Skip to content

Commit 1e7e0ea

Browse files
authored
Merge pull request #293135 from yelevin/yelevin/kusto-updates
[SCOPED] Updated links to Kusto overview doc
2 parents 4b97b50 + 42903d2 commit 1e7e0ea

22 files changed

+23
-617
lines changed

articles/sentinel/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -908,7 +908,7 @@
908908
- name: Kusto Query Language
909909
items:
910910
- name: Overview
911-
href: kusto-overview.md
911+
href: /kusto/query/kusto-sentinel-overview?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
912912
- name: Query best practices
913913
href: /kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
914914
- name: SQL to KQL cheat sheet

articles/sentinel/audit-track-tasks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Apart from the **Incident tasks workbook**, you can audit task activity by query
5050
5151
You can add any number of statements to the query to filter and narrow down the results. To demonstrate how to view and understand the results, we're going to add statements to filter the results so that we only see the tasks for a single incident, and we'll also add a `project` statement so that we see only those fields that will be useful for our purposes, without a lot of clutter.
5252
53-
[Learn more about using Kusto Query Language](kusto-overview.md).
53+
[Learn more about using Kusto Query Language](/kusto/query/kusto-sentinel-overview).
5454
5555
```kusto
5656
SecurityIncident

articles/sentinel/create-analytics-rule-from-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: usx-security
1616
---
1717
# Create scheduled analytics rules from templates
1818

19-
By far the most common type of analytics rule, **Scheduled** rules are based on [Kusto queries](kusto-overview.md) that are configured to run at regular intervals and examine raw data from a defined "lookback" period. These queries can perform complex statistical operations on their target data, revealing baselines and outliers in groups of events. If the number of results captured by the query passes the threshold configured in the rule, the rule produces an alert.
19+
By far the most common type of analytics rule, **Scheduled** rules are based on [Kusto queries](/kusto/query/kusto-sentinel-overview) that are configured to run at regular intervals and examine raw data from a defined "lookback" period. These queries can perform complex statistical operations on their target data, revealing baselines and outliers in groups of events. If the number of results captured by the query passes the threshold configured in the rule, the rule produces an alert.
2020

2121
Microsoft makes a vast array of **analytics rule templates** available to you through the many [solutions provided in the Content hub](sentinel-solutions.md), and strongly encourages you to use them to create your rules. The queries in scheduled rule templates are written by security and data science experts, either from Microsoft or from the vendor of the solution providing the template.
2222

@@ -85,7 +85,7 @@ From the Microsoft Defender navigation menu, expand **Microsoft Sentinel**, then
8585
1. Cycle through the tabs of the wizard, customizing the logic and other rule settings where possible to better suit your specific needs.
8686

8787
If you need to make any changes to the query itself, consult the following articles from the Kusto documentation for help:
88-
- [Kusto Query Language in Microsoft Sentinel](kusto-overview.md)
88+
- [Kusto Query Language in Microsoft Sentinel](/kusto/query/kusto-sentinel-overview)
8989
- [KQL quick reference guide](/kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true)
9090
- [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true)
9191

articles/sentinel/create-analytics-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Before you do anything else, you should design and build a query in Kusto Query
4646

4747
For some helpful tips for building Kusto queries, see [Best practices for analytics rule queries](scheduled-rules-overview.md#best-practices-for-analytics-rule-queries).
4848

49-
For more help building Kusto queries, see [Kusto Query Language in Microsoft Sentinel](kusto-overview.md) and [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true) (from the Kusto documentation).
49+
For more help building Kusto queries, see [Kusto Query Language in Microsoft Sentinel](/kusto/query/kusto-sentinel-overview) and [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true) (from the Kusto documentation).
5050

5151
## Create your analytics rule
5252

articles/sentinel/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ landingContent:
136136
- text: Threat hunting
137137
url: hunting.md
138138
- text: Kusto Query Language in Microsoft Sentinel
139-
url: kusto-overview.md
139+
url: /kusto/query/kusto-sentinel-overview?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
140140
- text: Automation rules
141141
url: automate-incident-handling-with-automation-rules.md
142142
- text: Playbooks

0 commit comments

Comments
 (0)