Skip to content

Commit be6c6d7

Browse files
author
cabailey
committed
wording updates
1 parent 832995e commit be6c6d7

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/sentinel/bookmarks.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Currently in preview, if you find something that urgently needs to be addressed
3131

3232
Also in preview, you can visualize your bookmarked data, by clicking **Investigate** from bookmark details. This launches the investigation experience in which you can view, investigate, and visually communicate your findings using an interactive entity-graph diagram and timeline.
3333

34-
## Run a Log Analytics query from Azure Sentinel and add a bookmark
34+
## Add a bookmark
3535

3636
1. In the Azure portal, navigate to **Sentinel** > **Threat management** > **Hunting** to run queries for suspicious and anomalous behavior.
3737

@@ -51,18 +51,18 @@ Also in preview, you can visualize your bookmarked data, by clicking **Investiga
5151
5252
6. On the right, in the **Add hunting bookmark** blade, optionally, update the bookmark name, add tags, and notes to help you identify what was interesting about the item.
5353

54-
7. In the **Query information** section, use the drop down boxes to extract information from the query results for the **Account**, **Host**, and **IP address** entity types. This action maps the selected entity type to a specific column from the query result. For example:
54+
7. In the **Query Information** section, use the drop down boxes to extract information from the query results for the **Account**, **Host**, and **IP address** entity types. This action maps the selected entity type to a specific column from the query result. For example:
5555

5656
> [!div class="mx-imgBorder"]
5757
> ![Map entity types for hunting bookmark](./media/bookmarks/map-entity-types-bookmark.png)
5858
59-
To view the bookmark in the investigation graph, you must map at least one entity type that is either **Account**, **Machine**, or **IP address**.
59+
To view the bookmark in the investigation graph (currently in preview), you must map at least one entity type that is either **Account**, **Host**, or **IP address**.
6060

6161
5. Click **Add** to commit your changes and add the bookmark. All bookmarked data is shared with other investigators, and is a first step toward a collaborative investigation experience.
6262

6363

6464
> [!NOTE]
65-
> The log query results support bookmarks whenever this blade is opened from Azure Sentinel. For example, you select **General** > **Logs** from the navigation bar, select event links in the investigations graph, or select an alert ID from the full details of an incident. The ability to create bookmarks is not present when the **Logs** blade is opened from other locations, such as directly from Azure Monitor.
65+
> The log query results support bookmarks whenever this blade is opened from Azure Sentinel. For example, you select **General** > **Logs** from the navigation bar, select event links in the investigations graph, or select an alert ID from the full details of an incident. You can't create bookmarks when the **Logs** blade is opened from other locations, such as directly from Azure Monitor.
6666
6767
## View and update bookmarks
6868

0 commit comments

Comments
 (0)