Skip to content

Commit e5d6eea

Browse files
committed
Reorder metadata
1 parent 654f013 commit e5d6eea

File tree

127 files changed

+191
-171
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

127 files changed

+191
-171
lines changed

articles/sentinel/add-advanced-conditions-to-automation-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: batamig
66
ms.author: bagol
77
ms.date: 10/16/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

1313

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: austinmccollum
66
ms.author: austinmc
77
ms.topic: how-to
88
ms.date: 3/14/2024
9-
appliesto:
9+
appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

articles/sentinel/audit-track-tasks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.date: 05/08/2023
8-
appliesto:
9-
- Microsoft Sentinel in the Azure portal
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
1010
#Customer intent: As a SOC manager, I want to audit and track changes to incident tasks so that I can evaluate the effectiveness of task assignments and improve SOC efficiency.
1111
---
1212

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.author: bagol
66
ms.topic: conceptual
77
ms.date: 10/16/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

1313

articles/sentinel/automation/authenticate-playbooks-to-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

1313
#Customer intent: As a security analyst, I want to authenticate playbooks to Microsoft Sentinel so that I can automate and orchestrate security tasks efficiently.

articles/sentinel/automation/automate-responses-with-playbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212
#Customer intent: As a SOC analyst, I want to automate threat response using playbooks so that I can efficiently manage security alerts and incidents, reducing manual intervention and focusing on deeper investigations.
1313

articles/sentinel/automation/automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: batamig
66
ms.author: bagol
77
ms.date: 02/12/2025
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212
#Customer intent: As a SOC analyst, I want to automate incident response and remediation tasks using SOAR capabilities so that I can focus on investigating advanced threats and reduce the risk of missed alerts.
1313

articles/sentinel/automation/create-tasks-playbook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

1313
#Customer intent: As a security analyst, I want to automate incident management tasks using playbooks so that I can streamline and manage complex workflows efficiently.

articles/sentinel/automation/define-playbook-access-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

1313
#Customer intent: As a security engineer using Standard-plan playbooks, I want to define an access restriction policy for playbooks so that I can ensure only authorized services can access sensitive workflows.

articles/sentinel/automation/logic-apps-playbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.author: bagol
66
ms.topic: concept-article
77
ms.date: 04/18/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal
109
- Microsoft Sentinel in the Microsoft Defender portal
10+
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212

1313
#Customer intent: As a security engineer, I want to manage automated workflows using Azure Logic Apps for Microsoft Sentinel so that I can efficiently respond to security incidents and alerts.

0 commit comments

Comments
 (0)