Skip to content

Commit b703b1d

Browse files
authored
Merge pull request #285489 from batamig/cust-intents-yechiel
Adding customer intents - Yechiel's files
2 parents 4edb101 + 9f757f6 commit b703b1d

File tree

95 files changed

+381
-24
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+381
-24
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,15 @@
22
title: Add entities to threat intelligence
33
titleSuffix: Microsoft Sentinel
44
description: Learn how to add a malicious entity discovered in an incident investigation to your threat intelligence in Microsoft Sentinel.
5-
author: yelevin
6-
ms.author: yelevin
5+
author: austinmccollum
6+
ms.author: austinmc
77
ms.topic: how-to
88
ms.date: 3/14/2024
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
12-
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so that I don't lose important information.
12+
13+
#Customer intent: As a security engineer, I want to add entities to threat intelligence during incident investigations so that my team can track and manage indicators of compromise effectively.
1314
---
1415

1516
# Add entities to threat intelligence in Microsoft Sentinel

articles/sentinel/ama-migrate.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: reference
66
ms.date: 10/01/2024
77
ms.author: yelevin
8+
9+
10+
#Customer intent: As a security engineer, I want to migrate from the Log Analytics Agent to the Azure Monitor Agent so that we can maintain support for our Microsoft Sentinel deployment, while benefiting from improved performance and new features.
11+
812
---
913

1014
# AMA migration for Microsoft Sentinel

articles/sentinel/anomalies-reference.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: reference
66
ms.date: 03/17/2024
77
ms.author: yelevin
8+
9+
10+
#Customer intent: As a security analyst, I want to understand the types of anomalies detected by machine learning models in my SIEM solution so that I can effectively monitor and respond to potential security threats.
11+
812
---
913

1014
# Anomalies detected by the Microsoft Sentinel machine learning engine

articles/sentinel/api-dcr-reference.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ ms.author: yelevin
66
ms.topic: reference
77
ms.date: 03/01/2024
88
ms.service: microsoft-sentinel
9+
10+
11+
#Customer intent: As a security engineer, I want to create Data Collection Rules (DCRs) using API requests so that I can automate the ingestion of supported log types into Microsoft Sentinel.
12+
913
---
1014
# API request examples for creating Data Collection Rules (DCRs)
1115

articles/sentinel/audit-track-tasks.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.date: 05/08/2023
8+
9+
10+
#Customer intent: As a SOC manager, I want to audit and track changes to incident tasks so that I can evaluate the effectiveness of task assignments and improve SOC efficiency.
11+
812
---
913

1014
# Audit and track changes to incident tasks in Microsoft Sentinel

articles/sentinel/bring-your-own-ml.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ ms.topic: conceptual
66
ms.date: 11/09/2021
77
ms.author: yelevin
88
ms.custom: devx-track-azurecli
9+
10+
11+
#Customer intent: As a security engineer, I want to build and integrate custom machine learning models into my security operations platform so that we can detect and respond to threats specific to our organization's environment.
12+
913
---
1014

1115
# Bring your own Machine Learning (ML) into Microsoft Sentinel

articles/sentinel/cef-syslog-ama-overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,10 @@ ms.author: yelevin
66
ms.topic: concept-article
77
ms.custom: linux-related-content
88
ms.date: 07/12/2024
9-
#Customer intent: As a security operator, I want to understand how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent so that I can determine if this solution fits my organization's needs.
9+
10+
11+
#Customer intent: As a security engineer, I want to collect Syslog and CEF messages from various devices, either directly or using a centralized log forwarder, so that I can efficiently monitor and respond to security threats.
12+
1013
---
1114

1215
# Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel

articles/sentinel/collaborate-in-microsoft-teams.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: how-to
66
ms.date: 03/30/2022
77
ms.author: yelevin
8+
9+
10+
#Customer intent: As a security analyst, I want to take advantage of Microsoft Teams' integration with Microsoft Sentinel to collaborate efficiently on incident investigations with my team.
11+
812
---
913

1014
# Collaborate in Microsoft Teams (Public preview)

articles/sentinel/configure-connector-login-detection.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: how-to
66
ms.date: 02/24/2023
77
ms.author: yelevin
8+
9+
10+
#Customer intent: As a security engineer, I want to enable the detection of anomalous RDP logins, so that analysts can identify and respond to the resulting potential security threats in my network.
11+
812
---
913

1014
# Configure the Security Events or Windows Security Events connector for anomalous RDP login detection

articles/sentinel/configure-data-transformation.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.date: 02/27/2022
8+
9+
10+
#Customer intent: As a security engineer, I want to configure ingestion-time data transformation and custom log ingestion so that I can control, filter, and enrich data before it is ingested into Microsoft Sentinel.
11+
812
---
913

1014
# Transform or customize data at ingestion time in Microsoft Sentinel (preview)

0 commit comments

Comments
 (0)