Skip to content

Commit 18e213f

Browse files
authored
Merge pull request #276563 from yelevin/yelevin/analytics-rules-conceptual
Analytics rules conceptual document
2 parents 03e47b7 + 929b561 commit 18e213f

12 files changed

+304
-124
lines changed

.openpublishing.redirection.sentinel.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,20 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/sentinel/detect-threats-built-in.md#use-analytics-rule-templates",
5+
"redirect_url": "/azure/sentinel/create-analytics-rule-from-template",
6+
"redirect_document_id": true
7+
},
8+
{
9+
"source_path": "articles/sentinel/detect-threats-built-in.md",
10+
"redirect_url": "/azure/sentinel/threat-detection",
11+
"redirect_document_id": true
12+
},
13+
{
14+
"source_path": "articles/sentinel/detect-threats-custom.md",
15+
"redirect_url": "/azure/sentinel/create-analytics-rules",
16+
"redirect_document_id": true
17+
},
318
{
419
"source_path": "articles/sentinel/automate-responses-with-playbooks.md#azure-logic-apps-basic-concepts",
520
"redirect_url": "/azure/sentinel/playbooks/logic-apps-playbooks",

articles/sentinel/TOC.yml

Lines changed: 48 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -944,28 +944,60 @@
944944
href: monitor-your-data.md
945945
- name: Create a Power BI report
946946
href: powerbi.md
947+
- name: Threat detection (analytics) rules
948+
items:
949+
- name: Overview
950+
href: threat-detection.md
951+
- name: Scheduled analytics rules
952+
items:
953+
- name: Create a scheduled rule from a template
954+
href: create-analytics-rule-from-template.md
955+
- name: Create a scheduled rule from scratch
956+
href: create-analytics-rules.md
957+
- name: Enhance detections
958+
items:
959+
- name: Map data fields to entities
960+
href: map-data-fields-to-entities.md
961+
- name: Surface custom details in alerts
962+
href: surface-custom-details-in-alerts.md
963+
- name: Customize alert details
964+
href: customize-alert-details.md
965+
- name: Near-real-time (NRT) analytics rules
966+
items:
967+
- name: Overview
968+
href: near-real-time-rules.md
969+
- name: Create NRT analytics rules
970+
href: create-nrt-rules.md
971+
- name: Anomaly detection rules
972+
items:
973+
- name: Overview
974+
href: soc-ml-anomalies.md
975+
- name: Work with out-of-the-box anomaly rules
976+
href: work-with-anomaly-rules.md
977+
- name: Multistage attacks (Fusion)
978+
items:
979+
- name: Overview
980+
href: fusion.md
981+
- name: Configure multistage attack (Fusion) rules
982+
href: configure-fusion-rules.md
983+
- name: Create incidents from Microsoft Security alerts
984+
href: create-incidents-from-alerts.md
985+
- name: Export and import analytics rules
986+
href: import-export-analytics-rules.md
987+
- name: Manage template versions for analytics rules
988+
href: manage-analytics-rule-templates.md
989+
- name: Handle ingestion delay in analytics rules
990+
href: ingestion-delay.md
991+
- name: Get fine-tuning recommendations
992+
href: detection-tuning.md
993+
- name: Troubleshoot analytics rules
994+
href: troubleshoot-analytics-rules.md
947995
- name: Tutorial - Detect threats using analytics rules
948996
href: tutorial-log4j-detection.md
949997
- name: MITRE ATT&CK coverage
950998
href: mitre-coverage.md
951-
- name: Built-in threat detection rules
952-
href: detect-threats-built-in.md
953-
- name: Near-real-time (NRT) analytics rules
954-
href: near-real-time-rules.md
955999
- name: User and entity behavior analytics (UEBA)
9561000
href: identify-threats-with-entity-behavior-analytics.md
957-
- name: Anomaly detection rules
958-
items:
959-
- name: Overview
960-
href: soc-ml-anomalies.md
961-
- name: Work with out-of-the-box anomaly rules
962-
href: work-with-anomaly-rules.md
963-
- name: Multistage attacks (Fusion)
964-
items:
965-
- name: Overview
966-
href: fusion.md
967-
- name: Configure multistage attack (Fusion) rules
968-
href: configure-fusion-rules.md
9691001
- name: Watchlists
9701002
items:
9711003
- name: Overview
@@ -976,34 +1008,10 @@
9761008
href: watchlists-queries.md
9771009
- name: Manage watchlists
9781010
href: watchlists-manage.md
979-
- name: Create threat detection rules
980-
items:
981-
- name: Create a scheduled query rule
982-
href: detect-threats-custom.md
983-
- name: Map data fields to entities
984-
href: map-data-fields-to-entities.md
985-
- name: Surface custom details in alerts
986-
href: surface-custom-details-in-alerts.md
987-
- name: Customize alert details
988-
href: customize-alert-details.md
989-
- name: Export and import analytics rules
990-
href: import-export-analytics-rules.md
991-
- name: Create near-real-time (NRT) analytics rules
992-
href: create-nrt-rules.md
993-
- name: Manage template versions for analytics rules
994-
href: manage-analytics-rule-templates.md
995-
- name: Handle ingestion delay in analytics rules
996-
href: ingestion-delay.md
997-
- name: Get fine-tuning recommendations
998-
href: detection-tuning.md
999-
- name: Troubleshoot analytics rules
1000-
href: troubleshoot-analytics-rules.md
10011011
- name: Deploy and monitor decoy honeytokens
10021012
href: monitor-key-vault-honeytokens.md
10031013
- name: Handle false positives
10041014
href: false-positives.md
1005-
- name: Create incidents from Microsoft Security alerts
1006-
href: create-incidents-from-alerts.md
10071015
- name: Hunt for threats
10081016
items:
10091017
- name: Overview
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Create scheduled analytics rules from templates in Microsoft Sentinel | Microsoft Docs
3+
description: This article explains how to view and create scheduled analytics rules from templates in Microsoft Sentinel.
4+
author: yelevin
5+
ms.author: yelevin
6+
ms.topic: how-to
7+
ms.date: 05/27/2024
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
11+
ms.collection: usx-security
12+
---
