Skip to content

Commit 570cf7f

Browse files
committed
Content review
1 parent 7f82666 commit 570cf7f

File tree

2 files changed

+13
-4
lines changed

2 files changed

+13
-4
lines changed

articles/sentinel/bookmarks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Create a bookmark to preserve the queries, results, your observations, and findi
5353

5454
To view the bookmark in the investigation graph, you must map at least one entity. Entity mappings to account, host, IP, and URL entity types you created are supported, preserving backwards compatibility.
5555

56-
1. Select **Save** to commit your changes and add the bookmark. All bookmarked data is shared with other analysts, and is a first step toward a collaborative investigation experience.
56+
1. Select **Create** to commit your changes and add the bookmark. All bookmarked data is shared with other analysts, and is a first step toward a collaborative investigation experience.
5757

5858
The log query results support bookmarks whenever this pane is opened from Microsoft Sentinel. For example, if you select **General** > **Logs** from the navigation bar, select event links in the investigations graph, or select an alert ID from the full details of an incident. You can't create bookmarks when the **Logs** pane is opened from another location, such as directly from Azure Monitor.
5959

articles/sentinel/ci-cd.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,20 @@ When creating custom content, you can manage it from your own Microsoft Sentinel
3030
Microsoft Sentinel currently supports connections to GitHub and Azure DevOps repositories. Before connecting your Microsoft Sentinel workspace to your source control repository, make sure that you have:
3131

3232
- An **Owner** role in the resource group that contains your Microsoft Sentinel workspace *or* a combination of **User Access Administrator** and **Sentinel Contributor** roles to create the connection
33-
- Collaborator access to your GitHub repository or Project Administrator access to your Azure DevOps repository
33+
- Ensure custom content files you want to deploy to your workspaces are in a supported format. For supported formats, see [Plan your repository content](ci-cd-custom-content.md#plan-your-repository-content).
34+
35+
### [GitHub prerequisites](#tab/github)
36+
37+
- Collaborator access to your GitHub repository
3438
- Actions enabled for GitHub and Pipelines enabled for Azure DevOps
39+
40+
### [Azure DevOps prerequisites](#tab/azure-devops)
41+
42+
- Project Administrator access to your Azure DevOps repository
3543
- Third-party application access via OAuth enabled for Azure DevOps [application connection policies](/azure/devops/organizations/accounts/change-application-access-policies#manage-a-policy).
36-
- An Azure DevOps connection must be in the same tenant as your Microsoft Sentinel workspace
37-
- Ensure custom content files you want to deploy to your workspaces are in a supported format. For supported formats, see [Plan your repository content](ci-cd-custom-content.md#plan-your-repository-content).
44+
- An Azure DevOps connection in the same tenant as your Microsoft Sentinel workspace
45+
46+
---
3847

3948
For more information on deployable content types, see [Validate your content](ci-cd-custom-content.md#validate-your-content).
4049

0 commit comments

Comments
 (0)