Skip to content

Commit a000bc3

Browse files
committed
Continued work 2
1 parent ec623ad commit a000bc3

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/sentinel/hunting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ For more information, see:
200200

201201
## Useful operators and functions
202202

203-
Hunting queries are built in [Kusto Query Language (KQL)](/azure/data-explorer/kusto/query/), a powerful query language with IntelliSense language that gives you the power and flexibility you need to take hunting to the next level.
203+
Hunting queries are built in [Kusto Query Language (KQL)](/kusto/query/?view=microsoft-sentinel&preserve-view=true), a powerful query language with IntelliSense language that gives you the power and flexibility you need to take hunting to the next level.
204204

205205
It's the same language used by the queries in your analytics rules and elsewhere in Microsoft Sentinel. For more information, see [Query Language Reference](/azure/azure-monitor/logs/get-started-queries).
206206

articles/sentinel/hunts-custom-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Only queries that from a custom content source can be edited. Other content sour
7575

7676
## Related content
7777

78-
- [KQL quick reference](/azure/data-explorer/kusto/query/kql-quick-reference?toc=%2Fazure%2Fsentinel%2FTOC.json&bc=%2Fazure%2Fsentinel%2Fbreadcrumb%2Ftoc.json)
78+
- [KQL quick reference](/kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true&toc=%2Fazure%2Fsentinel%2FTOC.json&bc=%2Fazure%2Fsentinel%2Fbreadcrumb%2Ftoc.json)
7979
- [Advanced Security Information Model (ASIM) parser](normalization-about-parsers.md)
8080
- [Threat hunting in Microsoft Sentinel](hunting.md)
8181
- [Conduct end-to-end proactive threat hunting in Microsoft Sentinel](hunts.md)

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Information about **entity pages** can now be found at [Entity pages in Microsof
7777

7878
## Querying behavior analytics data
7979

80-
Using [KQL](/azure/data-explorer/kusto/query/), we can query the **BehaviorAnalytics** table.
80+
Using [KQL](/kusto/query/?view=microsoft-sentinel&preserve-view=true), we can query the **BehaviorAnalytics** table.
8181

8282
For example – if we want to find all the cases of a user that failed to sign in to an Azure resource, where it was the user's first attempt to connect from a given country/region, and connections from that country/region are uncommon even for the user's peers, we can use the following query:
8383

0 commit comments

Comments
 (0)