Skip to content

Commit 161ba5a

Browse files
committed
minor changes
1 parent 128290a commit 161ba5a

File tree

5 files changed

+1
-5
lines changed

5 files changed

+1
-5
lines changed
5.86 KB
Loading
Binary file not shown.
14.3 KB
Loading

articles/sentinel/tutorial-detect-threats-custom.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -91,12 +91,8 @@ You can create custom analytic rules to help you search for the types of threats
9191

9292
1. In the **Automated responses** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](tutorial-respond-threats-playbook.md).
9393

94-
![Automate response to threats in Azure Sentinel](media/tutorial-detect-threats-custom/response-automation-custom.png)
95-
9694
1. Select **Review and create** to review all the settings for your new alert rule and then select **Create to initialize your alert rule**.
97-
98-
![Review your custom query](media/tutorial-detect-threats-custom/review-tab.png)
99-
95+
10096
1. After the alert is created, a custom rule is added to the table under **Active rules**. From this list you can enable, disable, or delete each rule.
10197

10298
1. To view the results of the alert rules you create, go to the **Incidents** page, where you can triage, [investigate incidents](tutorial-investigate-cases.md), and remediate the threats.

0 commit comments

Comments
 (0)