Skip to content

Commit f5292f0

Browse files
Merge pull request #291017 from yelevin/yelevin/incidents-sentinel-only
Updated titles and intros for Sentinel Only
2 parents aecc5be + dbb703c commit f5292f0

10 files changed

+31
-31
lines changed

articles/sentinel/audit-track-tasks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Audit and track changes to incident tasks in Microsoft Sentinel
2+
title: Audit and track changes to incident tasks in Microsoft Sentinel in the Azure portal
33
description: This article explains how you, as a SOC manager, can audit the history of Microsoft Sentinel incident tasks, and track changes to them, in order to gauge your task assignments and their contribution to your SOC's efficiency and effectiveness.
44
author: yelevin
55
ms.author: yelevin
@@ -10,7 +10,7 @@ appliesto:
1010
#Customer intent: As a SOC manager, I want to audit and track changes to incident tasks so that I can evaluate the effectiveness of task assignments and improve SOC efficiency.
1111
---
1212

13-
# Audit and track changes to incident tasks in Microsoft Sentinel
13+
# Audit and track changes to incident tasks in Microsoft Sentinel in the Azure portal
1414

1515
[Incident tasks](incident-tasks.md) ensure comprehensive and uniform treatment of incidents across all SOC personnel. Task lists are typically defined according to determinations made by senior analysts or SOC managers, and put into practice using automation rules or playbooks.
1616

articles/sentinel/collaborate-in-microsoft-teams.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Collaborate in Microsoft Teams with a Microsoft Sentinel incident team | Microsoft Docs
2+
title: Collaborate in Microsoft Teams with a Microsoft Sentinel incident team
33
description: Learn how to connect to Microsoft Teams from Microsoft Sentinel to collaborate with others on your team using Microsoft Sentinel data.
44
author: yelevin
55
ms.topic: how-to
@@ -10,9 +10,9 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to take advantage of Microsoft Teams' integration with Microsoft Sentinel to collaborate efficiently on incident investigations with my team.
1111
---
1212

13-
# Collaborate in Microsoft Teams (Public preview)
13+
# Collaborate in Microsoft Teams in the Azure portal (Public preview)
1414

15-
Microsoft Sentinel supports a direct integration with [Microsoft Teams](/microsoftteams/), enabling you to jump directly into teamwork on specific incidents.
15+
Microsoft Sentinel in the Azure portal supports a direct integration with [Microsoft Teams](/microsoftteams/), enabling you to jump directly into teamwork on specific incidents.
1616

1717

1818
> [!IMPORTANT]

articles/sentinel/create-incident-manually.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create your own incidents manually in Microsoft Sentinel
2+
title: Create your own incidents manually in Microsoft Sentinel in the Azure portal
33
description: Manually create incidents in Microsoft Sentinel based on data or information received by the SOC through alternate means or channels.
44
author: yelevin
55
ms.author: yelevin
@@ -10,7 +10,7 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to manually create incidents in Microsoft Sentinel so that I can investigate and respond to threats not automatically detected or ingested from external systems.
1111
---
1212

13-
# Create your own incidents manually in Microsoft Sentinel
13+
# Create your own incidents manually in Microsoft Sentinel in the Azure portal
1414

1515
> [!IMPORTANT]
1616
>
@@ -28,7 +28,7 @@ With Microsoft Sentinel as your security information and event management (SIEM)
2828

2929
However, threat data can also come from other sources *not ingested into Microsoft Sentinel*, or events not recorded in any log, and yet can justify opening an investigation. For example, an employee might notice an unrecognized person engaging in suspicious activity related to your organization’s information assets. This employee might call or email the security operations center (SOC) to report the activity.
3030

31-
Microsoft Sentinel allows your security analysts to manually create incidents for any type of event, regardless of its source or data, so you don't miss out on investigating these unusual types of threats.
31+
Microsoft Sentinel in the Azure portal allows your security analysts to manually create incidents for any type of event, regardless of its source or data, so you don't miss out on investigating these unusual types of threats.
3232

3333
## Common use cases
3434

articles/sentinel/delete-incident.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Delete incidents in Microsoft Sentinel
3-
description: Delete incidents in Microsoft Sentinel from the portal, through the API, or using a Logic App.
2+
title: Delete incidents in Microsoft Sentinel in the Azure portal
3+
description: Delete incidents in Microsoft Sentinel from the Azure portal, through the API, or using a Logic App.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
@@ -10,15 +10,15 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to delete duplicate or erroneous incidents in my incident management system so that I can maintain an accurate and efficient incident queue.
1111
---
1212

13-
# Delete incidents in Microsoft Sentinel
13+
# Delete incidents in Microsoft Sentinel in the Azure portal
1414

