Skip to content

Commit a7b8dfc

Browse files
author
Ken Lawson
committed
Improved Acrolinx scores
1 parent ae11373 commit a7b8dfc

File tree

2 files changed

+7
-8
lines changed

2 files changed

+7
-8
lines changed
Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,13 @@
1-
Microsoft Sentinel has Analytic Rules that will generate Alerts and Incidents based on querying the tables within Log Analytics. The primary tables to manage alerts and incidents are SecurityAlert and SecurityIncident. Microsoft Sentinel provides tables to be a repository of indicators and watchlists.
1+
Microsoft Sentinel has Analytic Rules that generate Alerts and Incidents based on querying the tables within Log Analytics. The primary tables to manage alerts and incidents are SecurityAlert and SecurityIncident. Microsoft Sentinel provides tables to be a repository of indicators and watchlists.
22

33
> [!NOTE]
4-
> Some of the Sentinel Data Connectors will ingest alerts directly.
4+
> Some of the Sentinel Data Connectors ingest alerts directly.
55
66
The table below is the Microsoft Sentinel feature related tables.
77

88
| Table| Description|
99
| :--- | :--- |
10-
| `SecurityAlert`| Contains Alerts Generated from Sentinel Analytical Rules. Also, it could include Alerts created directly from a Sentinel Data Connector|
11-
| `SecurityIncident`| Alerts can generate Incidents. Incidents are related to Alert(s).|
10+
| `SecurityAlert`| Contains Alerts Generated from Sentinel Analytical Rules. Also, it could include Alerts created directly from a Sentinel Data Connector|
11+
| `SecurityIncident`| Alerts can generate Incidents. Incidents are related to Alert(s).|
1212
| `ThreatIntelligenceIndicator`| Contains user-created or data connector ingested Indicators such as File Hashes, IP Addresses, Domains|
1313
| `Watchlist`| A Microsoft Sentinel watchlist contains imported data.|
14-

learn-pr/wwl-sci/query-logs-azure-sentinel/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ metadata:
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Query logs in Microsoft Sentinel
12-
summary: As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Microsoft Sentinel.
12+
summary: As a Security Operations Analyst, you must understand the tables, fields, and data ingested in your workspace. Learn how to query the most used data tables in Microsoft Sentinel.
1313
abstract: |
14-
Upon completion of this module, the learner will be able to:
14+
Upon completion of this module, the learner is able to:
1515
- Use the Logs page to view data tables in Microsoft Sentinel
1616
- Query the most used tables using Microsoft Sentinel
1717
prerequisites: |
@@ -22,7 +22,7 @@ levels:
2222
roles:
2323
- security-operations-analyst
2424
products:
25-
- azure
25+
- microsoft-sentinel
2626
subjects:
2727
- cloud-security
2828
units:

0 commit comments

Comments
 (0)