Skip to content

Commit 47e3859

Browse files
authored
Merge pull request #89545 from cabailey/cabailey-azuredocs
Sentinel - preview disclaimers consistency
2 parents db497c4 + 4146e49 commit 47e3859

File tree

5 files changed

+23
-21
lines changed

5 files changed

+23
-21
lines changed

articles/sentinel/connect-azure-atp.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,12 @@ ms.date: 09/23/2019
1717
ms.author: rkarlin
1818

1919
---
20-
# Connect data from Azure Advanced Threat Protection (ATP) - Preview
21-
22-
20+
# Connect data from Azure Advanced Threat Protection (ATP)
2321

22+
> [!IMPORTANT]
23+
> The Azure Advanced Threat Protection data connector in Azure Sentinel is currently in public preview.
24+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2426
2527
You can stream logs from [Azure Advanced Threat Protection](https://docs.microsoft.com/azure-advanced-threat-protection/what-is-atp) into Azure Sentinel with a single click.
2628

@@ -37,7 +39,7 @@ If Azure ATP is deployed and ingesting your data, the suspicious alerts can easi
3739

3840
1. To connect Azure ATP to Azure Sentinel, you must first enable integration between Azure ATP and Microsoft Cloud App Security. For information on how to do this, see [Azure Advanced Threat Protection integration](https://docs.microsoft.com/cloud-app-security/aatp-integration).
3941

40-
1. In Azure Sentinel, select **Data connectors** and then click the **Azure ATP** tile.
42+
1. In Azure Sentinel, select **Data connectors** and then click the **Azure Advanced Threat Protection (Preview)** tile.
4143

4244
1. You can select whether you want the alerts from Azure ATP to automatically generate incidents in Azure Sentinel automatically. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
4345

articles/sentinel/connect-azure-information-protection.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@ ms.author: cabailey
2020

2121
# Connect data from Azure Information Protection
2222

23+
> [!IMPORTANT]
24+
> The Azure Information Protection data connector in Azure Sentinel is currently in public preview.
25+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
26+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
27+
2328
You can stream logging information from [Azure Information Protection](https://azure.microsoft.com/services/information-protection/) into Azure Sentinel by configuring the Azure Information Protection data connector. Azure Information Protection helps you control and secure your sensitive data, whether it’s stored in the cloud or on-premises.
2429

2530
If [central reporting for Azure Information Protection](https://docs.microsoft.com/azure/information-protection/reports-aip) is already configured so that logging information from this service is stored in the same Log Analytics workspace as you've currently selected for Azure Sentinel, you can skip the configuration of this data connector. The logging information from Azure Information Protection is already available to Azure Sentinel.
@@ -52,11 +57,6 @@ However, if logging information from Azure Information Protection is going to a
5257

5358
## Connect to Azure Information Protection
5459

55-
> [!IMPORTANT]
56-
> The Azure Information Protection data connector in Azure Sentinel is currently in public preview.
57-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
58-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
59-
6060
Use the following instructions if you haven't configured a Log Analytics workspace for Azure Information Protection, or you need to change the workspace that stores the Azure Information Protection logging information.
6161

6262
1. In Azure Sentinel, select **Data connectors**, and then **Azure Information Protection (Preview)**.

articles/sentinel/connect-dns.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,16 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/23/2019
17+
ms.date: 09/24/2019
1818
ms.author: rkarlin
1919

2020
---
21-
# Connect your domain name server - Preview
22-
21+
# Connect your domain name server
2322

23+
> [!IMPORTANT]
24+
> The DNS data connector in Azure Sentinel is currently in public preview.
25+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
26+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2427
2528
You can connect any Domain Name Server (DNS) running on Windows to Azure Sentinel. This is done by installing an agent on the DNS machine. Using DNS logs, you can gain security, performance, and operations-related insights into the DNS infrastructure of your organization by collecting, analyzing, and correlating analytic and audit logs and other related data from the DNS servers.
2629

@@ -49,7 +52,7 @@ The solution collects DNS inventory and DNS event-related data from the DNS serv
4952

5053
## Connect your DNS appliance
5154

52-
1. In the Azure Sentinel portal, select **Data connectors** and choose the **DNS** tile.
55+
1. In the Azure Sentinel portal, select **Data connectors** and choose the **DNS (Preview)** tile.
5356
1. If your DNS machines are in Azure:
5457
1. Click **Install agent on Azure Windows virtual machine**.
5558
1. In the **Virtual machines** list, select the DNS machine you want to stream into Azure Sentinel. Make sure this is a Windows VM.

articles/sentinel/connect-threat-intelligence.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,10 @@ ms.date: 09/24/2019
1515
ms.author: rkarlin
1616

1717
---
18-
# Connect data from threat intelligence providers - Preview
18+
# Connect data from threat intelligence providers
1919

2020
> [!IMPORTANT]
21-
> Threat intelligence in Azure Sentinel is currently in public preview.
21+
> The Threat Intelligence Platforms data connector in Azure Sentinel is currently in public preview.
2222
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2323
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2424

articles/sentinel/overview.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,12 @@ ms.topic: overview
1515
ms.custom: mvc
1616
ms.tgt_pltfrm: na
1717
ms.workload: na
18-
ms.date: 09/23/2019
18+
ms.date: 09/24/2019
1919
ms.author: rkarlin
2020

2121
---
2222
# What is Azure Sentinel?
2323

24-
25-
2624
Microsoft Azure Sentinel is a scalable, cloud-native, **security information event management (SIEM)** and **security orchestration automated response (SOAR)** solution. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.
2725

2826
Azure Sentinel is your birds-eye view across the enterprise alleviating the stress of increasingly sophisticated attacks, increasing volumes of alerts, and long resolution timeframes.
@@ -69,10 +67,9 @@ For example, if you use the ServiceNow ticketing system, you can use the tools p
6967
![Playbooks](./media/tutorial-respond-threats-playbook/logic-app.png)
7068

7169

70+
## Investigation
7271

73-
## Investigation (preview)
74-
75-
Azure Sentinel [deep investigation](tutorial-investigate-cases.md) tools help you to understand the scope and find the root cause, of a potential security threat. You can choose an entity on the interactive graph to ask interesting questions for a specific entity, and drill down into that entity and its connections to get to the root cause of the threat.
72+
Currently in preview, Azure Sentinel [deep investigation](tutorial-investigate-cases.md) tools help you to understand the scope and find the root cause, of a potential security threat. You can choose an entity on the interactive graph to ask interesting questions for a specific entity, and drill down into that entity and its connections to get to the root cause of the threat.
7673

7774
![Investigation](./media/tutorial-investigate-cases/map-timeline.png)
7875

0 commit comments

Comments
 (0)