Skip to content

Commit c0002d5

Browse files
Merge pull request #302014 from mberdugo/Freshness
Freshness
2 parents f4c105e + 276c468 commit c0002d5

File tree

2 files changed

+24
-15
lines changed

2 files changed

+24
-15
lines changed

articles/sentinel/bookmarks.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ appliesto:
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
- Microsoft Sentinel in the Azure portal
1212

13-
1413
#Customer intent: As a security analyst, I want to create and manage hunting bookmarks so that I can preserve and collaborate on relevant threat investigation data.
1514

1615
---
@@ -19,16 +18,18 @@ appliesto:
1918

2019
Hunting bookmarks in Microsoft Sentinel helps you preserve the queries and query results that you deem relevant. You can also record your contextual observations and reference your findings by adding notes and tags. Bookmarked data is visible to you and your teammates for easy collaboration. For more information, see [Bookmarks](hunting.md#bookmarks-to-keep-track-of-data).
2120

21+
>[!NOTE]
22+
> Bookmarks can only be created in the Azure portal. While you can't add bookmarks in the Microsoft Defender portal, you can see bookmarks that were already created.
23+
2224
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2325

24-
## Add a bookmark
26+
## Add a bookmark (Azure portal only)
2527

2628
Create a bookmark to preserve the queries, results, your observations, and findings.
2729

28-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management** select **Hunting**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Hunting**.
29-
1. From the **Hunting** tab, select a hunt.
30-
1. Select one of the hunting queries.
31-
1. In the hunting query details, select **Run Query**.
30+
1. Under **Threat management**, select **Hunting**.
31+
1. From the **Queries** tab, select one or more of the hunting queries.
32+
1. From the top command bar, select **Run selected queries**.
3233

3334
1. Select **View query results**. For example:
3435

@@ -38,7 +39,7 @@ Create a bookmark to preserve the queries, results, your observations, and findi
3839

3940
1. From the log query results list, use the checkboxes to select one or more rows that contain the information you find interesting.
4041

41-
1. Select **Add bookmark**:
42+
1. In Azure portal, select **Add bookmark**:
4243

4344
:::image type="content" source="media/bookmarks/add-hunting-bookmark.png" alt-text="Screenshot of adding hunting bookmark to query." lightbox="media/bookmarks/add-hunting-bookmark.png":::
4445

@@ -54,9 +55,9 @@ Create a bookmark to preserve the queries, results, your observations, and findi
5455

5556
To view the bookmark in the investigation graph, you must map at least one entity. Entity mappings to account, host, IP, and URL entity types you created are supported, preserving backwards compatibility.
5657

57-
1. Select **Save** to commit your changes and add the bookmark. All bookmarked data is shared with other analysts, and is a first step toward a collaborative investigation experience.
58+
1. Select **Create** to commit your changes and add the bookmark. All bookmarked data is shared with other analysts, and is a first step toward a collaborative investigation experience.
5859

59-
The log query results support bookmarks whenever this pane is opened from Microsoft Sentinel. For example, you select **General** > **Logs** from the navigation bar, select event links in the investigations graph, or select an alert ID from the full details of an incident. You can't create bookmarks when the **Logs** pane is opened from other locations, such as directly from Azure Monitor.
60+
The log query results support bookmarks whenever this pane is opened from Microsoft Sentinel. For example, if you select **General** > **Logs** from the navigation bar, select event links in the investigations graph, or select an alert ID from the full details of an incident. You can't create bookmarks when the **Logs** pane is opened from another location, such as directly from Azure Monitor.
6061

6162
## View and update bookmarks
6263

@@ -84,9 +85,9 @@ Visualize your bookmarked data by launching the investigation experience in whic
8485

8586
For instructions to use the investigation graph, see [Use the investigation graph to deep dive](investigate-cases.md#use-the-investigation-graph-to-deep-dive).
8687

87-
## Add bookmarks to a new or existing incident
88+
## Add bookmarks to a new or existing incident (Azure portal only)
8889

89-
Add bookmarks to an incident from the bookmarks tab on the **Hunting** page.
90+
Add bookmarks to an incident from the bookmarks tab on the **Hunting** page.
9091

9192
1. From the **Bookmarks** tab, select the bookmark or bookmarks you want to add to an incident.
9293

@@ -104,7 +105,6 @@ Add bookmarks to an incident from the bookmarks tab on the **Hunting** page.
104105
1. Select the incident with your bookmark and **View full details**.
105106
1. On the incident page, in the left pane, select the **Bookmarks**.
106107

107-
108108
## View bookmarked data in logs
109109

110110
View bookmarked queries, results, or their history.

articles/sentinel/ci-cd.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,20 @@ When creating custom content, you can manage it from your own Microsoft Sentinel
3030
Microsoft Sentinel currently supports connections to GitHub and Azure DevOps repositories. Before connecting your Microsoft Sentinel workspace to your source control repository, make sure that you have:
3131

3232
- An **Owner** role in the resource group that contains your Microsoft Sentinel workspace *or* a combination of **User Access Administrator** and **Sentinel Contributor** roles to create the connection
33-
- Collaborator access to your GitHub repository or Project Administrator access to your Azure DevOps repository
33+
- Ensure custom content files you want to deploy to your workspaces are in a supported format. For supported formats, see [Plan your repository content](ci-cd-custom-content.md#plan-your-repository-content).
34+
35+
### [GitHub prerequisites](#tab/github)
36+
37+
- Collaborator access to your GitHub repository
3438
- Actions enabled for GitHub and Pipelines enabled for Azure DevOps
39+
40+
### [Azure DevOps prerequisites](#tab/azure-devops)
41+
42+
- Project Administrator access to your Azure DevOps repository
3543
- Third-party application access via OAuth enabled for Azure DevOps [application connection policies](/azure/devops/organizations/accounts/change-application-access-policies#manage-a-policy).
36-
- An Azure DevOps connection must be in the same tenant as your Microsoft Sentinel workspace
37-
- Ensure custom content files you want to deploy to your workspaces are in a supported format. For supported formats, see [Plan your repository content](ci-cd-custom-content.md#plan-your-repository-content).
44+
- An Azure DevOps connection in the same tenant as your Microsoft Sentinel workspace
45+
46+
---
3847

3948
For more information on deployable content types, see [Validate your content](ci-cd-custom-content.md#validate-your-content).
4049

0 commit comments

Comments
 (0)