|
13 | 13 | href: microsoft-sentinel-defender-portal.md
|
14 | 14 | - name: Plan
|
15 | 15 | items:
|
16 |
| - - name: Deployment planning guide |
| 16 | + - name: Deployment planning guide |
17 | 17 | href: deploy-overview.md
|
18 |
| - - name: Prerequisites |
| 18 | + - name: Prerequisites |
19 | 19 | href: prerequisites.md
|
20 | 20 | - name: Workspace architecture
|
21 | 21 | items:
|
22 | 22 | - name: Review best practices
|
23 |
| - href: best-practices-workspace-architecture.md |
| 23 | + href: best-practices-workspace-architecture.md |
24 | 24 | - name: Design workspace architecture
|
25 |
| - href: design-your-workspace-architecture.md |
| 25 | + href: design-your-workspace-architecture.md |
26 | 26 | - name: Review sample workspace designs
|
27 | 27 | href: sample-workspace-designs.md
|
28 | 28 | - name: Prepare for multiple workspaces
|
29 | 29 | href: prepare-multiple-workspaces.md
|
30 | 30 | - name: Prioritize data connectors
|
31 |
| - href: prioritize-data-connectors.md |
| 31 | + href: prioritize-data-connectors.md |
32 | 32 | - name: Plan roles and permissions
|
33 | 33 | href: roles.md
|
34 | 34 | - name: Plan costs
|
35 | 35 | href: billing.md
|
36 | 36 | - name: Availability and support
|
37 |
| - items: |
| 37 | + items: |
38 | 38 | - name: Geographical availability and data residency
|
39 |
| - href: geographical-availability-data-residency.md |
| 39 | + href: geographical-availability-data-residency.md |
40 | 40 | - name: Support for data types in different clouds
|
41 | 41 | href: data-type-cloud-support.md
|
42 | 42 | - name: Feature support in different clouds
|
43 | 43 | href: feature-availability.md
|
44 | 44 | - name: Regional availability
|
45 | 45 | href: https://azure.microsoft.com/global-infrastructure/services/?products=azure-sentinel
|
46 | 46 | - name: Security baseline
|
47 |
| - href: /security/benchmark/azure/baselines/sentinel-security-baseline?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json |
| 47 | + href: /security/benchmark/azure/baselines/sentinel-security-baseline?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json |
48 | 48 | - name: Deploy
|
49 | 49 | items:
|
50 | 50 | - name: Enable Microsoft Sentinel and initial features and content
|
|
57 | 57 | href: use-multiple-workspaces.md
|
58 | 58 | - name: Enable User and Entity Behavior Analytics (UEBA)
|
59 | 59 | href: enable-entity-behavior-analytics.md
|
60 |
| - - name: Configure data retention and archive |
| 60 | + - name: Configure data retention and archive |
61 | 61 | href: configure-data-retention-archive.md
|
62 | 62 | - name: Deploy side-by-side
|
63 | 63 | href: deploy-side-by-side.md
|
|
70 | 70 | - name: Use the SIEM migration experience
|
71 | 71 | href: siem-migration.md
|
72 | 72 | - name: Track migration with a workbook
|
73 |
| - href: migration-track.md |
74 |
| - - name: Migrate from ArcSight |
75 |
| - items: |
| 73 | + href: migration-track.md |
| 74 | + - name: Migrate from ArcSight |
| 75 | + items: |
76 | 76 | - name: Migrate detection rules
|
77 | 77 | href: migration-arcsight-detection-rules.md
|
78 | 78 | - name: Migrate SOAR automation
|
79 | 79 | href: migration-arcsight-automation.md
|
80 | 80 | - name: Export historical data
|
81 |
| - href: migration-arcsight-historical-data.md |
| 81 | + href: migration-arcsight-historical-data.md |
82 | 82 | - name: Migrate from Splunk
|
83 | 83 | items:
|
84 | 84 | - name: Migrate detection rules
|
|
87 | 87 | href: migration-splunk-automation.md
|
88 | 88 | - name: Export historical data
|
89 | 89 | href: migration-splunk-historical-data.md
