Skip to content

Commit 16272b3

Browse files
authored
Merge pull request #206209 from rijutakapoor2/patch-10
Update work-with-threat-indicators.md
2 parents f38e367 + 8ddee1c commit 16272b3

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/sentinel/work-with-threat-indicators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ According to the default settings, each time the rule runs on its schedule, any
151151

152152
In Microsoft Sentinel, the alerts generated from analytics rules also generate security incidents, which can be found in **Incidents** under **Threat Management** on the Microsoft Sentinel menu. Incidents are what your security operations teams will triage and investigate to determine the appropriate response actions. You can find detailed information in this [Tutorial: Investigate incidents with Microsoft Sentinel](./investigate-cases.md).
153153

154-
IMPORTANT: Microsoft Sentinel refreshes indicators every 14 days to make sure they are available for matching purposes through the analytic rules.
154+
IMPORTANT: Microsoft Sentinel refreshes indicators every 12 days to make sure they are available for matching purposes through the analytic rules.
155155

156156
## Detect threats using matching analytics (Public preview)
157157

0 commit comments

Comments
 (0)