Skip to content

Commit 64a4511

Browse files
committed
continued USX language cleanup
1 parent c530d17 commit 64a4511

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

unified-secops-platform/cases-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- usx-security
1515
ms.topic: conceptual
1616

17-
# customer intent: As a security operations center business decision maker, I want to learn about the case management tool available in Microsoft's unified SecOps platform so I can unify security tickets and case management tools so I can get visibility into, and disrupt attacks in real time across identities, endpoints, email, cloud apps, data in hybrid and multicloud environments.
17+
# customer intent: As a security operations center business decision maker, I want to learn about the case management tool available in the Defender portal so I can unify security tickets and case management tools so I can get visibility into, and disrupt attacks in real time across identities, endpoints, email, cloud apps, data in hybrid and multicloud environments.
1818
---
1919

2020
# Manage cases natively with Microsoft Sentinel in the Defender portal

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ To onboard and use Microsoft Sentinel in the Defender portal, you must have the
5353

5454
- A Log Analytics workspace that has Microsoft Sentinel enabled
5555
- The data connector for Microsoft Defender XDR enabled in Microsoft Sentinel for incidents and alerts. Install the Defender XDR solution and configure the data connector to connect Microsoft Sentinel to the Defender portal. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy). Within the Defender XDR data connector, the configuration option to connect incident and alerts is turned off and disabled after you onboard Microsoft Sentinel to the Defender portal.
56-
- An Azure account with the appropriate roles to onboard, use, and create support requests for Microsoft Sentinel in the Defender portal. You won't see workspaces in the unified SecOps portal that you don't have permissions to onboard. The following table highlights some of the key roles needed.
56+
- An Azure account with the appropriate roles to onboard, use, and create support requests for Microsoft Sentinel in the Defender portal. You won't see workspaces in the Defender portal to onboard where you don't have the required permissions. The following table highlights some of the key roles needed.
5757

5858
|Task |Microsoft Entra or Azure built-in role required |Scope |
5959
|---------|---------|---------|
@@ -66,7 +66,7 @@ To onboard and use Microsoft Sentinel in the Defender portal, you must have the
6666

6767
After you connect Microsoft Sentinel to the Defender portal, your existing Azure role-based access control (RBAC) permissions allow you to work with the Microsoft Sentinel features that you have access to. Continue to manage roles and permissions for your Microsoft Sentinel users from the Azure portal. Any Azure RBAC changes are reflected in the Defender portal. For more information about Microsoft Sentinel permissions, see [Roles and permissions in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/roles) and [Manage access to Microsoft Sentinel data by resource | Microsoft Learn](/azure/sentinel/resource-context-rbac).
6868

69-
### Microsoft's unified SecOps platform prerequisites
69+
### Microsoft's unified SecOps platform prerequisites
7070

7171
To unify capabilities with Defender XDR in Microsoft's unified SecOps platform, you must have the following resources and access:
7272

0 commit comments

Comments
 (0)