Skip to content

Commit a3f2bac

Browse files
authored
Refining note about USX support for automation rules
1 parent 3010136 commit a3f2bac

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,9 +81,11 @@ The main reason to use **alert-triggered automation** is for responding to alert
8181
- A playbook can be triggered by an alert and send the alert to an external ticketing system for incident creation and management, creating a new ticket for each alert.
8282

8383
> [!NOTE]
84-
> - Alert-triggered automation is available only for [alerts](detect-threats-built-in.md) created by **Scheduled** analytics rules. Alerts created by **Microsoft Security** analytics rules are not supported.
84+
> - Alert-triggered automation is available only for alerts created by [**Scheduled** and **NRT** analytics rules](detect-threats-built-in.md). Alerts created by **Microsoft Security** analytics rules are not supported.
8585
>
86-
> - Alert-triggered automation is not currently available in the unified security operations platform in the Microsoft Defender portal.
86+
> - Similarly, alert-triggered automation for alerts created by Microsoft Defender XDR is not available in the unified security operations platform in the Microsoft Defender portal.
87+
>
88+
> - For more information, see [Automation with the unified security operations platform](automation.md#automation-with-the-unified-security-operations-platform).
8789
8890
### Conditions
8991

0 commit comments

Comments
 (0)