Skip to content

Commit f6d0cd7

Browse files
committed
fixing blocking issues
1 parent 3947795 commit f6d0cd7

File tree

3 files changed

+7
-5
lines changed

3 files changed

+7
-5
lines changed

articles/sentinel/multiple-tenants-service-providers.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,10 @@ If you’re a managed security service provider (MSSP) and you’re using [Azure
2727
![Check resource providers](media/multiple-tenants-service-providers/check-resource-provider.png)
2828
## How to access Azure Sentinel from other tenants
2929
1. Under **Directory + subscription**, select the delegated directories, and the subscriptions where your customer’s Azure Sentinel workspaces are located.
30+
3031
![Generate security incidents](media/multiple-tenants-service-providers/directory-subscription.png)
31-
2. Open Azure Sentinel. You will see all the workspaces in the selected subscriptions, and you’ll be able to work with them seamlessly, like any workspace in your own tenant.
32+
33+
1. Open Azure Sentinel. You will see all the workspaces in the selected subscriptions, and you’ll be able to work with them seamlessly, like any workspace in your own tenant.
3234

3335
> [!NOTE]
3436
> You will not be able to connect connectors in Azure Sentinel from within a managed workspace. To connect a connector, you must directly sign into the tenant on which you want to connect a connector and authenticate there with the required permissions.

articles/sentinel/offboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Within the first 48 hours, the data and alert rules (including real-time automat
6969

7070
- Bookmarks
7171

72-
Your playbooks, saved workbooks, saved hunting queries, and notebooks are not deleted. **Some may brake due to the removed data. You can remove those manually.**
72+
Your playbooks, saved workbooks, saved hunting queries, and notebooks are not deleted. **Some may break due to the removed data. You can remove those manually.**
7373

7474
After you remove the service, there is a grace period of 30 days during which you can re-enable the solution and your data and alert rules will be restored but the configured connectors that were disconnected must be reconnected.
7575

articles/sentinel/tutorial-detect-threats-custom.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You can create custom analytic rules to help you search for the types of threats
4040

4141
![Start creating a custom analytic rule](media/tutorial-detect-threats-custom/general-tab.png)
4242

43-
1. In the **Settings** tab, you can either write a query directly, or create the query in Log Analytics, and then paste it into the **Search query** field. As you change and configure your query, Azure Sentinel simulates the query results in the **Results preview** window, on the right. This enables you to gain insight into how much data would be generated over a specific time interval for the alert you are creating. The amound depends on what you set for **Run query every** and **Lookup data from the last**. If you see that, on average, your alert would trigger alerts too frequently, you can set the number of results higher, so that it's above your average baseline.
43+
1. In the **Settings** tab, you can either write a query directly, or create the query in Log Analytics, and then paste it into the **Search query** field. As you change and configure your query, Azure Sentinel simulates the query results in the **Results preview** window, on the right. This enables you to gain insight into how much data would be generated over a specific time interval for the alert you are creating. The amount depends on what you set for **Run query every** and **Lookup data from the last**. If you see that, on average, your alert would trigger alerts too frequently, you can set the number of results higher, so that it's above your average baseline.
4444

4545
![Create query in Azure Sentinel](media/tutorial-detect-threats-custom/settings-tab.png)
4646

@@ -64,7 +64,7 @@ You can create custom analytic rules to help you search for the types of threats
6464

6565
1. Define alert trigger conditions under **Alert trigger**. Under **Entity mapping**, you can map the columns in your query to entity fields recognized by Azure Sentinel. For each field, map the relevant column in the query you created in Log Analytics to the appropriate entity field. Each entity includes multiple fields, for example SID and GUID. You can map the entity according to any fields, not just the upper level entity.
6666

67-
1. In the **Response automation** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](https://review.docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook).
67+
1. In the **Response automation** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](tutorial-respond-threats-playbook.md).
6868

6969
![Automate response to threats in Azure Sentinel](media/tutorial-detect-threats-custom/response-automation-custom.png)
7070

@@ -74,7 +74,7 @@ You can create custom analytic rules to help you search for the types of threats
7474

7575
1. After the alert is created, a custom rule is added to the table under **Active analytic rules**. From this list you can enable, disable, or delete each rule.
7676

77-
1. To view the results of the alert rules you create, go to the **Incidents** page, where you can triage, [investigate incidents](https://review.docs.microsoft.com/en-us/azure/sentinel/tutorial-investigate-cases), and remediate the threats.
77+
1. To view the results of the alert rules you create, go to the **Incidents** page, where you can triage, [investigate incidents](tutorial-investigate-cases.md), and remediate the threats.
7878

7979

8080
> [!NOTE]

0 commit comments

Comments
 (0)