You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Link to the incident|`incidentUrl`: The direct URL to the incident in the Microsoft Sentinel portal |`providerIncidentUrl` : This additional field provides a direct link to the incident, which can be used to synchronize this information with a third-party ticketing system like ServiceNow. `incidentUrl` is still available, but it points to the Microsoft Sentinel portal. |
161
-
| The sources that triggered the detection and published the alert |`alertProductNames`|`alertProductNames`: Requires adding `?$expand=alerts` to the GET. For example, `https://graph.microsoft.com/v1.0/security/incidents/368?$expand=alerts`|
162
-
| The name of the alert provider|`providerName` = "Azure Sentinel" |`providerName` = "Microsoft XDR" |
163
-
| The service or product that created the alert||`serviceSource` For example, "microsoftDefenderForCloudApps" |
164
-
| The detection technology or sensor that identified the notable component or activity ||`detectionSource` For example, "cloudAppSecurity"|
165
-
| The name of the product which published this alert. ||`productName` For example, "Microsoft Defender for Cloud Apps" |
160
+
|**Link to the incident**|`incidentUrl`: The direct URL to the incident in the Microsoft Sentinel portal |`providerIncidentUrl` : This additional field provides a direct link to the incident, which can be used to synchronize this information with a third-party ticketing system like ServiceNow. <br><br>`incidentUrl` is still available, but it points to the Microsoft Sentinel portal. |
161
+
|**The sources that triggered the detection and published the alert**|`alertProductNames`|`alertProductNames`: Requires adding `?$expand=alerts` to the GET. <br><br>For example, `https://graph.microsoft.com/v1.0/security/incidents/368?$expand=alerts`|
162
+
|**The name of the alert provider**|`providerName` = "Azure Sentinel" |`providerName` = "Microsoft XDR" |
163
+
|**The service or product that created the alert**|Doesn't exist in the Azure portal |`serviceSource`<br><br>For example, "microsoftDefenderForCloudApps" |
164
+
|**The detection technology or sensor that identified the notable component or activity**|Doesn't exist in the Azure portal|`detectionSource` For example, "cloudAppSecurity"|
165
+
|**The name of the product which published this alert**|Doesn't exist in the Azure portal|`productName` For example, "Microsoft Defender for Cloud Apps" |
0 commit comments