Skip to content

Commit dce5416

Browse files
committed
Merge branch 'cust-intents-yechiel' of https://github.com/batamig/azure-docs-pr into cust-intents-yechiel
2 parents 60673e1 + 4490fd3 commit dce5416

File tree

65 files changed

+63
-70
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+63
-70
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ ms.date: 3/14/2024
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
12-
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
1312

1413

1514
#Customer intent: [AI]As a security analyst, I want to add entities to threat intelligence so that I can track and manage indicators of compromise effectively during incident investigations.

articles/sentinel/ama-migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 04/03/2024
77
ms.author: yelevin
88

99

10-
#Customer intent: [AI]As a security operations analyst, I want to migrate from the Log Analytics Agent to the Azure Monitor Agent so that I can leverage improved performance and new features in Microsoft Sentinel.
10+
#Customer intent: [AI]As a security analyst, I want to migrate from the Log Analytics Agent to the Azure Monitor Agent so that I can leverage improved performance and new features in Microsoft Sentinel.
1111

1212
---
1313

articles/sentinel/api-dcr-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 03/01/2024
88
ms.service: microsoft-sentinel
99

1010

11-
#Customer intent: [AI]As a cloud engineer, I want to create Data Collection Rules (DCRs) using API requests so that I can automate the ingestion of Syslog and CEF messages into Azure Monitor.
11+
#Customer intent: [AI]As a security engineer, I want to create Data Collection Rules (DCRs) using API requests so that I can automate the ingestion of Syslog and CEF messages into Azure Monitor.
1212

1313
---
1414
# API request examples for creating Data Collection Rules (DCRs)

articles/sentinel/bring-your-own-ml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: yelevin
88
ms.custom: devx-track-azurecli
99

1010

11-
#Customer intent: [AI]As a security professional, I want to build and integrate custom machine learning models into my security operations platform so that I can detect and respond to threats specific to my organization's environment.
11+
#Customer intent: [AI]As a security engineer, I want to build and integrate custom machine learning models into my security operations platform so that we can detect and respond to threats specific to our organization's environment.
1212

1313
---
1414

articles/sentinel/cef-syslog-ama-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,9 @@ ms.author: yelevin
66
ms.topic: concept-article
77
ms.custom: linux-related-content
88
ms.date: 07/12/2024
9-
#Customer intent: As a security operator, I want to understand how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent so that I can determine if this solution fits my organization's needs.
109

1110

12-
#Customer intent: [AI]As a security analyst, I want to collect and analyze Syslog and CEF messages from various devices using a centralized log forwarder, so that I can efficiently monitor and respond to security threats.
11+
#Customer intent: [AI]As a security engineer, I want to collect Syslog and CEF messages from various devices using a centralized log forwarder, so that I can efficiently monitor and respond to security threats.
1312

1413
---
1514

articles/sentinel/connect-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: how-to
77
ms.date: 01/31/2024
88

99

10-
#Customer intent: [AI]As a security analyst, I want to connect AWS service logs to my SIEM platform so that I can centralize log management and enhance threat detection capabilities.
10+
#Customer intent: [AI]As a security analyst, I want to connect AWS service logs to Microsoft Sentinel so that I can centralize log management and enhance threat detection capabilities.
1111

1212
---
1313

articles/sentinel/connect-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 05/13/2024
77
ms.author: yelevin
88

99

10-
#Customer intent: [AI]As a security analyst, I want to connect and stream Microsoft Entra logs into Microsoft Sentinel so that I can monitor and analyze sign-in activities, audit logs, and provisioning logs for enhanced security and threat detection.
10+
#Customer intent: [AI]As a security analyst, I want to stream Microsoft Entra logs into Microsoft Sentinel so that I can monitor and analyze sign-in activities, audit logs, and provisioning logs for enhanced security and threat detection.
1111

1212
---
1313

articles/sentinel/connect-azure-stack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 11/09/2021
77
ms.author: yelevin
88

99

10-
#Customer intent: [AI]As a security analyst, I want to connect Azure Stack Hub virtual machines to a centralized monitoring system so that I can efficiently monitor and manage security threats across my hybrid cloud environment.
10+
#Customer intent: [AI]As a security analyst, I want to connect Azure Stack Hub virtual machines to Microsoft Sentinel so that I can efficiently monitor and manage security threats across my hybrid cloud environment.
1111

1212
---
1313

articles/sentinel/connect-azure-windows-microsoft-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 02/24/2023
77
ms.author: yelevin
88

99

10-
#Customer intent: [AI]As a security analyst, I want to connect various cloud and on-premises services to Microsoft Sentinel so that I can centralize and streamline threat detection and response.
10+
#Customer intent: [AI]As a security analyst, I want to connect Azure, Windows, Microsoft, and Amazon services to Microsoft Sentinel so that I can centralize and streamline threat detection and response.
1111

1212
---
1313

articles/sentinel/connect-cef-syslog-ama.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,9 @@ appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
- Microsoft Sentinel in the Microsoft Defender portal
1212
ms.collection: usx-security
13-
#Customer intent: As a security operator, I want to ingest and filter syslog and CEF messages from Linux machines and from network and security devices and appliances to my Microsoft Sentinel workspace, so that security analysts can monitor activity on these systems and detect security threats.
1413

1514

16-
#Customer intent: [AI]As a security operations analyst, I want to ingest and monitor syslog and CEF messages from various devices into a cloud-based SIEM, so that I can enhance threat detection and incident response capabilities.
15+
#Customer intent: [AI]As a security engineer, I want to ingest and filter syslog and CEF messages from Linux machines and from network and security devices and appliances to my Microsoft Sentinel workspace, so that I can enhance threat detection and incident response capabilities.
1716

1817
---
1918

0 commit comments

Comments
 (0)