Skip to content

Commit efb5b36

Browse files
committed
acrolinx
1 parent 6d528fa commit efb5b36

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/sentinel/connect-dns-ama.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To collect events from any system that isn't an Azure virtual machine, ensure th
4040

4141
Use the portal setup option to configure the connector using a single Data Collection Rule (DCR) per workspace. Afterwards, use advanced filters to filter out specific events or information, uploading only the valuable data you want to monitor, reducing costs and bandwidth usage.
4242

43-
If you need to create multiple DCRs, [use the API](#set-up-the-connector-with-the-api) instead. Using the API to create multiple DCRs will still show only one DCR in the portal.
43+
If you need to create multiple DCRs, [use the API](#configure-the-windows-dns-over-ama-connector-via-api) instead. Using the API to create multiple DCRs will still show only one DCR in the portal.
4444

4545
**To configure the connector**:
4646

@@ -166,7 +166,7 @@ Use the following procedure to create filters via the portal. For more informati
166166
- To create compound filters, use different fields with an AND relation.
167167
- To combine different filters, use an OR relation between them.
168168

169-
Filters also support wildcards as follows:
169+
<a name="use-wildcards"></a>Filters also support wildcards as follows:
170170

171171
- Add a dot after each asterisk (`*.`).
172172
- Don't use spaces between the list of domains.

articles/sentinel/extend-sentinel-across-workspaces-tenants.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,15 @@ Microsoft Sentinel supports a [multiple workspace incident view](./multiple-work
2323

2424
## Query multiple workspaces
2525

26-
You can query [multiple workspaces](/azure/azure-monitor/logs/cross-workspace-query), allowing you to search and correlate data from multiple workspaces in a single query.
26+
Query [multiple workspaces](/azure/azure-monitor/logs/cross-workspace-query) to search and correlate data from multiple workspaces in a single query.
2727

2828
- Use the [`workspace( )` expression](/azure/azure-monitor/logs/workspace-expression), with the workspace identifier as the argument, to refer to a table in a different workspace.
2929

3030
- See [important information](/azure/azure-monitor/logs/workspace-expression#syntax) about the use of identifier formats to ensure proper performance.
3131

3232
- Use the [union operator](/azure/data-explorer/kusto/query/unionoperator?pivots=azuremonitor) alongside the `workspace( )` expression to apply a query across tables in multiple workspaces.
3333

34-
- You can use saved [functions](/azure/azure-monitor/logs/functions) to simplify cross-workspace queries. For example, you can shorten a long reference to the *SecurityEvent* table in Customer A's workspace by saving the expression
34+
- Use saved [functions](/azure/azure-monitor/logs/functions) to simplify cross-workspace queries. For example, you can shorten a long reference to the *SecurityEvent* table in Customer A's workspace by saving the expression:
3535

3636
```kusto
3737
workspace("/subscriptions/<customerA_subscriptionId>/resourcegroups/<resourceGroupName>/providers/microsoft.OperationalInsights/workspaces/<workspaceName>").SecurityEvent
@@ -47,7 +47,7 @@ You can query [multiple workspaces](/azure/azure-monitor/logs/cross-workspace-qu
4747
workspace("/subscriptions/<subscriptionId>/resourcegroups/<resourceGroupName>/providers/microsoft.OperationalInsights/workspaces/<workspaceName2>").SecurityEvent
4848
```
4949

50-
You can then write a query across both workspaces by beginning with `unionSecurityEvent | where ...` .
50+
Then, write a query across both workspaces by beginning with `unionSecurityEvent | where ...` .
5151

5252
### Include cross-workspace queries in scheduled analytics rules<a name="scheduled-alerts"></a>
5353

@@ -79,26 +79,26 @@ Workbooks can provide cross-workspace queries in one of three methods, suitable
7979

8080
### Hunt across multiple workspaces
8181

82-
Microsoft Sentinel provides preloaded query samples designed to get you started and get you familiar with the tables and the query language. Microsoft security researchers constantly add new built-in queries and fine-tune existing queries. You can use these queries to look for new detections and identify signs of intrusion that your security tools may have missed.
82+
Microsoft Sentinel provides preloaded query samples designed to get you started and get you familiar with the tables and the query language. Microsoft security researchers constantly add new built-in queries and fine-tune existing queries. You can use these queries to look for new detections and identify signs of intrusion that your security tools might have missed.
8383

8484
Cross-workspace hunting capabilities enable your threat hunters to create new hunting queries, or adapt existing ones, to cover multiple workspaces, by using the union operator and the workspace() expression as shown [above](#query-multiple-workspaces).
8585

8686
## Manage multiple workspaces using automation
8787

8888
To configure and manage multiple Log Analytics workspaces enabled for Microsoft Sentinel, you need to automate the use of the Microsoft Sentinel management API.
8989

90-
- Learn how to [automate the deployment of Microsoft Sentinel resources](https://techcommunity.microsoft.com/t5/azure-sentinel/extending-azure-sentinel-apis-integration-and-management/ba-p/1116885), including alert rules, hunting queries, workbooks and playbooks.
90+
- Learn how to [automate the deployment of Microsoft Sentinel resources](https://techcommunity.microsoft.com/t5/azure-sentinel/extending-azure-sentinel-apis-integration-and-management/ba-p/1116885), including alert rules, hunting queries, workbooks, and playbooks.
9191
- Learn how to [deploy custom content from your repository](ci-cd.md). This resource provides a consolidated methodology for managing Microsoft Sentinel as code and for deploying and configuring resources from a private Azure DevOps or GitHub repository.
9292

9393
## Manage workspaces across tenants using Azure Lighthouse
9494

9595
As mentioned above, in many scenarios, the different Log Analytics workspaces enabled for Microsoft Sentinels can be located in different Microsoft Entra tenants. You can use [Azure Lighthouse](/azure/lighthouse/overview) to extend all cross-workspace activities across tenant boundaries, allowing users in your managing tenant to work on workspaces across all tenants.
9696

97-
Once Azure Lighthouse is [onboarded](/azure/lighthouse/how-to/onboard-customer), use the [directory + subscription selector](./multiple-tenants-service-providers.md#how-to-access-microsoft-sentinel-in-managed-tenants) on the Azure portal to select all the subscriptions containing workspaces you want to manage, in order to ensure that they'll all be available in the different workspace selectors in the portal.
97+
Once Azure Lighthouse is [onboarded](/azure/lighthouse/how-to/onboard-customer), use the [directory + subscription selector](multiple-tenants-service-providers.md#access-microsoft-sentinel-in-managed-tenants) on the Azure portal to select all the subscriptions containing workspaces you want to manage, in order to ensure that they'll all be available in the different workspace selectors in the portal.
9898

9999
When using Azure Lighthouse, it's recommended to create a group for each Microsoft Sentinel role and delegate permissions from each tenant to those groups.
100100

101-
## Next steps
101+
## Next step
102102

103103
In this article, you learned how Microsoft Sentinel's capabilities can be extended across multiple workspaces and tenants. For practical guidance on implementing Microsoft Sentinel's cross-workspace architecture, see the following articles:
104104

0 commit comments

Comments
 (0)