Skip to content

Commit bdee384

Browse files
committed
fixed links
1 parent 5f201f1 commit bdee384

2 files changed

Lines changed: 3 additions & 4 deletions

File tree

articles/sentinel/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ For more information about the workbook, see the [Microsoft Sentinel Behaviors W
4040

4141
### New Entity Behavior Analytics (UEBA) widget in the Defender portal home page (Preview)
4242

43-
The Defender portal home page now includes a UEBA widget where analysts can immediately have visibility into anomalous user behavior and therefore accelerate threat detection workflows. For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows-preview).
43+
The Defender portal home page now includes a UEBA widget where analysts can immediately have visibility into anomalous user behavior and therefore accelerate threat detection workflows. For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#use-embedded-ueba-experiences-in-defender-portal).
4444

4545
### Updated date: Microsoft Sentinel in the Azure portal to be retired March 2027
4646

@@ -111,7 +111,7 @@ Advanced hunting and custom detection experiences now include a contextual banne
111111

112112
All features require UEBA to be enabled and are workspace-scoped to the currently selected workspace.
113113

114-
For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows-preview).
114+
For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#use-embedded-ueba-experiences-in-defender-portal).
115115

116116
### SAP data connectors
117117

articles/sentinel/work-with-anomaly-rules.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -150,5 +150,4 @@ In this document, you learned how to work with customizable anomaly detection an
150150
151151
- Get some background information about [customizable anomalies](soc-ml-anomalies.md).
152152
- View the [available anomaly types](anomalies-reference.md) in Microsoft Sentinel.
153-
- Explore other [analytics rule types](detect-threats-built-in.md).
154-
- See [useful KQL queries](ueba-useful-queries.md) for the Anomalies table.
153+
- Explore other [analytics rule types](detect-threats-built-in.md).

0 commit comments

Comments
 (0)