Skip to content

Commit 78d3d44

Browse files
Merge pull request #209774 from yelevin/yelevin/whats-new-archival
What's New archival 3/5
2 parents a3a7f2f + 4c04e89 commit 78d3d44

File tree

2 files changed

+47
-47
lines changed

2 files changed

+47
-47
lines changed

articles/sentinel/whats-new-archive.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,53 @@ Noted features are currently in PREVIEW. The [Azure Preview Supplemental Terms](
2525
> You can also contribute! Join us in the [Azure Sentinel Threat Hunters GitHub community](https://github.com/Azure/Azure-Sentinel/wiki).
2626
2727

28+
## October 2021
29+
30+
- [Windows Security Events connector using Azure Monitor Agent now in GA](#windows-security-events-connector-using-azure-monitor-agent-now-in-ga)
31+
- [Defender for Office 365 events now available in the Microsoft 365 Defender connector (Public preview)](#defender-for-office-365-events-now-available-in-the-microsoft-365-defender-connector-public-preview)
32+
- [Playbook templates and gallery now available (Public preview)](#playbook-templates-and-gallery-now-available-public-preview)
33+
- [Template versioning for your scheduled analytics rules (Public preview)](#manage-template-versions-for-your-scheduled-analytics-rules-public-preview)
34+
- [DHCP normalization schema (Public preview)](#dhcp-normalization-schema-public-preview)
35+
36+
### Windows Security Events connector using Azure Monitor Agent now in GA
37+
38+
The new version of the Windows Security Events connector, based on the Azure Monitor Agent, is now generally available. For more information, see [Connect to Windows servers to collect security events](connect-windows-security-events.md?tabs=AMA).
39+
40+
### Defender for Office 365 events now available in the Microsoft 365 Defender connector (Public preview)
41+
42+
In addition to those from Microsoft Defender for Endpoint, you can now ingest raw [advanced hunting events](/microsoft-365/security/defender/advanced-hunting-overview) from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/overview) through the [Microsoft 365 Defender connector](connect-microsoft-365-defender.md). [Learn more](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
43+
44+
### Playbook templates and gallery now available (Public preview)
45+
46+
A playbook template is a pre-built, tested, and ready-to-use workflow that can be customized to meet your needs. Templates can also serve as a reference for best practices when developing playbooks from scratch, or as inspiration for new automation scenarios.
47+
48+
Playbook templates have been developed by the Sentinel community, independent software vendors (ISVs), and Microsoft's own experts, and you can find them in the **Playbook templates** tab (under **Automation**), as part of an [Azure Sentinel solution](sentinel-solutions.md), or in the [Azure Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks).
49+
50+
For more information, see [Create and customize playbooks from built-in templates](use-playbook-templates.md).
51+
52+
### Manage template versions for your scheduled analytics rules (Public preview)
53+
54+
When you create analytics rules from [built-in Azure Sentinel rule templates](detect-threats-built-in.md), you effectively create a copy of the template. Past that point, the active rule is ***not*** dynamically updated to match any changes that get made to the originating template.
55+
56+
However, rules created from templates ***do*** remember which templates they came from, which allows you two advantages:
57+
58+
- If you made changes to a rule when creating it from a template (or at any time after that), you can always revert the rule back to its original version (as a copy of the template).
59+
60+
- If a template is updated, you'll be notified and you can choose to update your rules to the new version of their templates, or leave them as they are.
61+
62+
[Learn how to manage these tasks](manage-analytics-rule-templates.md), and what to keep in mind. These procedures apply to any [Scheduled](detect-threats-built-in.md#scheduled) analytics rules created from templates.
63+
64+
### DHCP normalization schema (Public preview)
65+
66+
The Advanced Security Information Model (ASIM) now supports a DHCP normalization schema, which is used to describe events reported by a DHCP server and is used by Azure Sentinel to enable source-agnostic analytics.
67+
68+
Events described in the DHCP normalization schema include serving requests for DHCP IP address leased from client systems and updating a DNS server with the leases granted.
69+
70+
For more information, see:
71+
72+
- [Azure Sentinel DHCP normalization schema reference (Public preview)](dhcp-normalization-schema.md)
73+
- [Normalization and the Azure Sentinel Information Model (ASIM)](normalization.md)
74+
2875
## September 2021
2976

