You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/detect-threats-custom.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -220,15 +220,15 @@ In the **Alert grouping** section, if you want a single incident to be generated
220
220
221
221
:::image type="content" source="media/tutorial-detect-threats-custom/automated-response-tab.png" alt-text="Define the automated response settings":::
222
222
223
-
1. Select **Review and create** to review all the settings for your new alert rule. When the "Validation passed" message appears, select **Create** to initialize your alert rule.
223
+
1. Select **Review and create** to review all the settings for your new analytics rule. When the "Validation passed" message appears, select **Create**.
224
224
225
225
:::image type="content" source="media/tutorial-detect-threats-custom/review-and-create-tab.png" alt-text="Review all settings and create the rule":::
226
226
227
227
## View the rule and its output
228
228
229
229
- You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
230
230
231
-
- To view the results of the alert rules you create, go to the **Incidents** page, where you can triage, [investigate incidents](investigate-cases.md), and remediate the threats.
231
+
- To view the results of the analytics rules you create, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
232
232
233
233
- You can update the rule query to exclude false positives. For more information, see [Handle false positives in Microsoft Sentinel](false-positives.md).
234
234
@@ -294,8 +294,6 @@ You can also push rules to Microsoft Sentinel via [API](/rest/api/securityinsigh
294
294
295
295
For more information, see:
296
296
297
-
For more information, see:
298
-
299
297
- [Tutorial: Investigate incidents with Microsoft Sentinel](investigate-cases.md)
300
298
- [Classify and analyze data using entities in Microsoft Sentinel](entities.md)
301
299
- [Tutorial: Use playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md)
Copy file name to clipboardExpand all lines: articles/sentinel/tutorial-log4j-detection.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,6 +129,8 @@ In the **Automated response** tab:
129
129
130
130
1. Select **+ Add new** to create a new automation rule for this analytics rule. This will open the **Create new automation rule** wizard.
131
131
132
+
:::image type="content" source="media/tutorial-log4j-detection/add-automation-rule.png" alt-text="Screenshot of Automated response tab in Analytics rule wizard.":::
133
+
132
134
1. In the **Automation rule name** field, enter **Log4J vulnerability exploit detection - Tutorial-1**.
133
135
134
136
1. Leave the **Trigger** and **Conditions** sections as they are.
@@ -145,7 +147,7 @@ In the **Automated response** tab:
145
147
146
148
Select the image below for a display of the full review (most of the query text was clipped for viewability).
147
149
148
-
:::image type="content" source="media/tutorial-log4j-detection/review-and-create-tab.png" alt-text="Screenshot of the Review and Create tab of the Analytics rule wizard." lightbox="media/tutorial-log4j-detection/full-review-and-create.png":::
150
+
:::image type="content" source="media/tutorial-log4j-detection/review-and-create-tab.png" alt-text="Screenshot of the Review and Create tab of the Analytics rule wizard.":::
0 commit comments