Skip to content

Commit 4ac141d

Browse files
committed
Merge branch 'main' into v-smandalika-9792656-B6
2 parents 66b8d7d + 9f8892e commit 4ac141d

File tree

4 files changed

+12
-7
lines changed

4 files changed

+12
-7
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,11 @@
180180
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
181181
"redirect_url": "/defender-xdr/troubleshoot",
182182
"redirect_document_id": false
183+
},
184+
{
185+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
186+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
187+
"redirect_document_id": false
183188
}
184189
]
185190
}

defender-for-iot/manage-devices-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
---
1111

1212
# Discover and manage devices
13-
<!-- possibly add to h1 in the device inventory-->
13+
1414
Microsoft Defender for IoT in the Microsoft Defender portal includes the device inventory, which helps you identify details about specific OT devices. Gathering details about your devices helps your teams proactively investigate vulnerabilities that can compromise your most critical assets. This article describes how to discover and manage your devices in the device inventory. You can filter data in the inventory, explore the inventory, investigate device details, and more.
1515

1616
Learn more about the benefits of OT [device discovery](device-discovery.md).

unified-secops-platform/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
- name: Overview
4343
href: overview-deploy.md
4444
- name: Connect Microsoft Sentinel to Microsoft Defender
45-
href: /defender-xdr/microsoft-sentinel-onboard?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
45+
href: microsoft-sentinel-onboard.md
4646
- name: Reduce security risk
4747
href: reduce-risk-overview.md
4848
- name: Detect threats

defender-xdr/microsoft-sentinel-onboard.md renamed to unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect Microsoft Sentinel to the Microsoft Defender portal
33
description: Learn how to connect your Microsoft Sentinel environment to the Defender portal to unify your security operations.
4-
ms.service: defender-xdr
4+
ms.service: unified-secops-platform
55
f1.keywords:
66
- NOCSH
77
ms.author: cwatson
@@ -41,8 +41,8 @@ For preview, Microsoft Sentinel is available in the Defender portal without Micr
4141
Before you begin, review the feature documentation to understand the product changes and limitations.
4242

4343
- [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal)
44-
- [Advanced hunting in the Microsoft Defender portal](advanced-hunting-microsoft-defender.md)
45-
- [Alerts, incidents, and correlation in Microsoft Defender XDR](alerts-incidents-correlation.md)
44+
- [Advanced hunting in the Microsoft Defender portal](/defender-xdr/advanced-hunting-microsoft-defender)
45+
- [Alerts, incidents, and correlation in Microsoft Defender XDR](/defender-xdr/alerts-incidents-correlation)
4646
- [Automation with the unified security operations platform](/azure/sentinel/automation#automation-with-the-unified-security-operations-platform)
4747

4848
The Microsoft Defender portal supports a single Microsoft Entra tenant and the connection to one workspace at a time. In the context of this article, a workspace is a Log Analytics workspace with Microsoft Sentinel enabled.
@@ -141,6 +141,6 @@ If you want to connect to a different workspace, from the **Workspaces** page, s
141141

142142
- [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690)
143143
- [Advanced hunting in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2264410)
144-
- [Automatic attack disruption in Microsoft Defender XDR](automatic-attack-disruption.md)
145-
- [Investigate incidents in Microsoft Defender portal](investigate-incidents.md)
144+
- [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption)
145+
- [Investigate incidents in Microsoft Defender portal](/defender-xdr/investigate-incidents)
146146
- [Optimize your security operations](/azure/sentinel/soc-optimization/soc-optimization-access?tabs=defender-portal)

0 commit comments

Comments
 (0)