Skip to content

Commit 194fa76

Browse files
committed
more-articles-about-microsoft-sentinel-solutions
1 parent 5de26ac commit 194fa76

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/sentinel/sentinel-analytic-rules-creation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: 'Create analytics rules for Microsoft Sentinel solutions'
2+
title: Create Analytics Rules for Microsoft Sentinel Solutions
33
description: This article guides you through the process of creating and publishing analytics rules to Microsoft Sentinel solutions.
44
author: anilgodavarthy
55
ms.author: angodavarthy
66
ms.service: microsoft-sentinel
77
ms.topic: conceptual
88
ms.date: 1/27/2025
99

10-
#CustomerIntent: As a ISV partner, I want to create and publish analytics rules to my Microsoft Sentinel solution so that I can provide inbuilt detection use cases to my customers.
10+
#CustomerIntent: As an ISV partner, I want to create and publish analytics rules to my Microsoft Sentinel solution so that I can provide inbuilt detection use cases to my customers.
1111
---
1212

1313
# Creating and publishing analytics rules for Microsoft Sentinel solutions

articles/sentinel/sentinel-hunting-rules-creation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Create hunting queries for Microsoft Sentinel solutions'
2+
title: 'Create Hunting Queries for Microsoft Sentinel Solutions'
33
description: This article guides you through the process of creating and publishing hunting queries to Microsoft Sentinel solutions.
44
author: anilgodavarthy
55
ms.author: angodavarthy
@@ -12,7 +12,7 @@ ms.date: 2/06/2025
1212

1313
# Creating and publishing hunting queries for Microsoft Sentinel solutions
1414

15-
Security analysts use hunting queries at the heart of the threat hunting process in Microsoft Sentinel. They write advanced, customizable queries in Kusto Query Language (KQL) to sift through large volumes of data collected from various sources. These queries allow analysts to identify potential security threats, investigate suspicious activities, and gain insights into the behavior of their network and endpoints. In Microsoft Sentinel, analysts proactively search for threats that might have bypassed existing security defenses. This proactive approach helps analysts uncover hidden threats, patterns, or anomalies within their IT environment. Hypotheses about potential threats or the latest intelligence on emerging attack vectors typically drive the hunting process. For more information, see [Threat hunting in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/hunting)
15+
Security analysts use hunting queries at the heart of the threat hunting process in Microsoft Sentinel. They write advanced, customizable queries in Kusto Query Language (KQL) to sift through large volumes of data collected from various sources. These queries allow analysts to identify potential security threats, investigate suspicious activities, and gain insights into the behavior of their network and endpoints. In Microsoft Sentinel, analysts proactively search for threats that might have bypassed existing security defenses. This proactive approach helps analysts uncover hidden threats, patterns, or anomalies within their IT environment. Hypotheses about potential threats or the latest intelligence on emerging attack vectors typically drive the hunting process. For more information, see [Threat hunting in Microsoft Sentinel](/azure/sentinel/hunting)
1616

1717
This article walks you through the process of creating and publishing hunting queries to Microsoft Sentinel solutions.
1818

0 commit comments

Comments
 (0)