Skip to content

Commit f83249d

Browse files
committed
Adding customer intents - Yechiel's files
1 parent ef533b7 commit f83249d

File tree

100 files changed

+400
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

100 files changed

+400
-0
lines changed

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
ms.collection: usx-security
1212
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
13+
14+
15+
#Customer intent: [AI]As a security analyst, I want to add entities to threat intelligence so that I can track and manage indicators of compromise effectively during incident investigations.
16+
1317
---
1418

1519
# Add entities to threat intelligence in Microsoft Sentinel

articles/sentinel/ama-migrate.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: reference
66
ms.date: 04/03/2024
77
ms.author: yelevin
8+
9+
10+
#Customer intent: [AI]As a security operations analyst, I want to migrate from the Log Analytics Agent to the Azure Monitor Agent so that I can leverage improved performance and new features in Microsoft Sentinel.
11+
812
---
913

1014
# AMA migration for Microsoft Sentinel

articles/sentinel/anomalies-reference.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: reference
66
ms.date: 03/17/2024
77
ms.author: yelevin
8+
9+
10+
#Customer intent: [AI]As a security analyst, I want to understand the types of anomalies detected by machine learning models in my SIEM solution so that I can effectively monitor and respond to potential security threats.
11+
812
---
913

1014
# Anomalies detected by the Microsoft Sentinel machine learning engine

articles/sentinel/api-dcr-reference.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ ms.author: yelevin
66
ms.topic: reference
77
ms.date: 03/01/2024
88
ms.service: microsoft-sentinel
9+
10+
11+
#Customer intent: [AI]As a cloud engineer, I want to create Data Collection Rules (DCRs) using API requests so that I can automate the ingestion of Syslog and CEF messages into Azure Monitor.
12+
913
---
1014
# API request examples for creating Data Collection Rules (DCRs)
1115

articles/sentinel/audit-track-tasks.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.date: 05/08/2023
8+
9+
10+
#Customer intent: [AI]As a SOC manager, I want to audit and track changes to incident tasks so that I can evaluate the effectiveness of task assignments and improve SOC efficiency.
11+
812
---
913

1014
# Audit and track changes to incident tasks in Microsoft Sentinel

articles/sentinel/bring-your-own-ml.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,10 @@ ms.topic: conceptual
66
ms.date: 11/09/2021
77
ms.author: yelevin
88
ms.custom: devx-track-azurecli
9+
10+
11+
#Customer intent: [AI]As a security professional, I want to build and integrate custom machine learning models into my security operations platform so that I can detect and respond to threats specific to my organization's environment.
12+
913
---
1014

1115
# Bring your own Machine Learning (ML) into Microsoft Sentinel

articles/sentinel/cef-syslog-ama-overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ ms.topic: concept-article
77
ms.custom: linux-related-content
88
ms.date: 07/12/2024
99
#Customer intent: As a security operator, I want to understand how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent so that I can determine if this solution fits my organization's needs.
10+
11+
12+
#Customer intent: [AI]As a security analyst, I want to collect and analyze Syslog and CEF messages from various devices using a centralized log forwarder, so that I can efficiently monitor and respond to security threats.
13+
1014
---
1115

1216
# Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel

articles/sentinel/collaborate-in-microsoft-teams.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: how-to
66
ms.date: 03/30/2022
77
ms.author: yelevin
8+
9+
10+
#Customer intent: [AI]As a security analyst, I want to integrate Microsoft Sentinel with Microsoft Teams so that I can collaborate efficiently on incident investigations with my team.
11+
812
---
913

1014
# Collaborate in Microsoft Teams (Public preview)

articles/sentinel/configure-connector-login-detection.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.topic: how-to
66
ms.date: 02/24/2023
77
ms.author: yelevin
8+
9+
10+
#Customer intent: [AI]As a security analyst, I want to configure anomalous RDP login detection so that I can identify and respond to potential security threats in my network.
11+
812
---
913

1014
# Configure the Security Events or Windows Security Events connector for anomalous RDP login detection

articles/sentinel/configure-data-transformation.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.date: 02/27/2022
8+
9+
10+
#Customer intent: [AI]As a security analyst, I want to configure ingestion-time data transformation and custom log ingestion so that I can control, filter, and enrich data before it is ingested into Microsoft Sentinel.
11+
812
---
913

1014
# Transform or customize data at ingestion time in Microsoft Sentinel (preview)

0 commit comments

Comments
 (0)