Skip to content

Commit 00e9922

Browse files
authored
Merge pull request #89237 from cabailey/cabailey-azuredocs-fixhyphen
Remove hyphen in 'multi-stage attack detection'
2 parents b7c6f72 + f5ca51a commit 00e9922

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

articles/sentinel/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@
2828
items:
2929
- name: Assign permissions using roles
3030
href: roles.md
31-
- name: Advanced multi-stage attack detection
31+
- name: Advanced multistage attack detection
3232
href: fusion.md
3333
- name: How-to guides
3434
items:

articles/sentinel/tutorial-detect-threats-built-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To view all the out-of-the-box detections, go to **Analytics** and then **Rule
4343
This following template types are available:
4444

4545
- **Microsoft security** - Microsoft security templates automatically create Azure Sentinel incidents from the alerts generated in other Microsoft security solutions, in real time. You can use Microsoft security rules as a template to create new rules with similar logic. For more information about security rules, see [Automatically create incidents from Microsoft security alerts](create-incidents-from-alerts.md).
46-
- **Fusion** - Based on Fusion technology, advanced multi-stage attack detection in Azure Sentinel uses scalable machine learning algorithms that can correlate many low-fidelity alerts and events across multiple products into high-fidelity and actionable incidents. Fusion is enabled by default. Because the logic is hidden, you cannot use this as a template to create more than one rule.
46+
- **Fusion** - Based on Fusion technology, advanced multistage attack detection in Azure Sentinel uses scalable machine learning algorithms that can correlate many low-fidelity alerts and events across multiple products into high-fidelity and actionable incidents. Fusion is enabled by default. Because the logic is hidden, you cannot use this as a template to create more than one rule.
4747
- **Machine learning behavioral analytics** - These templates are based on proprietary Microsoft machine learning algorithms, so you cannot see the internal logic of how they work and when they run. Because the logic is hidden, you cannot use this as a template to create more than one rule.
4848
- **Scheduled** – Scheduled analytic rules are scheduled queries written by Microsoft security experts. You can see the query logic and make changes to it. You can use scheduled rules as a template to create new rules with similar logic.
4949

0 commit comments

Comments
 (0)