Skip to content

Commit 94c64ef

Browse files
committed
pre review comments
1 parent a48ca65 commit 94c64ef

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/sentinel/relate-alerts-to-incidents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ When adding an alert to an incident, depending on the circumstances, you might b
143143

144144
Adding and removing alerts to incidents are also available as Logic Apps actions in the Microsoft Sentinel connector, and therefore in Microsoft Sentinel playbooks. You need to supply the **incident ARM ID** and the **system alert ID** as parameters, and you can find them both in the playbook schema for both the alert and incident triggers.
145145

146-
Microsoft Sentinel supplies a sample playbook template in the templates gallery, that shows you how to work with this capability:
146+
Microsoft Sentinel supplies a sample playbook template in the templates gallery that shows you how to work with this capability:
147147

148148
:::image type="content" source="media/relate-alerts-to-incidents/playbook.png" alt-text="Screenshot of playbook template for relating alerts to incidents.":::
149149

0 commit comments

Comments
 (0)