@@ -10,7 +10,7 @@ metadata:
10
10
ms.topic : landing-page
11
11
author : yelevin
12
12
ms.author : yelevin
13
- ms.date : 02/08 /2024
13
+ ms.date : 02/12 /2024
14
14
15
15
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
16
16
@@ -44,32 +44,41 @@ landingContent:
44
44
url : deploy-overview.md
45
45
- text : Prerequisites
46
46
url : prerequisites.md
47
+ - text : Plan costs
48
+ url : billing.md
49
+ - text : Find solutions
50
+ url : sentinel-solutions-catalog.md
47
51
- linkListType : how-to-guide
48
52
links :
49
53
- text : Install solutions and content
50
- url : sentinel-solutions-deploy.md
51
- - text : Find solutions
52
- url : sentinel-solutions-catalog.md
54
+ url : sentinel-solutions-deploy.md
53
55
54
56
# Card
55
57
- title : Collect data
56
58
linkLists :
57
59
- linkListType : concept
58
60
links :
61
+ - text : Microsoft Sentinel data connectors
62
+ url : connect-data-sources.md
59
63
- text : Data collection best practices
60
64
url : best-practices-data.md
61
65
- text : Normalizing and parsing data
62
66
url : normalization.md
67
+ - linkListType : tutorial
68
+ links :
69
+ - text : Forward Syslog data to Log Analytics workspace
70
+ url : forward-syslog-monitor-agent.md
63
71
- linkListType : how-to-guide
64
72
links :
65
- - text : Connect data to Microsoft Sentinel
66
- url : connect-data-sources.md
67
- - text : Find data connectors
68
- url : data-connectors-reference.md
69
73
- text : Create a custom connector
70
74
url : create-custom-connector.md
71
75
- text : Monitor connector health
72
76
url : monitor-data-connector-health.md
77
+ - linkListType : reference
78
+ links :
79
+ - text : Find data connectors
80
+ url : data-connectors-reference.md
81
+
73
82
74
83
# Card (optional)
75
84
- title : Detect threats
@@ -84,6 +93,10 @@ landingContent:
84
93
url : identify-threats-with-entity-behavior-analytics.md
85
94
- text : Customizable anomalies
86
95
url : soc-ml-anomalies.md
96
+ - linkListType : tutorial
97
+ links :
98
+ - text : Detect threats by using analytics rules
99
+ url : tutorial-log4j-detection.md
87
100
- linkListType : how-to-guide
88
101
links :
89
102
- text : Detect threats by using built-in analytics
@@ -94,14 +107,18 @@ landingContent:
94
107
# Card (optional)
95
108
- title : Investigate
96
109
linkLists :
110
+ - linkListType : concept
111
+ links :
112
+ - text : Incident investigation and case management
113
+ url : incident-investigation.md
114
+ - text : Threat hunting
115
+ url : hunting.md
116
+ - text : Kusto Query Language in Microsoft Sentinel
117
+ url : kusto-overview.md
97
118
- linkListType : tutorial
98
119
links :
99
120
- text : Investigate with UEBA
100
121
url : investigate-with-ueba.md
101
- - text : Threat hunting
102
- url : hunting.md
103
- - text : Kusto Query Language in Microsoft Sentinel
104
- url : kusto-overview.md
105
122
- linkListType : how-to-guide
106
123
links :
107
124
- text : Investigate incidents
@@ -116,14 +133,14 @@ landingContent:
116
133
# Card (optional)
117
134
- title : Respond
118
135
linkLists :
119
- - linkListType : tutorial
120
- links :
121
- - text : Respond automatically to threats
122
- url : tutorial-respond-threats-playbook.md
123
136
- linkListType : concept
124
137
links :
125
138
- text : Automation rules
126
139
url : automate-incident-handling-with-automation-rules.md
127
140
- text : Playbooks
128
141
url : automate-responses-with-playbooks.md
142
+ - linkListType : tutorial
143
+ links :
144
+ - text : Respond automatically to threats
145
+ url : tutorial-respond-threats-playbook.md
129
146
0 commit comments