Skip to content

Commit 003713f

Browse files
authored
Merge pull request #50303 from KenMAG/Bugs
Revised table data to fix localization issue
2 parents d3a9a64 + a7b8dfc commit 003713f

File tree

3 files changed

+13
-14
lines changed

3 files changed

+13
-14
lines changed

learn-pr/wwl-sci/query-logs-azure-sentinel/3-understand-azure-sentinel-tables.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Understand Microsoft Sentinel tables
44
metadata:
55
title: Understand Microsoft Sentinel tables
66
description: "Understand Microsoft Sentinel tables"
7-
ms.date: 12/12/2023
8-
author: wwlpublish
7+
ms.date: 05/06/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
durationInMinutes: 2
Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,13 @@
1-
Microsoft Sentinel has Analytic Rules that will generate Alerts and Incidents based on querying the tables within Log Analytics. The primary tables to manage alerts and incidents are SecurityAlert and SecurityIncident. Microsoft Sentinel provides tables to be a repository of indicators and watchlists.
1+
Microsoft Sentinel has Analytic Rules that generate Alerts and Incidents based on querying the tables within Log Analytics. The primary tables to manage alerts and incidents are SecurityAlert and SecurityIncident. Microsoft Sentinel provides tables to be a repository of indicators and watchlists.
22

33
> [!NOTE]
4-
> Some of the Sentinel Data Connectors will ingest alerts directly.
4+
> Some of the Sentinel Data Connectors ingest alerts directly.
55
66
The table below is the Microsoft Sentinel feature related tables.
77

88
| Table| Description|
99
| :--- | :--- |
10-
| SecurityAlert| Contains Alerts Generated from Sentinel Analytical Rules. Also, it could include Alerts created directly from a Sentinel Data Connector|
11-
| SecurityIncident| Alerts can generate Incidents. Incidents are related to Alert(s).|
12-
| ThreatIntelligenceIndicator| Contains user-created or data connector ingested Indicators such as File Hashes, IP Addresses, Domains|
13-
| Watchlist| A Microsoft Sentinel watchlist contains imported data.|
14-
10+
| `SecurityAlert`| Contains Alerts Generated from Sentinel Analytical Rules. Also, it could include Alerts created directly from a Sentinel Data Connector|
11+
| `SecurityIncident`| Alerts can generate Incidents. Incidents are related to Alert(s).|
12+
| `ThreatIntelligenceIndicator`| Contains user-created or data connector ingested Indicators such as File Hashes, IP Addresses, Domains|
13+
| `Watchlist`| A Microsoft Sentinel watchlist contains imported data.|

learn-pr/wwl-sci/query-logs-azure-sentinel/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ uid: learn.wwl.query-logs-azure-sentinel
33
metadata:
44
title: Query logs in Microsoft Sentinel
55
description: "Query logs in Microsoft Sentinel"
6-
ms.date: 12/12/2023
7-
author: wwlpublish
6+
ms.date: 05/06/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Query logs in Microsoft Sentinel
12-
summary: As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Microsoft Sentinel.
12+
summary: As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Microsoft Sentinel.
1313
abstract: |
14-
Upon completion of this module, the learner will be able to:
14+
Upon completion of this module, the learner is able to:
1515
- Use the Logs page to view data tables in Microsoft Sentinel
1616
- Query the most used tables using Microsoft Sentinel
1717
prerequisites: |
@@ -22,7 +22,7 @@ levels:
2222
roles:
2323
- security-operations-analyst
2424
products:
25-
- azure
25+
- microsoft-sentinel
2626
subjects:
2727
- cloud-security
2828
units:

0 commit comments

Comments
 (0)