Skip to content

Commit b49d656

Browse files
committed
Final drafts
1 parent 177dc46 commit b49d656

File tree

6 files changed

+31
-276
lines changed

6 files changed

+31
-276
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25913,6 +25913,11 @@
2591325913
"redirect_url": "/azure/sentinel/data-connectors-reference#windows-firewall",
2591425914
"redirect_document_id": false
2591525915
},
25916+
{
25917+
"source_path_from_root": "/articles/sentinel/connect-windows-security-events.md",
25918+
"redirect_url": "/azure/sentinel/data-connectors-reference#windows-security-events-preview",
25919+
"redirect_document_id": false
25920+
},
2591625921
{
2591725922
"source_path_from_root": "/articles/sentinel/connect-wirex-systems.md",
2591825923
"redirect_url": "/azure/sentinel/data-connectors-reference#wirex-network-forensics-platform-preview",

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -310,6 +310,8 @@
310310
href: entities-reference.md
311311
- name: UEBA enrichments
312312
href: ueba-enrichments.md
313+
- name: Common threat detection scenarios
314+
href: common-threat-detection-scenarios.md
313315
- name: Watchlist template schemas
314316
href: watchlist-schemas.md
315317
- name: Kusto Query Language

articles/sentinel/connect-azure-windows-microsoft-services.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ You'll see all your data collection rules (including those created through the A
194194
195195
### Create data collection rules using the API
196196
197-
You can also create data collection rules using the API ([see schema](/rest/api/monitor/data-collection-rules)), which can make life easier if you're creating many rules (if you're an MSSP, for example). Here's an example you can use as a template for creating a rule:
197+
You can also create data collection rules using the API ([see schema](/rest/api/monitor/data-collection-rules)), which can make life easier if you're creating many rules (if you're an MSSP, for example). Here's an example (for the [Windows Security Events](data-connectors-reference.md#windows-security-events-preview) connector) that you can use as a template for creating a rule:
198198
199199
**Request URL and header**
200200
@@ -242,6 +242,8 @@ PUT https://management.azure.com/subscriptions/703362b3-f278-4e4b-9179-c76eaf41f
242242
}
243243
}
244244
```
245+
See this [complete description of data collection rules](../azure-monitor/agents/data-collection-rule-overview.md) from the Azure Monitor documentation.
246+
245247

246248
# [Log Analytics Agent (Legacy)](#tab/LAA)
247249

0 commit comments

Comments
 (0)