Skip to content

Commit dd19cc6

Browse files
committed
fixing TOC also moving section
1 parent bfed37e commit dd19cc6

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

articles/sentinel/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -912,13 +912,13 @@
912912
- name: Overview
913913
href: kusto-overview.md
914914
- name: Query best practices
915-
href: /kusto/query/best-practices?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
915+
href: /kusto/query/best-practices?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel
916916
- name: SQL to KQL cheat sheet
917-
href: /kusto/query/sql-cheat-sheet?view=microsoft-fabric
917+
href: /kusto/query/sql-cheat-sheet?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel
918918
- name: Splunk to KQL cheat sheet
919-
href: /kusto/query/splunk-cheat-sheet?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
919+
href: /kusto/query/splunk-cheat-sheet?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel
920920
- name: KQL quick reference
921-
href: /kusto/query/kql-quick-reference?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
921+
href: /kusto/query/kql-quick-reference?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel
922922
- name: Other KQL resources
923923
href: kusto-resources.md
924924
- name: Create custom query

articles/sentinel/incident-investigation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ Search the list of alerts and bookmarks, or filter the list by severity, tactics
6666
- The **alert provider**, in the second part of the subtitle. For bookmarks, the **creator** of the bookmark.
6767
- The MITRE ATT&CK **tactics** associated with the alert, indicated by icons and ToolTips, in the third part of the subtitle.
6868

69-
For more information, see [Reconstruct the timeline of attacker activity](investigate-incidents.md#reconstruct-the-timeline-of-attacker-activity).
69+
For more information, see [Reconstruct the timeline of the attack story](investigate-incidents.md#reconstruct-the-timeline-of-the-attack-story).
7070

7171
### Lists of similar incidents
7272

articles/sentinel/investigate-incidents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The **Overview** tab contains the following widgets, each of which represents an
7777

7878
| **Widget** | **Description** |
7979
|---------------------------|----------------------------------------------------|
80-
|**Incident timeline** | The **Incident timeline** widget shows you the timeline of alerts and [bookmarks](bookmarks.md) in the incident, which can help you reconstruct the timeline of attacker activity. Select an individual item to see all of its details, enabling you to drill down further. For more information, see [Reconstruct the timeline of attacker activity](#reconstruct-the-timeline-of-attacker-activity). |
80+
|**Incident timeline** | The **Incident timeline** widget shows you the timeline of alerts and [bookmarks](bookmarks.md) in the incident, which can help you reconstruct the timeline of attacker activity. Select an individual item to see all of its details, enabling you to drill down further. For more information, see [Reconstruct the timeline of the attack story](#reconstruct-the-timeline-of-the-attack-story). |
8181
| **Similar incidents** | In the **Similar incidents** widget, you see a collection of up to 20 other incidents that most closely resemble the current incident. This allows you to view the incident in a larger context and helps direct your investigation. For more information, see [Check for similar incidents in your environment](#check-for-similar-incidents-in-your-environment). |
8282
| **Entities** | The **Entities** widget shows you all the [entities](entities.md) that have been identified in the alerts. These are the objects that played a role in the incident, whether they be users, devices, addresses, files, or [any other types](./entities-reference.md). Select an entity to see its full details, which are displayed in the **Entities tab**. For more information, see [Explore the incident's entities](#explore-the-incidents-entities).|
8383
| **Top insights** | In the **Top insights** widget, you see a collection of results of queries defined by Microsoft security researchers that provide valuable and contextual security information on all the entities in the incident, based on data from a collection of sources. For more information, see [Get the top insights into your incident](#get-the-top-insights-into-your-incident).|

0 commit comments

Comments
 (0)