Skip to content

Commit 62c8dc4

Browse files
author
cabailey
committed
Consistent preview disclaimers for the 4 connectors
1 parent 3388b1b commit 62c8dc4

File tree

3 files changed

+18
-13
lines changed

3 files changed

+18
-13
lines changed

articles/sentinel/connect-azure-atp.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,12 @@ ms.date: 09/23/2019
1717
ms.author: rkarlin
1818

1919
---
20-
# Connect data from Azure Advanced Threat Protection (ATP) - Preview
21-
22-
20+
# Connect data from Azure Advanced Threat Protection (ATP)
2321

22+
> [!IMPORTANT]
23+
> The Azure Advanced Threat Protection data connector in Azure Sentinel is currently in public preview.
24+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2426
2527
You can stream logs from [Azure Advanced Threat Protection](https://docs.microsoft.com/azure-advanced-threat-protection/what-is-atp) into Azure Sentinel with a single click.
2628

@@ -37,7 +39,7 @@ If Azure ATP is deployed and ingesting your data, the suspicious alerts can easi
3739

3840
1. To connect Azure ATP to Azure Sentinel, you must first enable integration between Azure ATP and Microsoft Cloud App Security. For information on how to do this, see [Azure Advanced Threat Protection integration](https://docs.microsoft.com/cloud-app-security/aatp-integration).
3941

40-
1. In Azure Sentinel, select **Data connectors** and then click the **Azure ATP** tile.
42+
1. In Azure Sentinel, select **Data connectors** and then click the **Azure Advanced Threat Protection (Preview)** tile.
4143

4244
1. You can select whether you want the alerts from Azure ATP to automatically generate incidents in Azure Sentinel automatically. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
4345

articles/sentinel/connect-azure-information-protection.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@ ms.author: cabailey
2020

2121
# Connect data from Azure Information Protection
2222

23+
> [!IMPORTANT]
24+
> The Azure Information Protection data connector in Azure Sentinel is currently in public preview.
25+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
26+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
27+
2328
You can stream logging information from [Azure Information Protection](https://azure.microsoft.com/services/information-protection/) into Azure Sentinel by configuring the Azure Information Protection data connector. Azure Information Protection helps you control and secure your sensitive data, whether it’s stored in the cloud or on-premises.
2429

2530
If [central reporting for Azure Information Protection](https://docs.microsoft.com/azure/information-protection/reports-aip) is already configured so that logging information from this service is stored in the same Log Analytics workspace as you've currently selected for Azure Sentinel, you can skip the configuration of this data connector. The logging information from Azure Information Protection is already available to Azure Sentinel.
@@ -52,11 +57,6 @@ However, if logging information from Azure Information Protection is going to a
5257

5358
## Connect to Azure Information Protection
5459

55-
> [!IMPORTANT]
56-
> The Azure Information Protection data connector in Azure Sentinel is currently in public preview.
57-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
58-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
59-
6060
Use the following instructions if you haven't configured a Log Analytics workspace for Azure Information Protection, or you need to change the workspace that stores the Azure Information Protection logging information.
6161

6262
1. In Azure Sentinel, select **Data connectors**, and then **Azure Information Protection (Preview)**.

articles/sentinel/connect-dns.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,16 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/23/2019
17+
ms.date: 09/24/2019
1818
ms.author: rkarlin
1919

2020
---
21-
# Connect your domain name server - Preview
22-
21+
# Connect your domain name server
2322

23+
> [!IMPORTANT]
24+
> The DNS data connector in Azure Sentinel is currently in public preview.
25+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
26+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2427
2528
You can connect any Domain Name Server (DNS) running on Windows to Azure Sentinel. This is done by installing an agent on the DNS machine. Using DNS logs, you can gain security, performance, and operations-related insights into the DNS infrastructure of your organization by collecting, analyzing, and correlating analytic and audit logs and other related data from the DNS servers.
2629

@@ -49,7 +52,7 @@ The solution collects DNS inventory and DNS event-related data from the DNS serv
4952

5053
## Connect your DNS appliance
5154

52-
1. In the Azure Sentinel portal, select **Data connectors** and choose the **DNS** tile.
55+
1. In the Azure Sentinel portal, select **Data connectors** and choose the **DNS (Preview)** tile.
5356
1. If your DNS machines are in Azure:
5457
1. Click **Install agent on Azure Windows virtual machine**.
5558
1. In the **Virtual machines** list, select the DNS machine you want to stream into Azure Sentinel. Make sure this is a Windows VM.

0 commit comments

Comments
 (0)