Skip to content

Commit 678c93d

Browse files
authored
Merge pull request #300363 from EdB-MSFT/AUTOGEN-Sentinel-connectors-Mon_May_26_2025-1620
[AUTOGEN] PR for Sentinel connectors
2 parents c50006e + f5a57a6 commit 678c93d

File tree

242 files changed

+339
-21345
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

242 files changed

+339
-21345
lines changed

articles/ddos-protection/ddos-protection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ For more information about the tiers, see [DDoS Protection tier comparison](ddos
4343
- **DDoS Protection analytics, metrics, and alerting:**
4444
Azure DDoS Protection applies three auto-tuned mitigation policies (TCP SYN, TCP, and UDP) for each public IP of the protected resource, in the virtual network that has DDoS enabled. The policy thresholds are auto-configured via machine learning-based network traffic profiling. DDoS mitigation occurs for an IP address under attack only when the policy threshold is exceeded.
4545
- **Attack analytics:**
46-
Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to [Microsoft Sentinel](../sentinel/data-connectors/azure-ddos-protection.md) or an offline security information and event management (SIEM) system for near real-time monitoring during an attack. See [View and configure DDoS diagnostic logging](diagnostic-logging.md) to learn more.
46+
Get detailed reports in five-minute increments during an attack, and a complete summary after the attack ends. Stream mitigation flow logs to [Microsoft Sentinel](../sentinel/data-connectors-reference.md#azure-ddos-protection) or an offline security information and event management (SIEM) system for near real-time monitoring during an attack. See [View and configure DDoS diagnostic logging](diagnostic-logging.md) to learn more.
4747

4848
- **Attack metrics:**
4949
Summarized metrics from each attack are accessible through Azure Monitor. See [View and configure DDoS protection telemetry](telemetry.md) to learn more.

articles/ddos-protection/monitor-ddos-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Telemetry for an attack is provided through Azure Monitor in real time. While [m
3535

3636
You can view DDoS telemetry for a protected public IP address through three different resource types: DDoS protection plan, virtual network, and public IP address.
3737

38-
Logging can be further integrated with [Microsoft Sentinel](../sentinel/data-connectors/azure-ddos-protection.md), Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.
38+
Logging can be further integrated with [Microsoft Sentinel](../sentinel/data-connectors-reference.md#azure-ddos-protection), Splunk (Azure Event Hubs), OMS Log Analytics, and Azure Storage for advanced analysis via the Azure Monitor Diagnostics interface.
3939

4040
For more information on metrics, see [Monitoring Azure DDoS Protection](monitor-ddos-protection-reference.md) for details on DDoS Protection monitoring logs.
4141

articles/defender-for-iot/organizations/iot-solution.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Before you start, make sure you have the following requirements on your workspac
3434

3535
## Connect your data from Defender for IoT to Microsoft Sentinel
3636

37-
Start by enabling the [Defender for IoT data connector](../../sentinel/data-connectors/microsoft-defender-for-iot.md) to stream all your Defender for IoT events into Microsoft Sentinel.
37+
Start by enabling the [Defender for IoT data connector](../../sentinel/data-connectors-reference.md#microsoft-defender-for-iot) to stream all your Defender for IoT events into Microsoft Sentinel.
3838

3939
**To enable the Defender for IoT data connector**:
4040

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -521,7 +521,7 @@ Your organization might have already configured a diagnostic setting to integrat
521521

522522
:::image type="content" source="./media/elevate-access-global-admin/sentinel-entra-id-solution.png" alt-text="Screenshot of Content hub page with Microsoft Entra ID content selected." lightbox="./media/elevate-access-global-admin/sentinel-entra-id-solution.png":::
523523

524-
1. Use the [Microsoft Entra ID connector](../sentinel/data-connectors/microsoft-entra-id.md) to collect data from Microsoft Entra ID by following the steps at [Connect Microsoft Entra data to Microsoft Sentinel](../sentinel/connect-azure-active-directory.md).
524+
1. Use the [Microsoft Entra ID connector](../sentinel/data-connectors-reference.md#microsoft-entra-id) to collect data from Microsoft Entra ID by following the steps at [Connect Microsoft Entra data to Microsoft Sentinel](../sentinel/connect-azure-active-directory.md).
525525

