Skip to content

Commit f0c7e71

Browse files
committed
Move image & change headings to nouns in conceptual
1 parent 425a21f commit f0c7e71

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

articles/sentinel/hunting.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ For example, one built-in query provides data about the most uncommon processes
2020
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2121
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2222

23-
## Use built-in queries
23+
## Built-in hunting queries
2424

2525
The [hunting dashboard](#use-the-hunting-dashboard) provides ready-made query examples designed to get you started and get you familiar with the tables and the query language. Queries run on data stored in log tables, such as for process creation, DNS events, or other event types.
2626

@@ -46,7 +46,7 @@ You can also create hunting and livestream queries over data stored in Azure Dat
4646

4747
Use community resources, such as the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries) to find more queries and data sources.
4848

49-
## Use the hunting dashboard
49+
## Hunting dashboard
5050

5151
The hunting dashboard enables you to run all your queries, or a selected subset, in a single selection. In the Microsoft Sentinel portal, select **Hunting**.
5252

@@ -126,7 +126,7 @@ In the example above, start with the table name SecurityEvent and add piped elem
126126
We recommend that your query uses an [Advanced Security Information Model (ASIM) parser](normalization-about-parsers.md) and not a built-in table. This ensures that the query will support any current or future relevant data source rather than a single data source.
127127

128128

129-
## Bookmarks
129+
## Bookmarks to keep track of data
130130

131131
Threat hunting typically requires reviewing mountains of log data looking for evidence of malicious behavior. During this process, investigators find events that they want to remember, revisit, and analyze as part of validating potential hypotheses and understanding the full story of a compromise.
132132

@@ -142,14 +142,15 @@ During the hunting and investigation process, you might come across query result
142142
- Investigate a single bookmarked finding by selecting the bookmark and then clicking **Investigate** in the details pane to open the investigation experience. View, investigate, and visually communicate your findings by using an interactive entity-graph diagram and timeline. You can also directly select a listed entity to view that entity’s corresponding entity page.
143143

144144
You can also create an incident from one or more bookmarks, or add one or more bookmarks to an existing incident. Select a checkbox to the left of any bookmarks you want to use, and then select **Incident actions** > **Create new incident** or **Add to existing incident**. Triage and investigate the incident like any other.
145-
- Alternatively, view your bookmarked data directly in the **HuntingBookmark** table in your Log Analytics workspace. For example:
145+
- View your bookmarked data directly in the **HuntingBookmark** table in your Log Analytics workspace. For example:
146146

147-
:::image type="content" source="media/bookmarks/bookmark-table.png" alt-text="Screenshot of the hunting bookmarks table in the Log Analytics workspace." lightbox="media/bookmarks/bookmark-table.png":::
147+
:::image type="content" source="media/hunting/bookmark-table.png" alt-text="Screenshot of the hunting bookmarks table in the Log Analytics workspace." lightbox="media/bookmarks/bookmark-table.png":::
148148

149149
Viewing bookmarks from the table enables you to filter, summarize, and join bookmarked data with other data sources, making it easy to look for corroborating evidence.
150-
For more information, see [Use bookmarks in hunting](bookmarks.md).
151150

152-
## Use notebooks to power investigations
151+
To start using bookmarks, see [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
152+
153+
## Notebooks to power investigations
153154

154155
When your hunting and investigations become more complex, use Microsoft Sentinel notebooks to enhance your activity with machine learning, visualizations, and data analysis.
155156

0 commit comments

Comments
 (0)