|
2 | 2 | title: Create custom analytics rules to detect threats with Microsoft Sentinel | Microsoft Docs
|
3 | 3 | description: Learn how to create custom analytics rules to detect security threats with Microsoft Sentinel. Take advantage of event grouping, alert grouping, and alert enrichment, and understand AUTO DISABLED.
|
4 | 4 | author: yelevin
|
5 |
| -ms.topic: how-to |
6 |
| -ms.date: 01/30/2022 |
7 | 5 | ms.author: yelevin
|
8 |
| -ms.custom: ignite-fall-2021 |
| 6 | +ms.topic: how-to |
| 7 | +ms.date: 01/08/2023 |
9 | 8 | ---
|
10 | 9 |
|
11 | 10 | # Create custom analytics rules to detect threats
|
@@ -221,15 +220,15 @@ In the **Alert grouping** section, if you want a single incident to be generated
|
221 | 220 |
|
222 | 221 | :::image type="content" source="media/tutorial-detect-threats-custom/automated-response-tab.png" alt-text="Define the automated response settings":::
|
223 | 222 |
|
224 |
| -1. Select **Review and create** to review all the settings for your new alert rule. When the "Validation passed" message appears, select **Create** to initialize your alert rule. |
| 223 | +1. Select **Review and create** to review all the settings for your new analytics rule. When the "Validation passed" message appears, select **Create**. |
225 | 224 |
|
226 | 225 | :::image type="content" source="media/tutorial-detect-threats-custom/review-and-create-tab.png" alt-text="Review all settings and create the rule":::
|
227 | 226 |
|
228 | 227 | ## View the rule and its output
|
229 | 228 |
|
230 | 229 | - You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
|
231 | 230 |
|
232 |
| -- To view the results of the alert rules you create, go to the **Incidents** page, where you can triage, [investigate incidents](investigate-cases.md), and remediate the threats. |
| 231 | +- To view the results of the analytics rules you create, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). |
233 | 232 |
|
234 | 233 | - You can update the rule query to exclude false positives. For more information, see [Handle false positives in Microsoft Sentinel](false-positives.md).
|
235 | 234 |
|
@@ -295,8 +294,6 @@ You can also push rules to Microsoft Sentinel via [API](/rest/api/securityinsigh
|
295 | 294 |
|
296 | 295 | For more information, see:
|
297 | 296 |
|
298 |
| -For more information, see: |
299 |
| -
|
300 | 297 | - [Tutorial: Investigate incidents with Microsoft Sentinel](investigate-cases.md)
|
301 | 298 | - [Classify and analyze data using entities in Microsoft Sentinel](entities.md)
|
302 | 299 | - [Tutorial: Use playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md)
|
|
0 commit comments