Skip to content

Commit e776cc6

Browse files
committed
Add in tutorials for consistency
1 parent 0fa9e4b commit e776cc6

File tree

1 file changed

+33
-16
lines changed

1 file changed

+33
-16
lines changed

articles/sentinel/index.yml

Lines changed: 33 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: landing-page
1111
author: yelevin
1212
ms.author: yelevin
13-
ms.date: 02/08/2024
13+
ms.date: 02/12/2024
1414

1515
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1616

@@ -44,32 +44,41 @@ landingContent:
4444
url: deploy-overview.md
4545
- text: Prerequisites
4646
url: prerequisites.md
47+
- text: Plan costs
48+
url: billing.md
49+
- text: Find solutions
50+
url: sentinel-solutions-catalog.md
4751
- linkListType: how-to-guide
4852
links:
4953
- text: Install solutions and content
50-
url: sentinel-solutions-deploy.md
51-
- text: Find solutions
52-
url: sentinel-solutions-catalog.md
54+
url: sentinel-solutions-deploy.md
5355

5456
# Card
5557
- title: Collect data
5658
linkLists:
5759
- linkListType: concept
5860
links:
61+
- text: Microsoft Sentinel data connectors
62+
url: connect-data-sources.md
5963
- text: Data collection best practices
6064
url: best-practices-data.md
6165
- text: Normalizing and parsing data
6266
url: normalization.md
67+
- linkListType: tutorial
68+
links:
69+
- text: Forward Syslog data to Log Analytics workspace
70+
url: forward-syslog-monitor-agent.md
6371
- linkListType: how-to-guide
6472
links:
65-
- text: Connect data to Microsoft Sentinel
66-
url: connect-data-sources.md
67-
- text: Find data connectors
68-
url: data-connectors-reference.md
6973
- text: Create a custom connector
7074
url: create-custom-connector.md
7175
- text: Monitor connector health
7276
url: monitor-data-connector-health.md
77+
- linkListType: reference
78+
links:
79+
- text: Find data connectors
80+
url: data-connectors-reference.md
81+
7382

7483
# Card (optional)
7584
- title: Detect threats
@@ -84,6 +93,10 @@ landingContent:
8493
url: identify-threats-with-entity-behavior-analytics.md
8594
- text: Customizable anomalies
8695
url: soc-ml-anomalies.md
96+
- linkListType: tutorial
97+
links:
98+
- text: Detect threats by using analytics rules
99+
url: tutorial-log4j-detection.md
87100
- linkListType: how-to-guide
88101
links:
89102
- text: Detect threats by using built-in analytics
@@ -94,14 +107,18 @@ landingContent:
94107
# Card (optional)
95108
- title: Investigate
96109
linkLists:
110+
- linkListType: concept
111+
links:
112+
- text: Incident investigation and case management
113+
url: incident-investigation.md
114+
- text: Threat hunting
115+
url: hunting.md
116+
- text: Kusto Query Language in Microsoft Sentinel
117+
url: kusto-overview.md
97118
- linkListType: tutorial
98119
links:
99120
- text: Investigate with UEBA
100121
url: investigate-with-ueba.md
101-
- text: Threat hunting
102-
url: hunting.md
103-
- text: Kusto Query Language in Microsoft Sentinel
104-
url: kusto-overview.md
105122
- linkListType: how-to-guide
106123
links:
107124
- text: Investigate incidents
@@ -116,14 +133,14 @@ landingContent:
116133
# Card (optional)
117134
- title: Respond
118135
linkLists:
119-
- linkListType: tutorial
120-
links:
121-
- text: Respond automatically to threats
122-
url: tutorial-respond-threats-playbook.md
123136
- linkListType: concept
124137
links:
125138
- text: Automation rules
126139
url: automate-incident-handling-with-automation-rules.md
127140
- text: Playbooks
128141
url: automate-responses-with-playbooks.md
142+
- linkListType: tutorial
143+
links:
144+
- text: Respond automatically to threats
145+
url: tutorial-respond-threats-playbook.md
129146

0 commit comments

Comments
 (0)