1515
> [!IMPORTANT]
1616
>
1717
> Incident deletion using the portal is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1818
>
1919
> Incident deletion is generally available through the API.
2020
21-
The ability to create incidents from scratch in Microsoft Sentinel opens the possibility that you'll create an incident that you later decide you shouldn't have. For example, you may have created an incident based on an employee report, before having received any evidence (such as alerts), and soon afterward you receive alerts that automatically generate the incident in question. But now, you have a duplicate incident with no data in it. In this scenario, you can delete your duplicate incident right from the incident queue in the portal.
21+
The ability to create incidents from scratch in Microsoft Sentinel in the Azure portal opens the possibility that you'll create an incident that you later decide you shouldn't have. For example, you may have created an incident based on an employee report, before having received any evidence (such as alerts), and soon afterward you receive alerts that automatically generate the incident in question. But now, you have a duplicate incident with no data in it. In this scenario, you can delete your duplicate incident right from the incident queue in the Azure portal.
2222

2323
**Deleting an incident is not a substitute for closing an incident!** Deleting an incident should only be done when at least one of the following conditions is met:
2424
- The incident was created manually by mistake.

articles/sentinel/incident-investigation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Understand Microsoft Sentinel's incident investigation and case management capabilities
3-
description: This article describes Microsoft Sentinel's incident investigation and case management capabilities and features, taking you through the phases of a typical incident investigation while presenting all the displays and tools available to you to help you along.
2+
title: Incident investigation with Microsoft Sentinel in the Azure portal
3+
description: This article describes Microsoft Sentinel's incident investigation and case management capabilities and features in the Azure portal, taking you through the phases of a typical incident investigation while presenting all the displays and tools available to you to help you along.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
@@ -10,7 +10,7 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to use Microsoft Sentinel for incident investigation so that I can efficiently manage and resolve security threats.
1111
---
1212

13-
# Understand Microsoft Sentinel's incident investigation and case management capabilities
13+
# Incident investigation with Microsoft Sentinel in the Azure portal
1414

1515
Microsoft Sentinel gives you a complete, full-featured case management platform for investigating and managing security incidents. **Incidents** are Microsoft Sentinel’s name for case files that contain a complete and constantly updated chronology of a security threat, whether it’s individual pieces of evidence (alerts), suspects and parties of interest (entities), insights collected and curated by security experts and AI/machine learning models, or comments and logs of all the actions taken in the course of the investigation.
1616

articles/sentinel/incident-tasks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use tasks to manage incidents in Microsoft Sentinel
2+
title: Use tasks to manage incidents in Microsoft Sentinel in the Azure portal
33
description: This article describes incident tasks and how to work with them to ensure all required steps are taken in triaging, investigating, and responding to incidents in Microsoft Sentinel.
44
author: yelevin
55
ms.author: yelevin
@@ -10,7 +10,7 @@ appliesto:
1010
#Customer intent: As a security operations manager, I want to standardize incident response tasks using automation rules and playbooks so that my team can handle incidents consistently and efficiently.
1111
---
1212

13-
# Use tasks to manage incidents in Microsoft Sentinel
13+
# Use tasks to manage incidents in Microsoft Sentinel in the Azure portal
1414

1515
One of the most important factors in running your security operations (SecOps) effectively and efficiently is the **standardization of processes**. SecOps analysts are expected to perform a list of steps, or tasks, in the process of triaging, investigating, or remediating an incident. Standardizing and formalizing the list of tasks can help keep your SOC running smoothly, ensuring the same requirements apply to all analysts. This way, regardless of who is on-shift, an incident will always get the same treatment and SLAs. Analysts won't need to spend time thinking about what to do, or worry about missing a critical step. Those steps are defined by the SOC manager or senior analysts (tier 2/3) based on common security knowledge (such as NIST), their experience with past incidents, or recommendations provided by the security vendor that detected the incident.
1616

articles/sentinel/investigate-incidents.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Navigate and investigate incidents in Microsoft Sentinel
3-
description: This article takes you through all the panels and options available on the incident details page, helping you navigate and investigate your incidents more quickly, effectively, and efficiently, and reducing your mean time to resolve (MTTR).
2+
title: Navigate and investigate incidents in Microsoft Sentinel in the Azure portal
3+
description: This article takes you through all the panels and options available on the incident details page in the Azure portal, helping you navigate and investigate your incidents more quickly, effectively, and efficiently, and reducing your mean time to resolve (MTTR).
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
@@ -10,11 +10,11 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to efficiently investigate security incidents using a comprehensive case management platform so that I can reduce the mean time to resolve (MTTR) and ensure effective incident response.
1111
---
1212

