Customer-Managed Keys (CMK)](customer-managed-keys.md) if you enabled CMK in your Microsoft Sentinel workspace. To opt out of Fusion, navigate to **Microsoft Sentinel** \> **Configuration** \> **Analytics \> Active rules**, right-click on the **Advanced Multistage Attack Detection** rule, and select **Disable.**

articles/sentinel/migration-arcsight-automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This section shows how key SOAR concepts in ArcSight translate to Microsoft Sent
3737
|Step (in diagram) |ArcSight |Microsoft Sentinel |
3838
|---------|---------|---------|
3939
|1 |Ingest events into Enterprise Security Manager (ESM) and trigger correlation events. |Ingest events into the Log Analytics workspace. |
40-
|2 |Automatically filter alerts for case creation. |Use [analytics rules](detect-threats-built-in.md#use-built-in-analytics-rules) to trigger alerts. Enrich alerts using the [custom details feature](surface-custom-details-in-alerts.md) to create dynamic incident names. |
40+
|2 |Automatically filter alerts for case creation. |Use [analytics rules](detect-threats-built-in.md) to trigger alerts. Enrich alerts using the [custom details feature](surface-custom-details-in-alerts.md) to create dynamic incident names. |
4141
|3 |Classify cases. |Use [automation rules](automate-incident-handling-with-automation-rules.md). With automation rules, Microsoft Sentinel treats incidents according to the analytics rule that triggered the incident, and the incident properties that match defined criteria. |
4242
|4 |Consolidate cases. |You can consolidate several alerts to a single incident according to properties such as matching entities, alert details, or creation timeframe, using the alert grouping feature. |
4343
|5 |Dispatch cases. |Assign incidents to specific analysts using [an integration](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/automate-incident-assignment-with-shifts-for-teams/ba-p/2297549) between Microsoft Teams, Azure Logic Apps, and Microsoft Sentinel automation rules. |

articles/sentinel/migration-arcsight-detection-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article describes how to identify, compare, and migrate your ArcSight detec
1717
Microsoft Sentinel uses machine learning analytics to create high-fidelity and actionable incidents, and some of your existing detections may be redundant in Microsoft Sentinel. Therefore, don't migrate all of your detection and analytics rules blindly. Review these considerations as you identify your existing detection rules.
1818

1919
- Make sure to select use cases that justify rule migration, considering business priority and efficiency.
20-
- Check that you [understand Microsoft Sentinel rule types](detect-threats-built-in.md#view-built-in-detections).
20+
- Check that you [understand Microsoft Sentinel rule types](detect-threats-built-in.md).
2121
- Check that you understand the [rule terminology](#compare-rule-terminology).
2222
- Review any rules that haven't triggered any alerts in the past 6-12 months, and determine whether they're still relevant.
2323
- Eliminate low-level threats or alerts that you routinely ignore.

articles/sentinel/migration-qradar-automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Review which Microsoft Sentinel or Azure Logic Apps features map to the main QRa
4747

4848
|QRadar |Microsoft Sentinel/Azure Logic Apps |
4949
|---------|---------|
50-
|Rules |[Analytics rules](detect-threats-built-in.md#use-built-in-analytics-rules) attached to playbooks or automation rules |
50+
|Rules |[Analytics rules](detect-threats-built-in.md) attached to playbooks or automation rules |
5151
|Gateway |[Condition control](../logic-apps/logic-apps-control-flow-conditional-statement.md) |
5252
|Scripts |[Inline code](../logic-apps/logic-apps-add-run-inline-code.md) |
5353
|Custom action processors |[Custom API calls](../logic-apps/logic-apps-create-api-app.md) in Azure Logic Apps or third party connectors |

articles/sentinel/migration-qradar-detection-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This article describes how to identify, compare, and migrate your QRadar detecti
1616
Microsoft Sentinel uses machine learning analytics to create high-fidelity and actionable incidents, and some of your existing detections may be redundant in Microsoft Sentinel. Therefore, don't migrate all of your detection and analytics rules blindly. Review these considerations as you identify your existing detection rules.
1717

1818
- Make sure to select use cases that justify rule migration, considering business priority and efficiency.
19-
- Check that you [understand Microsoft Sentinel rule types](detect-threats-built-in.md#view-built-in-detections).
19+
- Check that you [understand Microsoft Sentinel rule types](detect-threats-built-in.md).
2020
- Check that you understand the [rule terminology](#compare-rule-terminology).
2121
- Review any rules that haven't triggered any alerts in the past 6-12 months, and determine whether they're still relevant.
2222
- Eliminate low-level threats or alerts that you routinely ignore.

articles/sentinel/migration-splunk-detection-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ If you want to migrate your Splunk Observability deployment, learn more about ho
1818
Microsoft Sentinel uses machine learning analytics to create high-fidelity and actionable incidents, and some of your existing detections may be redundant in Microsoft Sentinel. Therefore, don't migrate all of your detection and analytics rules blindly. Review these considerations as you identify your existing detection rules.
1919

2020
- Make sure to select use cases that justify rule migration, considering business priority and efficiency.
21-
- Check that you [understand Microsoft Sentinel rule types](detect-threats-built-in.md#view-built-in-detections).
21+
- Check that you [understand Microsoft Sentinel rule types](detect-threats-built-in.md).
2222
- Check that you understand the [rule terminology](#compare-rule-terminology).
2323
- Review any rules that haven't triggered any alerts in the past 6-12 months, and determine whether they're still relevant.
2424
- Eliminate low-level threats or alerts that you routinely ignore.

articles/sentinel/sentinel-content-centralize.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The following table lists specific impacts to the content templates for each of
9191
| Content type | Impact |
9292
| ------- | ------- |
9393
| [Data connectors](connect-data-sources.md) | Templates identifiable as **Content source** = **Gallery content** and **Status** = **Not connected** will no longer appear in the data connectors gallery. |
94-
| [Analytics](detect-threats-built-in.md#view-built-in-detections) | Templates identifiable as **Source name** = **Gallery content** will no longer appear in the analytics gallery. |
94+
| [Analytics](detect-threats-built-in.md) | Templates identifiable as **Source name** = **Gallery content** will no longer appear in the analytics gallery. |
9595
| [Hunting](hunting.md#use-built-in-queries) | Templates with **Content source** = **Gallery content** will no longer appear in the hunting gallery. |
9696
| [Playbooks](use-playbook-templates.md#explore-playbook-templates) | Templates identifiable as **Source name** = **Gallery content** will no longer appear in the automation playbooks gallery. |
9797
| [Workbooks](get-visibility.md#use-built-in-workbooks) | Templates with **Content source** = **Gallery content** will no longer appear in the workbooks gallery. |

0 commit comments

Comments
 (0)