Skip to content

Commit 23a2083

Browse files
rshunimdorschw
authored andcommitted
Azure Sentinel description updated (demisto#24510)
* update description * Update Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml Co-authored-by: dorschw <[email protected]> * Update Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml Co-authored-by: dorschw <[email protected]> * another line to change * remove - * docker image * RN * trig build * docker image * conflict with master --------- Co-authored-by: dorschw <[email protected]>
1 parent 2cb6f5c commit 23a2083

File tree

4 files changed

+9
-4
lines changed

4 files changed

+9
-4
lines changed

Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ configuration:
126126
type: 8
127127
section: Connect
128128
advanced: true
129-
description: Use the Azure Sentinel integration to get and manage incidents and get related entity information for incidents.
129+
description: "Microsoft Sentinel is a scalable, cloud-native solution that provides: Security information and event management (SIEM) Security orchestration, automation, and response (SOAR)."
130130
display: Microsoft Sentinel
131131
name: Azure Sentinel
132132
script:
@@ -1848,7 +1848,7 @@ script:
18481848
- contextPath: AzureSentinel.ThreatIndicator.Types
18491849
description: The threat types of the indicator.
18501850
type: Unknown
1851-
dockerimage: demisto/crypto:1.0.0.47103
1851+
dockerimage: demisto/crypto:1.0.0.47970
18521852
feed: false
18531853
isfetch: true
18541854
longRunning: false

Packs/AzureSentinel/Integrations/AzureSentinel/AzureSentinel_description.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Follow these steps for a self-deployed configuration:
1313
3. Assign a role to the registered app.
1414
1. In Azure portal, go to the Subscriptions and select the subscription you are using -> Access control (IAM).
1515
2. Click Add -> Add role assignment.
16-
3. Select the Azure Sentinel Contributor role -> Select your registered app, and click Save.
16+
3. Select the Microsoft Sentinel Contributor role -> Select your registered app, and click Save.
1717
4. In Cortex XSOAR, go to **Settings** > **Integrations** > **Credentials** and create a new credentials set.
1818
5. In the *Username* parameter, enter your registered app Application (client) ID.
1919
6. In the *Password* parameter, enter the secret value you created.
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
2+
#### Integrations
3+
##### Microsoft Sentinel
4+
- Documentation and metadata improvements.
5+
- Updated the Docker image to: *demisto/crypto:1.0.0.47970*.

Packs/AzureSentinel/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Microsoft Sentinel",
33
"description": "Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise.",
44
"support": "xsoar",
5-
"currentVersion": "1.4.11",
5+
"currentVersion": "1.4.12",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

0 commit comments

Comments
 (0)