|
90 |
| - - name: Migrate from QRadar |
| 90 | + - name: Migrate from QRadar |
91 | 91 | items:
|
92 | 92 | - name: Migrate detection rules
|
93 | 93 | href: migration-qradar-detection-rules.md
|
|
96 | 96 | - name: Export historical data
|
97 | 97 | href: migration-qradar-historical-data.md
|
98 | 98 | - name: Ingest historical data
|
99 |
| - items: |
| 99 | + items: |
100 | 100 | - name: Select target platform
|
101 | 101 | href: migration-ingestion-target-platform.md
|
102 | 102 | - name: Select data ingestion tool
|
|
105 | 105 | href: migration-export-ingest.md
|
106 | 106 | - name: Convert dashboards to workbooks
|
107 | 107 | href: migration-convert-dashboards.md
|
108 |
| - - name: Update SOC processes |
| 108 | + - name: Update SOC processes |
109 | 109 | href: migration-security-operations-center-processes.md
|
110 | 110 | - name: Enable solutions and content
|
111 |
| - items: |
| 111 | + items: |
112 | 112 | - name: Overview
|
113 | 113 | href: sentinel-solutions.md
|
114 | 114 | - name: Tutorial - Monitor Zero Trust security architectures
|
115 |
| - href: sentinel-solution.md |
| 115 | + href: sentinel-solution.md |
116 | 116 | - name: OOTB content centralization changes
|
117 | 117 | href: sentinel-content-centralize.md
|
118 | 118 | - name: Deploy out-of-the-box content
|
|
132 | 132 | - name: Overview
|
133 | 133 | href: ci-cd-custom-content.md
|
134 | 134 | - name: Deploy custom content from your repository
|
135 |
| - href: ci-cd.md |
| 135 | + href: ci-cd.md |
136 | 136 | - name: Customize repository deployments
|
137 | 137 | href: ci-cd-custom-deploy.md
|
138 | 138 | - name: Protect business applications
|
|
162 | 162 | - name: Configure auditing
|
163 | 163 | href: sap/configure-audit.md
|
164 | 164 | - name: Deploy the data connector agent
|
165 |
| - href: sap/deploy-data-connector-agent-container.md |
| 165 | + href: sap/deploy-data-connector-agent-container.md |
166 | 166 | - name: Deploy SAP security content
|
167 | 167 | href: sap/deploy-sap-security-content.md
|
168 | 168 | - name: Configure the solution
|
169 | 169 | href: sap/deployment-solution-configuration.md
|
170 | 170 | - name: Update the connector
|
171 |
| - href: sap/update-sap-data-connector.md |
| 171 | + href: sap/update-sap-data-connector.md |
172 | 172 | - name: Disable the connector
|
173 | 173 | displayName: disable, stop ingestion, stop
|
174 | 174 | href: sap/deployment-solution-configuration.md#stop-log-ingestion-and-disable-the-connector
|
175 | 175 | - name: Reference
|
176 |
| - items: |
| 176 | + items: |
177 | 177 | - name: SAP solution data reference
|
178 | 178 | href: sap/sap-solution-log-reference.md
|
179 | 179 | - name: Monitored SAP security parameters
|
180 | 180 | href: sap/sap-suspicious-configuration-security-parameters.md
|
181 | 181 | - name: SAP audit log workbook
|
182 | 182 | href: sap/sap-audit-log-workbook.md
|
183 | 183 | - name: SAP audit controls workbook
|
184 |
| - href: sap/sap-audit-controls-workbook.md |
| 184 | + href: sap/sap-audit-controls-workbook.md |
185 | 185 | - name: Kickstart script reference
|
186 | 186 | href: sap/reference-kickstart.md
|
187 | 187 | - name: Container update script reference
|
|
193 | 193 | - name: Optional deployment steps
|
194 | 194 | items:
|
195 | 195 | - name: Configure SAP data connector to use SNC
|
196 |
| - href: sap/configure-snc.md |
| 196 | + href: sap/configure-snc.md |
197 | 197 | - name: Collect SAP HANA audit logs
|
198 | 198 | href: sap/collect-sap-hana-audit-logs.md
|
199 | 199 | - name: Deploy SAP connector manually
|
|
0 commit comments