13+
# Create scheduled analytics rules from templates
14+
15+
By far the most common type of analytics rule, **Scheduled** rules are based on [Kusto queries](kusto-overview.md) that are configured to run at regular intervals and examine raw data from a defined "lookback" period. These queries can perform complex statistical operations on their target data, revealing baselines and outliers in groups of events. If the number of results captured by the query passes the threshold configured in the rule, the rule produces an alert.
16+
17+
Microsoft makes a vast array of **analytics rule templates** available to you through the many [solutions provided in the Content hub](sentinel-solutions.md), and strongly encourages you to use them to create your rules. The queries in scheduled rule templates are written by security and data science experts, either from Microsoft or from the vendor of the solution providing the template.
18+
19+
This article shows you how to create a scheduled analytics rule using a template.
20+
21+
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
22+
23+
## View existing analytics rules
24+
25+
To view the installed analytics rules in Microsoft Sentinel, go to the **Analytics** page. The **Rule templates** tab displays all the installed rule templates. To find more rule templates, go to the **Content hub** in Microsoft Sentinel to install the related product solutions or standalone content.
26+
27+
# [Azure portal](#tab/azure-portal)
28+
29+
1. From the **Configuration** section of the Microsoft Sentinel navigation menu, select **Analytics**.
30+
31+
1. On the **Analytics** screen, select the **Rule templates** tab.
32+
33+
1. If you want to filter the list for **Scheduled** templates:
34+
35+
1. Select **Add filter** and choose **Rule type** from the list of filters.
36+
37+
1. From the resulting list, select **Scheduled**. Then select **Apply**.
38+
39+
:::image type="content" source="media/create-analytics-rule-from-template/view-detections.png" alt-text="Screenshot of scheduled analytics rule templates in Microsoft Azure portal." lightbox="media/create-analytics-rule-from-template/view-detections.png":::
40+
41+
# [Defender portal](#tab/defender-portal)
42+
43+
1. From the Microsoft Defender navigation menu, expand **Microsoft Sentinel**, then **Configuration**. Select **Analytics**.
44+
45+
1. On the **Analytics** screen, select the **Rule templates** tab.
46+
47+
1. If you want to filter the list for **Scheduled** templates:
48+
49+
1. Select **Add filter** and choose **Rule type** from the list of filters.
50+
51+
1. From the resulting list, select **Scheduled**. Then select **Apply**.
52+
53+
:::image type="content" source="media/create-analytics-rule-from-template/view-detections-defender.png" alt-text="Screenshot of scheduled analytics rule templates in Microsoft Defender portal." lightbox="media/create-analytics-rule-from-template/view-detections-defender.png":::
54+
55+
---
56+
57+
## Create a rule from a template
58+
59+
This procedure describes how to create an analytics rule from a template.
60+
61+
# [Azure portal](#tab/azure-portal)
62+
63+
From the **Configuration** section of the Microsoft Sentinel navigation menu, select **Analytics**.
64+
65+
# [Defender portal](#tab/defender-portal)
66+
67+
From the Microsoft Defender navigation menu, expand **Microsoft Sentinel**, then **Configuration**. Select **Analytics**.
68+
69+
---
70+
71+
1. On the **Analytics** screen, select the **Rule templates** tab.
72+
73+
1. Select a template name, and then select the **Create rule** button on the details pane to create a new active rule based on that template.
74+
75+
Each template has a list of required data sources. When you open the template, the data sources are automatically checked for availability. If a data source isn't enabled, the **Create rule** button may be disabled, or you might see a message to that effect.
76+
77+
:::image type="content" source="media/create-analytics-rule-from-template/use-built-in-template.png" alt-text="Screenshot of analytics rule preview panel.":::
78+
79+
1. The rule creation wizard opens. All the details are autofilled.
80+
81+
1. Cycle through the tabs of the wizard, customizing the logic and other rule settings where possible to better suit your specific needs.
82+
83+
When you get to the end of the rule creation wizard, Microsoft Sentinel creates the rule. The new rule appears in the **Active rules** tab.
84+
85+
Repeat the process to create more rules. For more details on how to customize your rules in the rule creation wizard, see [Create a custom analytics rule from scratch](create-analytics-rules.md).
86+
87+
> [!TIP]
88+
> - Make sure that you **enable all rules associated with your connected data sources** in order to ensure full security coverage for your environment. The most efficient way to enable analytics rules is directly from the data connector page, which lists any related rules. For more information, see [Connect data sources](connect-data-sources.md).
89+
>
90+
> - You can also **push rules to Microsoft Sentinel via [API](/rest/api/securityinsights/) and [PowerShell](https://www.powershellgallery.com/packages/Az.SecurityInsights/0.1.0)**, although doing so requires additional effort.
91+
>
92+
> When using API or PowerShell, you must first export the rules to JSON before enabling the rules. API or PowerShell may be helpful when enabling rules in multiple instances of Microsoft Sentinel with identical settings in each instance.
93+
94+
## Next steps
95+
96+
In this document, you learned how to create scheduled analytics rules from templates in Microsoft Sentinel.
97+
98+
- Learn more about [analytics rules](threat-detection.md).
99+
- Learn how to [create an analytics rule from scratch](create-analytics-rules.md).
File renamed without changes.

