Skip to content

Commit dea05f0

Browse files
fix link to new article
1 parent 3bb8f55 commit dea05f0

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/sentinel/understand-threat-intelligence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ According to the default settings, each time the rule runs on its schedule, any
112112

113113
In Microsoft Sentinel, the alerts generated from analytics rules also generate security incidents which can be found in **Incidents** under **Threat Management** on the Microsoft Sentinel menu. Incidents are what your security operations teams will triage and investigate to determine the appropriate response actions. You can find detailed information in this [Tutorial: Investigate incidents with Microsoft Sentinel](./investigate-cases.md).
114114

115-
For more details on using threat indicators in your analytics rules, see [Work with threat indicators in Microsoft Sentinel](work-with-threat-indicators.md#detect-threats-with-threat-indicator-based-analytics).
115+
For more details on using threat indicators in your analytics rules, see [Use threat intelligence to detect threats](use-threat-intelligence-to-detect-threats.md).
116116

117117
## Workbooks provide insights about your threat intelligence
118118

0 commit comments

Comments
 (0)