Skip to content

Commit c52be89

Browse files
authored
Merge pull request #285488 from batamig/cust-intents-batami
Adding customer intents - Batami's files - needs more analysis
2 parents e8e281e + 7645a0d commit c52be89

File tree

60 files changed

+240
-46
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+240
-46
lines changed

articles/sentinel/add-advanced-conditions-to-automation-rules.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ appliesto:
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
1212

13+
14+
15+
#Customer intent: As a security operations center (SOC) analyst, I want to add advanced conditions to automation rules so that I can more effectively triage incidents and improve response efficiency.
16+
1317
---
1418

1519
# Add advanced conditions to Microsoft Sentinel automation rules

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ appliesto:
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
1212

13+
14+
15+
#Customer intent: As a SOC analyst, I want to automate incident response tasks using automation rules so that I can streamline threat management and improve operational efficiency.
16+
1317
---
1418

1519
# Automate threat response in Microsoft Sentinel with automation rules

articles/sentinel/automation/authenticate-playbooks-to-sentinel.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customerIntent: As a SOC engineer, I want to understand my options when authenticating from playbooks to Microsoft Sentinel.
12+
13+
#Customer intent: As a security analyst, I want to authenticate playbooks to Microsoft Sentinel so that I can automate and orchestrate security tasks efficiently.
14+
1315
---
1416

1517
# Authenticate playbooks to Microsoft Sentinel

articles/sentinel/automation/automate-responses-with-playbooks.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customerIntent: As a SOC engineer, I want to understand how Microsoft Sentinel playbooks can help make my SOC team more efficient.
12+
#Customer intent: As a SOC analyst, I want to automate threat response using playbooks so that I can efficiently manage security alerts and incidents, reducing manual intervention and focusing on deeper investigations.
13+
1314
---
1415

1516
# Automate threat response with playbooks in Microsoft Sentinel

articles/sentinel/automation/automation.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customerIntent: As a SOC engineer, I want to understand how automation in Microsoft Sentinel can help my SOC team be more efficient and remediate threats quicker.
12+
#Customer intent: As a SOC analyst, I want to automate incident response and remediation tasks using SOAR capabilities so that I can focus on investigating advanced threats and reduce the risk of missed alerts.
13+
1314
---
1415

1516
# Automation in Microsoft Sentinel: Security orchestration, automation, and response (SOAR)

articles/sentinel/automation/create-playbooks.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customer-intent: As a SOC engineer, I want to understand how to create playbooks in Microsoft Sentinel so that my team can automate threat responses in our environment.
12+
#Customer intent: As a security analyst, I want to manage automated response playbooks so that I can efficiently handle incidents and alerts in my environment.
13+
1314
---
1415

1516
# Create and manage Microsoft Sentinel playbooks

articles/sentinel/automation/create-tasks-playbook.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customerIntent: As a SOC analyst, I want to understand how to use playbooks to manage complex analysis processes in Microsoft Sentinel.
12+
13+
#Customer intent: As a security analyst, I want to automate incident management tasks using playbooks so that I can streamline and manage complex workflows efficiently.
14+
1315
---
1416

1517
# Create and perform incident tasks in Microsoft Sentinel using playbooks

articles/sentinel/automation/define-playbook-access-restrictions.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customerIntent: As a SOC engineer who's using Standard-plan playbooks, I want to understand how to define an access restriction policy, ensure that only Microsoft Sentinel has access to my Standard logic app with my playbook workflows.
12+
13+
#Customer intent: As a security engineer using Standard-plan playbooks, I want to define an access restriction policy for playbooks so that I can ensure only authorized services can access sensitive workflows.
14+
1315
---
1416

1517
# Define an access restriction policy for Standard-plan playbooks

articles/sentinel/automation/logic-apps-playbooks.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customer intent: As a SOC engineer, I want to understand more about how Azure Logic Apps works with Microsoft Sentinel playbooks to help me automate threat prevention and response.
12+
13+
#Customer intent: As a security engineer, I want to manage automated workflows using Azure Logic Apps for Microsoft Sentinel so that I can efficiently respond to security incidents and alerts.
1314

1415
---
1516

articles/sentinel/automation/migrate-playbooks-to-automation-rules.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
1111
ms.collection: usx-security
12-
#customerIntent: As a SOC engineer, I want to understand how to migrate alert-trigger playbooks to automation rules, and why I might want to do so.
12+
13+
#Customer intent: As a security engineer, I want to migrate my alert-trigger playbooks to automation rules so that I can streamline automation management and prepare for the deprecation of analytics rule triggers.
14+
1315
---
1416

1517
# Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules

0 commit comments

Comments
 (0)