Skip to content

Commit 351738d

Browse files
authored
Merge pull request #190213 from shayoniseth/patch-39
Update data-collection-rule-azure-monitor-agent.md
2 parents b153040 + 8f3b5e1 commit 351738d

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/azure-monitor/agents/data-collection-rule-azure-monitor-agent.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure data collection for the Azure Monitor agent
33
description: Describes how to create a data collection rule to collect data from virtual machines using the Azure Monitor agent.
44
ms.topic: conceptual
5-
ms.date: 07/16/2021
5+
ms.date: 03/1/2022
66

77
---
88

@@ -79,7 +79,9 @@ To specify additional filters, you must use Custom configuration and specify an
7979
See [XPath 1.0 limitations](/windows/win32/wes/consuming-events#xpath-10-limitations) for a list of limitations in the XPath supported by Windows event log.
8080

8181
> [!TIP]
82-
> Use the PowerShell cmdlet `Get-WinEvent` with the `FilterXPath` parameter to test the validity of an XPathQuery. The following script shows an example.
82+
> Use this **shortcut** to create syntactically correct XPath queries: [Extract XPath queries from Windows Event Viewer](https://azurecloudai.blog/2021/08/10/shortcut-way-to-create-your-xpath-queries-for-azure-sentinel-dcrs/)
83+
>
84+
> Alternatively you can use the PowerShell cmdlet `Get-WinEvent` with the `FilterXPath` parameter to test the validity of an XPathQuery. The following script shows an example.
8385
>
8486
> ```powershell
8587
> $XPath = '*[System[EventID=1035]]'

0 commit comments

Comments
 (0)