Skip to content

Commit 07e004a

Browse files
authored
Merge pull request #223339 from yelevin/yelevin/analytics-tutorial
Analytics tutorial
2 parents 86d1739 + d90fa85 commit 07e004a

12 files changed

+214
-7
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@
2323
href: tutorial-respond-threats-playbook.md
2424
- name: Automatically enrich incident information
2525
href: tutorial-enrich-ip-information.md
26+
- name: Detect Log4j vulnerability exploits
27+
href: tutorial-log4j-detection.md
2628
- name: Get started with notebooks and MSTICPy
2729
href: notebook-get-started.md
2830
- name: Create a Power BI report from Microsoft Sentinel

articles/sentinel/detect-threats-custom.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,9 @@
22
title: Create custom analytics rules to detect threats with Microsoft Sentinel | Microsoft Docs
33
description: Learn how to create custom analytics rules to detect security threats with Microsoft Sentinel. Take advantage of event grouping, alert grouping, and alert enrichment, and understand AUTO DISABLED.
44
author: yelevin
5-
ms.topic: how-to
6-
ms.date: 01/30/2022
75
ms.author: yelevin
8-
ms.custom: ignite-fall-2021
6+
ms.topic: how-to
7+
ms.date: 01/08/2023
98
---
109

1110
# Create custom analytics rules to detect threats
@@ -221,15 +220,15 @@ In the **Alert grouping** section, if you want a single incident to be generated
221220
222221
:::image type="content" source="media/tutorial-detect-threats-custom/automated-response-tab.png" alt-text="Define the automated response settings":::
223222
224-
1. Select **Review and create** to review all the settings for your new alert rule. When the "Validation passed" message appears, select **Create** to initialize your alert rule.
223+
1. Select **Review and create** to review all the settings for your new analytics rule. When the "Validation passed" message appears, select **Create**.
225224
226225
:::image type="content" source="media/tutorial-detect-threats-custom/review-and-create-tab.png" alt-text="Review all settings and create the rule":::
227226
228227
## View the rule and its output
229228
230229
- You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
231230
232-
- To view the results of the alert rules you create, go to the **Incidents** page, where you can triage, [investigate incidents](investigate-cases.md), and remediate the threats.
231+
- To view the results of the analytics rules you create, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
233232
234233
- You can update the rule query to exclude false positives. For more information, see [Handle false positives in Microsoft Sentinel](false-positives.md).
235234
@@ -295,8 +294,6 @@ You can also push rules to Microsoft Sentinel via [API](/rest/api/securityinsigh
295294
296295
For more information, see:
297296
298-
For more information, see:
299-
300297
- [Tutorial: Investigate incidents with Microsoft Sentinel](investigate-cases.md)
301298
- [Classify and analyze data using entities in Microsoft Sentinel](entities.md)
302299
- [Tutorial: Use playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md)
25.8 KB
Loading
42.1 KB
Loading
34.3 KB
Loading
128 KB
Loading
40.7 KB
Loading
70.4 KB
Loading
39.7 KB
Loading
62.6 KB
Loading

0 commit comments

Comments
 (0)