Skip to content

Commit 07412d8

Browse files
update for explicit identifiers
1 parent 9f0cf61 commit 07412d8

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/sentinel/mssp-protect-intellectual-property.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,12 +70,14 @@ To do this, you need a workspace in your own tenant with Microsoft Sentinel enab
7070
To create an analytic rule or hunting query in the MSSP tenant that references data in the customer tenant, you must use the `workspace` statement as follows:
7171

7272
```kusto
73-
workspace('<customer-workspace>').SecurityEvent
73+
workspace('<customer-workspace-explicit-identifier>').SecurityEvent
7474
| where EventID == ‘4625’
7575
```
7676

7777
When adding a `workspace` statement to your analytics rules, consider the following:
7878

79+
- **Use the customer's explicit workspace identifier** in the cross workspace query for best performance. For more information, see [Identifier formats for cross workspace queries](/azure/azure-monitor/logs/cross-workspace-query#arguments).
80+
7981
- **No alerts in the customer workspace**. Rules created in this manner, don't create alerts or incidents in the customer workspace. Both alerts and incidents exist in your MSSP workspace only.
8082

8183
- **Create separate alerts for each customer**. When you use this method, we also recommend that you use separate alert rules for each customer and detection, as the workspace statement is different in each case.

0 commit comments

Comments
 (0)