Skip to content

Commit 0111b17

Browse files
committed
more-articles-about-microsoft-sentinel-solutions
1 parent a08db15 commit 0111b17

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/sentinel/sentinel-analytic-rules-creation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ This field is mandatory.
5555

5656
### Name
5757

58-
The `name` attribute provides a brief label that summarizes the detection. Make sure the label is clear and concise to help users understand the purpose of the rule. Use `alertDetailsOverride` to generate dynamic names to aid analysts in understanding the alert. See the following requirements:
58+
The `name` attribute provides a brief label that summarizes the detection. Make sure the label is clear and concise to help users understand the purpose of the rule. Use `alertDetailsOverride` to generate dynamic names to help analysts understand the alert. See the following requirements:
5959

6060
* Uses sentence-case capitalization
6161
* Doesn't end in a period
@@ -166,7 +166,7 @@ Limit the query to 10,000 characters. If the query section exceeds this limit, c
166166

167167
Each line in the query body must have at least one space at the beginning, but two spaces are standard to support readability.
168168

169-
If you're submitting a query for a datatype that isn't present in the Detections or Hunting Queries folder, name the subfolder that contains the YAML files after the table being queried. For instance, if your query pertains to the `AzureDevOpsAuditing` table, create a folder named `AzureDevOpsAuditing`.
169+
When you submit a query for a datatype that isn't present in the Detections or Hunting Queries folder, name the subfolder that contains the YAML files after the table being queried. For instance, if your query pertains to the `AzureDevOpsAuditing` table, create a folder named `AzureDevOpsAuditing`.
170170

171171
Define human-readable names for explicit constants:
172172

articles/sentinel/sentinel-hunting-rules-creation.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,11 +22,11 @@ This article walks you through the process of creating and publishing hunting qu
2222

2323
Hunting queries in Microsoft Sentinel are used in various scenarios to enhance threat detection and response. Common use cases include:
2424

25-
* **Detecting suspicious user activity**: Security teams can use hunting queries to identify anomalous behavior such as unusual sign-in attempts, access patterns, or privilege-escalation activities. By analyzing user activity logs, analysts can detect potential insider threats or compromised accounts.
26-
* **Identifying malware and ransomware infections**: Hunting queries can help detect signs of malware or ransomware infections by scanning for known indicators of compromise (IoCs), unusual network traffic patterns, or file integrity changes. This proactive approach enables teams to respond quickly to mitigate the impact of an infection.
27-
* **Monitoring network anomalies**: To identify potential breaches, you can analyze network traffic for unusual patterns, such as unexpected data transfers or communication with known malicious IP addresses. Hunting queries enable analysts to pinpoint these anomalies and investigate further.
28-
* **Investigating phishing attacks**: Hunting queries can be used to detect phishing attempts by analyzing email logs and identifying suspicious links or attachments. Hunting queries can correlate these findings with threat intelligence data. This helps prevent credential theft and protect sensitive information.
29-
* **Tracking lateral movement**: After an attacker gains initial access, they can move laterally within the network to escalate privileges or access critical systems. Hunting queries can track these movements by analyzing sign-in events, remote desktop sessions, and other relevant data to detect and disrupt the attack.
25+
* **Detect suspicious user activity**: Security teams can use hunting queries to identify anomalous behavior such as unusual sign-in attempts, access patterns, or privilege-escalation activities. By analyzing user activity logs, analysts can detect potential insider threats or compromised accounts.
26+
* **Identify malware and ransomware infections**: Hunting queries can help you detect signs of malware or ransomware infections because they scan for known indicators of compromise (IoCs), unusual network traffic patterns, or file integrity changes. This proactive approach enables teams to respond quickly to mitigate the impact of an infection.
27+
* **Monitor network anomalies**: To identify potential breaches, you can analyze network traffic for unusual patterns, such as unexpected data transfers or communication with known malicious IP addresses. Hunting queries enable analysts to pinpoint these anomalies and investigate further.
28+
* **Investigate phishing attacks**: Hunting queries can help you detect phishing attempts because they analyze email logs and identify suspicious links or attachments. Hunting queries can correlate these findings with threat intelligence data. This process helps you prevent credential theft and protect sensitive information.
29+
* **Track lateral movement**: After an attacker gains initial access, they can move laterally within the network to escalate privileges or access critical systems. Hunting queries can track these movements by analyzing sign-in events, remote desktop sessions, and other relevant data to detect and disrupt the attack.
3030

3131
## Create effective hunting queries
3232

@@ -54,7 +54,7 @@ This field is mandatory.
5454

5555
### Name
5656

57-
The `name` attribute provides a brief label that summarizes the detection. Make sure the label is clear and concise to help users understand the purpose of the hunting query. Use `alertDetailsOverride` to generate dynamic names to aid analysts in understanding the alert. See the following requirements:
57+
The `name` attribute provides a brief label that summarizes the detection. Make sure the label is clear and concise to help users understand the purpose of the hunting query. Use `alertDetailsOverride` to generate dynamic names to help analysts understand the alert. See the following requirements:
5858

5959
* Uses sentence-case capitalization
6060
* Doesn't end in a period
@@ -115,7 +115,7 @@ Limit the query to 10,000 characters. If the query section exceeds this limit, c
115115

116116
Each line in the query body must have at least one space at the beginning, but two spaces are standard to support readability.
117117

118-
If you're submitting a query for a datatype that isn't present in the Detections or Hunting Queries folder, name the subfolder that contains the YAML files after the table being queried. For instance, if your query pertains to the `AzureDevOpsAuditing` table, create a folder named `AzureDevOpsAuditing`.
118+
When you submit a query for a datatype that isn't present in the Detections or Hunting Queries folder, name the subfolder that contains the YAML files after the table being queried. For instance, if your query pertains to the `AzureDevOpsAuditing` table, create a folder named `AzureDevOpsAuditing`.
119119

120120
Define human-readable names for explicit constants:
121121

0 commit comments

Comments
 (0)