3077
- [Data connector health enhancements (Public preview)](#data-connector-health-enhancements-public-preview)

articles/sentinel/whats-new.md

Lines changed: 0 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -655,53 +655,6 @@ The **Microsoft Sentinel Deception** solution includes a workbook to help you de
655655

656656
For more information, see [Deploy and monitor Azure Key Vault honeytokens with Microsoft Sentinel (Public preview)](monitor-key-vault-honeytokens.md).
657657

658-
## October 2021
659-
660-
- [Windows Security Events connector using Azure Monitor Agent now in GA](#windows-security-events-connector-using-azure-monitor-agent-now-in-ga)
661-
- [Defender for Office 365 events now available in the Microsoft 365 Defender connector (Public preview)](#defender-for-office-365-events-now-available-in-the-microsoft-365-defender-connector-public-preview)
662-
- [Playbook templates and gallery now available (Public preview)](#playbook-templates-and-gallery-now-available-public-preview)
663-
- [Template versioning for your scheduled analytics rules (Public preview)](#manage-template-versions-for-your-scheduled-analytics-rules-public-preview)
664-
- [DHCP normalization schema (Public preview)](#dhcp-normalization-schema-public-preview)
665-
666-
### Windows Security Events connector using Azure Monitor Agent now in GA
667-
668-
The new version of the Windows Security Events connector, based on the Azure Monitor Agent, is now generally available. For more information, see [Connect to Windows servers to collect security events](connect-windows-security-events.md?tabs=AMA).
669-
670-
### Defender for Office 365 events now available in the Microsoft 365 Defender connector (Public preview)
671-
672-
In addition to those from Microsoft Defender for Endpoint, you can now ingest raw [advanced hunting events](/microsoft-365/security/defender/advanced-hunting-overview) from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/overview) through the [Microsoft 365 Defender connector](connect-microsoft-365-defender.md). [Learn more](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
673-
674-
### Playbook templates and gallery now available (Public preview)
675-
676-
A playbook template is a pre-built, tested, and ready-to-use workflow that can be customized to meet your needs. Templates can also serve as a reference for best practices when developing playbooks from scratch, or as inspiration for new automation scenarios.
677-
678-
Playbook templates have been developed by the Sentinel community, independent software vendors (ISVs), and Microsoft's own experts, and you can find them in the **Playbook templates** tab (under **Automation**), as part of an [Azure Sentinel solution](sentinel-solutions.md), or in the [Azure Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks).
679-
680-
For more information, see [Create and customize playbooks from built-in templates](use-playbook-templates.md).
681-
682-
### Manage template versions for your scheduled analytics rules (Public preview)
683-
684-
When you create analytics rules from [built-in Azure Sentinel rule templates](detect-threats-built-in.md), you effectively create a copy of the template. Past that point, the active rule is ***not*** dynamically updated to match any changes that get made to the originating template.
685-
686-
However, rules created from templates ***do*** remember which templates they came from, which allows you two advantages:
687-
688-
- If you made changes to a rule when creating it from a template (or at any time after that), you can always revert the rule back to its original version (as a copy of the template).
689-
690-
- If a template is updated, you'll be notified and you can choose to update your rules to the new version of their templates, or leave them as they are.
691-
692-
[Learn how to manage these tasks](manage-analytics-rule-templates.md), and what to keep in mind. These procedures apply to any [Scheduled](detect-threats-built-in.md#scheduled) analytics rules created from templates.
693-
694-
### DHCP normalization schema (Public preview)
695-
696-
The Advanced Security Information Model (ASIM) now supports a DHCP normalization schema, which is used to describe events reported by a DHCP server and is used by Azure Sentinel to enable source-agnostic analytics.
697-
698-
Events described in the DHCP normalization schema include serving requests for DHCP IP address leased from client systems and updating a DNS server with the leases granted.
699-
700-
For more information, see:
701-
702-
- [Azure Sentinel DHCP normalization schema reference (Public preview)](dhcp-normalization-schema.md)
703-
- [Normalization and the Azure Sentinel Information Model (ASIM)](normalization.md)
704-
705658
## Next steps
706659

707660
> [!div class="nextstepaction"]

0 commit comments

Comments
 (0)