526526
1. On the **Data connectors** page, add a check mark for **Audit Logs**.
527527

articles/security/fundamentals/feature-availability.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ Office 365 GCC is paired with Microsoft Entra ID in Azure. Office 365 GCC High a
226226
227227
| Connector | Azure | Azure Government |
228228
|--|--|--|
229-
| **[Office IRM](../../sentinel/data-connectors/microsoft-365-insider-risk-management.md)** | | |
229+
| **[Office IRM](../../sentinel/data-connectors-reference.md#microsoft-365-insider-risk-management)** | | |
230230
| - Office 365 GCC | Public Preview | - |
231231
| - Office 365 GCC High | - | Not Available |
232232
| - Office 365 DoD | - | Not Available |
@@ -238,39 +238,39 @@ Office 365 GCC is paired with Microsoft Entra ID in Azure. Office 365 GCC High a
238238
| - Office 365 GCC | Public Preview | - |
239239
| - Office 365 GCC High | - | Public Preview |
240240
| - Office 365 DoD | - | Public Preview |
241-
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors/microsoft-defender-for-cloud-apps.md)** | | |
241+
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors-reference.md#microsoft-defender-for-cloud-apps)** | | |
242242
| - Office 365 GCC | GA | - |
243243
| - Office 365 GCC High | - | GA |
244244
| - Office 365 DoD | - | GA |
245-
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors/microsoft-defender-for-cloud-apps.md)** <br>Shadow IT logs | | |
245+
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors-reference.md#microsoft-defender-for-cloud-apps)** <br>Shadow IT logs | | |
246246
| - Office 365 GCC | Public Preview | - |
247247
| - Office 365 GCC High | - | Public Preview |
248248
| - Office 365 DoD | - | Public Preview |
249-
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors/microsoft-defender-for-cloud-apps.md)** <br>Alerts | | |
249+
| **[Microsoft Defender for Cloud Apps](../../sentinel/data-connectors-reference.md#microsoft-defender-for-cloud-apps)** <br>Alerts | | |
250250
| - Office 365 GCC | Public Preview | - |
251251
| - Office 365 GCC High | - | Public Preview |
252252
| - Office 365 DoD | - | Public Preview |
253-
| **[Microsoft Defender for Endpoint](../../sentinel/data-connectors/microsoft-defender-for-endpoint.md)** | | |
253+
| **[Microsoft Defender for Endpoint](../../sentinel/data-connectors-reference.md#microsoft-defender-for-endpoint)** | | |
254254
| - Office 365 GCC | GA | - |
255255
| - Office 365 GCC High | - | GA |
256256
| - Office 365 DoD | - | GA |
257-
| **[Microsoft Defender for Identity](../../sentinel/data-connectors/microsoft-defender-for-identity.md)** | | |
257+
| **[Microsoft Defender for Identity](../../sentinel/data-connectors-reference.md#microsoft-defender-for-identity)** | | |
258258
| - Office 365 GCC | Public Preview | - |
259259
| - Office 365 GCC High | - | Not Available |
260260
| - Office 365 DoD | - | Not Available |
261-
| **[Microsoft Defender for Office 365](../../sentinel/data-connectors/microsoft-defender-for-office-365.md)** | | |
261+
| **[Microsoft Defender for Office 365](../../sentinel/data-connectors-reference.md#microsoft-defender-for-office-365-preview)** | | |
262262
| - Office 365 GCC | Public Preview | - |
263263
| - Office 365 GCC High | - | Not Available |
264264
| - Office 365 DoD | - | Not Available |
265-
| - **[Microsoft Power BI](../../sentinel/data-connectors/microsoft-powerbi.md)** | | |
265+
| - **[Microsoft Power BI](../../sentinel/data-connectors-reference.md#microsoft-powerbi)** | | |
266266
| - Office 365 GCC | Public Preview | - |
267267
| - Office 365 GCC High | - | Not Available |
268268
| - Office 365 DoD | - | Not Available |
269-
| - **[Microsoft Project](../../sentinel/data-connectors/microsoft-project.md)** | | |
269+
| - **[Microsoft Project](../../sentinel/data-connectors-reference.md#microsoft-project)** | | |
270270
| - Office 365 GCC | Public Preview | - |
271271
| - Office 365 GCC High | - | Not Available |
272272
| - Office 365 DoD | - | Not Available |
273-
| **[Office 365](../../sentinel/data-connectors/office-365.md)** | | |
273+
| **[Office 365](../../sentinel/data-connectors-reference.md#microsoft-365-formerly-office-365)** | | |
274274
| - Office 365 GCC | GA | - |
275275
| - Office 365 GCC High | - | GA |
276276
| - Office 365 DoD | - | GA |

0 commit comments

Comments
 (0)