Skip to content

Commit ca60865

Browse files
authored
Merge pull request #4786 from batamig/workbooks-edit
adding workbooks edit - USX
2 parents 087d2a3 + 502c13e commit ca60865

File tree

2 files changed

+16
-25
lines changed

2 files changed

+16
-25
lines changed

unified-secops-platform/microsoft-sentinel-onboard.md

Lines changed: 6 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -119,30 +119,12 @@ After you connect your workspace to the Defender portal, **Microsoft Sentinel**
119119

120120
Many of the existing Microsoft Sentinel features are integrated into the Defender portal. For these features, notice that the experience between Microsoft Sentinel in the Azure portal and Defender portal are similar. Use the following articles to help you start working with Microsoft Sentinel in the Defender portal. When using these articles, keep in mind that your starting point in this context is the [Defender portal](https://security.microsoft.com/) instead of the Azure portal.
121121

122-
- Search
123-
- [Search across long time spans in large datasets](/azure/sentinel/search-jobs?tabs=defender-portal)
124-
- [Restore archived logs from search](/azure/sentinel/restore)
125-
- Threat management
126-
- [Visualize and monitor your data by using workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal)
127-
- [Conduct end-to-end threat hunting with Hunts](/azure/sentinel/hunts)
128-
- [Use hunting bookmarks for data investigations](/azure/sentinel/bookmarks)
129-
- [Use hunting Livestream in Microsoft Sentinel to detect threat](/azure/sentinel/livestream)
130-
- [Hunt for security threats with Jupyter notebooks](/azure/sentinel/notebooks-hunt)
131-
- [Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file](/azure/sentinel/indicators-bulk-file-import?tabs=defender-portal)
132-
- [Work with threat indicators in Microsoft Sentinel](/azure/sentinel/work-with-threat-indicators?tabs=defender-portal)
133-
- [Understand security coverage by the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage)
134-
- Content management
135-
- [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy?tabs=defender-portal)
136-
- [Microsoft Sentinel content hub catalog](/azure/sentinel/sentinel-solutions-catalog)
137-
- [Deploy custom content from your repository](/azure/sentinel/ci-cd)
138-
- Configuration
139-
- [Find your Microsoft Sentinel data connector](/azure/sentinel/data-connectors-reference)
140-
- [Create custom analytics rules to detect threats](/azure/sentinel/create-analytics-rules?tabs=defender-portal)
141-
- [Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel](/azure/sentinel/create-nrt-rules?tabs=defender-portal)
142-
- [Create watchlists](/azure/sentinel/watchlists-create?tabs=defender-portal)
143-
- [Manage watchlists in Microsoft Sentinel](/azure/sentinel/watchlists-manage)
144-
- [Create automation rules](/azure/sentinel/create-manage-use-automation-rules)
145-
- [Create and customize Microsoft Sentinel playbooks from content templates](/azure/sentinel/use-playbook-templates)
122+
| Feature category | Links |
123+
|--------------------|----------|
124+
| **Search** | - [Search across long time spans in large datasets](/azure/sentinel/search-jobs?tabs=defender-portal)<br>- [Restore archived logs from search](/azure/sentinel/restore) |
125+
| **Threat management** | - [Visualize and monitor your data by using workbooks](/azure/sentinel/monitor-your-data?tabs=defender-portal)<br>- [Conduct end-to-end threat hunting with Hunts](/azure/sentinel/hunts)<br>- [Use hunting bookmarks for data investigations](/azure/sentinel/bookmarks)<br>- [Use hunting Livestream in Microsoft Sentinel to detect threat](/azure/sentinel/livestream)<br>- [Hunt for security threats with Jupyter notebooks](/azure/sentinel/notebooks-hunt)<br>- [Add indicators in bulk to Microsoft Sentinel threat intelligence from a CSV or JSON file](/azure/sentinel/indicators-bulk-file-import?tabs=defender-portal)<br>- [Work with threat indicators in Microsoft Sentinel](/azure/sentinel/work-with-threat-indicators?tabs=defender-portal)<br>- [Understand security coverage by the MITRE ATT&CK framework](/azure/sentinel/mitre-coverage) |
126+
| **Content management** | - [Discover and manage Microsoft Sentinel out-of-the-box content](/azure/sentinel/sentinel-solutions-deploy?tabs=defender-portal)<br>- [Microsoft Sentinel content hub catalog](/azure/sentinel/sentinel-solutions-catalog)<br>- [Deploy custom content from your repository](/azure/sentinel/ci-cd) |
127+
| **Configuration** | - [Find your Microsoft Sentinel data connector](/azure/sentinel/data-connectors-reference)<br>- [Create custom analytics rules to detect threats](/azure/sentinel/create-analytics-rules?tabs=defender-portal)<br>- [Work with near-real-time (NRT) detection analytics rules in Microsoft Sentinel](/azure/sentinel/create-nrt-rules?tabs=defender-portal)<br>- [Create watchlists](/azure/sentinel/watchlists-create?tabs=defender-portal)<br>- [Manage watchlists in Microsoft Sentinel](/azure/sentinel/watchlists-manage)<br>- [Create automation rules](/azure/sentinel/create-manage-use-automation-rules)<br>- [Create and customize Microsoft Sentinel playbooks from content templates](/azure/sentinel/use-playbook-templates) |
146128

147129
Find Microsoft Sentinel settings in the Defender portal under **System** > **Settings** > **Microsoft Sentinel**.
148130

unified-secops-platform/whats-new.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: unified-security-operations
77
ms.author: bagol
88
author: batamig
99
ms.localizationpriority: medium
10-
ms.date: 07/31/2025
10+
ms.date: 08/20/2025
1111
manager: orspodek
1212
audience: ITPro
1313
ms.collection:
@@ -23,10 +23,19 @@ This article lists recent features added for unified security operations in the
2323

2424
## August 2025
2525

26+
2627
- [Viewing unified RBAC in multitenant management to GA](#viewing-unified-rbac-in-multitenant-management-to-ga)
2728
- [Tenant groups in multitenant management renamed to distribution profiles](#tenant-groups-in-multitenant-management-renamed-to-distribution-profiles)
2829
- [Distribute Microsoft Defender for Endpoint security policies with multitenant management](#distribute-microsoft-defender-for-endpoint-security-policies-with-multitenant-management)
2930

31+
### Edit workbooks directly in the Microsoft Defender portal
32+
33+
Now you can create and edit Microsoft Sentinel workbooks directly in the Microsoft Defender portal. This enhancement streamlines your workflow and allows you to manage your workbooks more efficiently and brings the workbook experience more closely aligned with the experience in the Azure portal.
34+
35+
Microsoft Sentinel workbooks are based on Azure Monitor workbooks, and help you visualize and monitor the data ingested to Microsoft Sentinel. Workbooks add tables and charts with analytics for your logs and queries to the tools already available.
36+
37+
Workbooks are available in the Defender portal under **Microsoft Sentinel > Threat management > Workbooks**. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](/azure/sentinel/monitor-your-data).
38+
3039
### Viewing unified RBAC in multitenant management to GA
3140

3241
Viewing unified role-based access control (RBAC) in the Microsoft Defender multitenant management portal is now generally available. This feature allows you to view a comprehensive view of permissions and access for your tenants.

0 commit comments

Comments
 (0)