articles/sentinel/create-incidents-from-alerts.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,23 @@ description: Learn how to create incidents from alerts in Microsoft Sentinel.
44
author: yelevin
55
ms.topic: how-to
66
ms.custom: mvc
7-
ms.date: 11/09/2021
7+
ms.date: 05/29/2024
88
ms.author: yelevin
99
---
1010

1111
# Automatically create incidents from Microsoft security alerts
1212

13-
Alerts triggered in Microsoft security solutions that are connected to Microsoft Sentinel, such as Microsoft Defender for Cloud Apps and Microsoft Defender for Identity, do not automatically create incidents in Microsoft Sentinel. By default, when you connect a Microsoft solution to Microsoft Sentinel, any alert generated in that service will be stored as raw data in Microsoft Sentinel, in the *SecurityAlert* table in your Microsoft Sentinel workspace. You can then use that data like any other raw data you ingest into Microsoft Sentinel.
13+
Alerts triggered in Microsoft security solutions that are connected to Microsoft Sentinel, such as Microsoft Defender for Cloud Apps and Microsoft Defender for Identity, do not automatically create incidents in Microsoft Sentinel. By default, when you connect a Microsoft solution to Microsoft Sentinel, any alert generated in that service will be ingested and stored in the *SecurityAlert* table in your Microsoft Sentinel workspace. You can then use that data like any other raw data you ingest into Microsoft Sentinel.
1414

1515
You can easily configure Microsoft Sentinel to automatically create incidents every time an alert is triggered in a connected Microsoft security solution, by following the instructions in this article.
1616

17+
> [!IMPORTANT]
18+
> **This article does not apply** if you have:
19+
> - Enabled [**Microsoft Defender XDR incident integration**](microsoft-365-defender-sentinel-integration.md), or
20+
> - Onboarded Microsoft Sentinel to the [**unified security operations platform**](microsoft-sentinel-defender-portal.md).
21+
>
22+
> In these scenarios, Microsoft Defender XDR creates incidents from alerts generated in Microsoft services.
23+
1724
## Prerequisites
1825

1926
Connect your security solution by installing the appropriate solution from the **Content Hub** in Microsoft Sentinel and setting up the data connector. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md) and [Microsoft Sentinel data connectors](connect-data-sources.md).

0 commit comments

Comments
 (0)