You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/detect-threats-custom.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,15 +58,15 @@ This section describes how to create a rule using the Azure or Defender portals.
58
58
59
59
### Start the Analytics rule wizard
60
60
61
-
# [Azure portal](#tab/azure)
61
+
# [Azure portal](#tab/azure-portal)
62
62
63
63
1. From the **Configuration** section of the Microsoft Sentinel navigation menu, select **Analytics**.
64
64
65
65
1. In the action bar at the top, select **+Create** and select **Scheduled query rule**. This opens the **Analytics rule wizard**.
66
66
67
67
:::image type="content" source="media/detect-threats-custom/create-scheduled-query.png" alt-text="Screenshot of Analytics screen in Azure portal." lightbox="media/detect-threats-custom/create-scheduled-query.png":::
68
68
69
-
# [Defender portal](#tab/defender)
69
+
# [Defender portal](#tab/defender-portal)
70
70
71
71
1. From the Microsoft Defender navigation menu, expand **Microsoft Sentinel**, then **Configuration**. Select **Analytics**.
72
72
@@ -108,11 +108,11 @@ In the Azure portal, stages are represented visually as tabs. In the Defender po
108
108
109
109
1. Select **Next: Set rule logic**.
110
110
111
-
# [Azure portal](#tab/azure)
111
+
# [Azure portal](#tab/azure-portal)
112
112
113
113
:::image type="content" source="media/detect-threats-custom/general-tab.png" alt-text="Screenshot of opening screen of analytics rule wizard in the Azure portal.":::
114
114
115
-
# [Defender portal](#tab/defender)
115
+
# [Defender portal](#tab/defender-portal)
116
116
117
117
:::image type="content" source="media/detect-threats-custom/defender-wizard-general.png" alt-text="Screenshot of opening screen of analytics rule wizard in the Defender portal.":::
118
118
@@ -168,11 +168,11 @@ In the Azure portal, stages are represented visually as tabs. In the Defender po
168
168
169
169
:::image type="content" source="media/detect-threats-custom/advanced-scheduling.png" alt-text="Screenshot of advanced scheduling toggle and settings.":::
170
170
171
-
# [Azure portal](#tab/azure)
171
+
# [Azure portal](#tab/azure-portal)
172
172
173
173
:::image type="content" source="media/detect-threats-custom/set-rule-logic-contd.png" alt-text="Screenshot of continuation of rule logic screen of analytics rule wizard in the Azure portal.":::
174
174
175
-
# [Defender portal](#tab/defender)
175
+
# [Defender portal](#tab/defender-portal)
176
176
177
177
:::image type="content" source="media/detect-threats-custom/defender-set-rule-logic-contd.png" alt-text="Screenshot of continuation of rule logic screen of analytics rule wizard in the Defender portal.":::
178
178
@@ -259,11 +259,11 @@ In the **Incident settings** tab, choose whether Microsoft Sentinel turns alerts
259
259
260
260
1. Select **Next: Automated response**.
261
261
262
-
# [Azure portal](#tab/azure)
262
+
# [Azure portal](#tab/azure-portal)
263
263
264
264
:::image type="content" source="media/detect-threats-custom/incident-settings-tab.png" alt-text="Screenshot of incident settings screen of analytics rule wizard in the Azure portal.":::
265
265
266
-
# [Defender portal](#tab/defender)
266
+
# [Defender portal](#tab/defender-portal)
267
267
268
268
:::image type="content" source="media/detect-threats-custom/defender-incident-settings.png" alt-text="Screenshot of incident settings screen of analytics rule wizard in the Defender portal.":::
269
269
@@ -286,11 +286,11 @@ Automate more complex tasks and invoke responses from remote systems to remediat
286
286
287
287
- For more information about when to use the **incident created trigger**, the **incident updated trigger**, or the **alert created trigger**, see [Use triggers and actions in Microsoft Sentinel playbooks](playbook-triggers-actions.md#microsoft-sentinel-triggers-summary).
288
288
289
-
# [Azure portal](#tab/azure)
289
+
# [Azure portal](#tab/azure-portal)
290
290
291
291
:::image type="content" source="media/detect-threats-custom/automated-response-tab.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Azure portal.":::
292
292
293
-
# [Defender portal](#tab/defender)
293
+
# [Defender portal](#tab/defender-portal)
294
294
295
295
:::image type="content" source="media/detect-threats-custom/defender-automated-response.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Defender portal.":::
296
296
@@ -303,11 +303,11 @@ Automate more complex tasks and invoke responses from remote systems to remediat
303
303
304
304
Select **Next: Review and create** to review all the settings for your new analytics rule. When the "Validation passed" message appears, select **Create**.
305
305
306
-
# [Azure portal](#tab/azure)
306
+
# [Azure portal](#tab/azure-portal)
307
307
308
308
:::image type="content" source="media/detect-threats-custom/review-and-create-tab.png" alt-text="Screenshot of validation screen of analytics rule wizard in the Azure portal.":::
309
309
310
-
# [Defender portal](#tab/defender)
310
+
# [Defender portal](#tab/defender-portal)
311
311
312
312
:::image type="content" source="media/detect-threats-custom/defender-review-and-create.png" alt-text="Screenshot of validation screen of analytics rule wizard in the Defender portal.":::
313
313
@@ -321,11 +321,11 @@ Select **Next: Review and create** to review all the settings for your new analy
321
321
322
322
**View the results of the rule:**
323
323
324
-
# [Azure portal](#tab/azure)
324
+
# [Azure portal](#tab/azure-portal)
325
325
326
326
- To view the results of the analytics rules you create in the Azure portal, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
327
327
328
-
# [Defender portal](#tab/defender)
328
+
# [Defender portal](#tab/defender-portal)
329
329
330
330
- To view the results of the analytics rules you create in the Defender portal, expand **Investigation & response** in the navigation menu, then **Incidents & alerts**. View incidents on the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). View individual alerts on the **Alerts** page.
0 commit comments