Skip to content

Commit 07317d8

Browse files
fix acronlinx issue
1 parent 9798e77 commit 07317d8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/sentinel/migration-splunk-detection-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ This table helps you to clarify the concept of a rule in Microsoft Sentinel comp
9191
|**Rule type** |• Scheduled<br>• Real-time |• Scheduled query<br>• Fusion<br>• Microsoft Security<br>• Machine Learning (ML) Behavior Analytics |
9292
|**Criteria** |Define in SPL |Define in KQL |
9393
|**Trigger condition** |• Number of results<br>• Number of hosts<br>• Number of sources<br>• Custom |Threshold: Number of query results |
94-
|**Action** |• Add to triggered alerts<br>• Log Event<br>• Output results to lookup<br>• And more |• Create alert or incident<br>• Integrates with Logic Apps |
94+
|**Action** |• Add to triggered alerts<br>• Log Event<br>• Output results to look up<br>• And more |• Create alert or incident<br>• Integrates with Logic Apps |
9595

9696
## Map and compare rule samples
9797

0 commit comments

Comments
 (0)