13-
# Navigate and investigate incidents in Microsoft Sentinel
13+
# Navigate and investigate incidents in Microsoft Sentinel in the Azure portal
1414

15-
Microsoft Sentinel gives you a complete, full-featured case management platform for investigating security incidents. The **Incident details** page is your central location from which to run your investigation, collecting all the relevant information and all the applicable tools and tasks in one screen.
15+
Microsoft Sentinel gives you a complete, full-featured case management platform in the Azure portal for investigating security incidents. The **Incident details** page is your central location from which to run your investigation, collecting all the relevant information and all the applicable tools and tasks in one screen.
1616

17-
This article takes you through all the panels and options available on the incident details page, helping you navigate and investigate your incidents more quickly, effectively, and efficiently, and reducing your mean time to resolve (MTTR).
17+
This article takes you through all the panels and options available on the incident details page in the Azure portal, helping you navigate and investigate your incidents more quickly, effectively, and efficiently, and reducing your mean time to resolve (MTTR).
1818

1919
See instructions for the [previous version of incident investigation](investigate-cases.md).
2020

articles/sentinel/relate-alerts-to-incidents.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Relate alerts to incidents in Microsoft Sentinel | Microsoft Docs
3-
description: This article shows you how to relate alerts to your incidents in Microsoft Sentinel.
2+
title: Relate alerts to incidents in Microsoft Sentinel in the Azure portal
3+
description: This article shows you how to relate alerts to your incidents in Microsoft Sentinel in the Azure portal.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
@@ -10,9 +10,9 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to relate alerts to incidents in Microsoft Sentinel so that I can refine and expand the scope of my investigations efficiently.
1111
---
1212

13-
# Relate alerts to incidents in Microsoft Sentinel
13+
# Relate alerts to incidents in Microsoft Sentinel in the Azure portal
1414

15-
This article shows you how to relate alerts to your incidents in Microsoft Sentinel. This feature allows you to manually or automatically add alerts to, or remove them from, existing incidents as part of your investigation processes, refining the incident scope as the investigation unfolds.
15+
This article shows you how to relate alerts to your incidents in Microsoft Sentinel. This feature allows you to manually or automatically add alerts to, or remove them from, existing incidents in the Azure portal as part of your investigation processes, refining the incident scope as the investigation unfolds.
1616

1717
> [!IMPORTANT]
1818
> Incident expansion is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

articles/sentinel/respond-threats-during-investigation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Respond to threat actors while investigating or threat hunting in Microsoft Sentinel
2+
title: Respond to threat actors while investigating or threat hunting in Microsoft Sentinel in the Azure portal
33
description: This article shows you how to take response actions against threat actors on the spot, during the course of an incident investigation or threat hunt, without pivoting or context switching out of the investigation or hunt. You accomplish this using playbooks based on the new entity trigger.
44
author: batamig
55
ms.author: bagol
@@ -10,7 +10,7 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to run playbooks on identified threats during investigations or threat hunts so that I can take immediate remediation actions without disrupting my workflow.
1111
---
1212

13-
# Respond to threat actors while investigating or threat hunting in Microsoft Sentinel
13+
# Respond to threat actors while investigating or threat hunting in Microsoft Sentinel in the Azure portal
1414

1515
This article shows you how to take response actions against threat actors on the spot, during the course of an incident investigation or threat hunt, without pivoting or context switching out of the investigation or hunt. You accomplish this using playbooks based on the new entity trigger.
1616

articles/sentinel/work-with-tasks.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Work with incident tasks in Microsoft Sentinel
2+
title: Work with incident tasks in Microsoft Sentinel in the Azure portal
33
description: This article explains how SOC analysts can use incident tasks to manage their incident-handling workflow processes in Microsoft Sentinel.
44
author: yelevin
55
ms.author: yelevin
@@ -10,9 +10,9 @@ appliesto:
1010
#Customer intent: As a security analyst, I want to manage and track incident tasks so that I can efficiently handle incident workflows and ensure thorough investigations.
1111
---
1212

13-
# Work with incident tasks in Microsoft Sentinel
13+
# Work with incident tasks in Microsoft Sentinel in the Azure portal
1414

15-
This article explains how SOC analysts can use incident tasks to manage their incident-handling workflow processes in Microsoft Sentinel.
15+
This article explains how SOC analysts can use incident tasks to manage their incident-handling workflow processes in Microsoft Sentinel in the Azure portal.
1616

1717
[Incident tasks](incident-tasks.md) are typically created automatically by either automation rules or playbooks set up by senior analysts or SOC managers, but lower-tier analysts can create their own tasks on the spot, manually, right from within the incident.
1818

0 commit comments

Comments
 (0)