Skip to content

Commit 6539a01

Browse files
Merge pull request #213020 from yelevin/yelevin/reassign-batamis-articles
Reassigning Batami's articles
2 parents bb94cc1 + 102f5ff commit 6539a01

13 files changed

+28
-28
lines changed

articles/sentinel/audit-sentinel-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Audit Microsoft Sentinel queries and activities | Microsoft Docs
33
description: This article describes how to audit queries and activities performed in Microsoft Sentinel.
4-
author: batamig
4+
author: limwainstein
55
ms.topic: how-to
66
ms.date: 11/09/2021
7-
ms.author: bagol
7+
ms.author: lwainstein
88
ms.custom: ignite-fall-2021
99
---
1010

articles/sentinel/cef-name-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Common Event Format (CEF) key and CommonSecurityLog field mapping
33
description: This article maps CEF keys to the corresponding field names in the CommonSecurityLog in Microsoft Sentinel.
4-
author: batamig
5-
ms.author: bagol
4+
author: limwainstein
5+
ms.author: lwainstein
66
ms.topic: reference
77
ms.date: 11/09/2021
88
ms.custom: ignite-fall-2021

articles/sentinel/connect-azure-virtual-desktop.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Connect Azure Virtual Desktop to Microsoft Sentinel | Microsoft Docs
33
description: Learn to connect your Azure Virtual Desktop data to Microsoft Sentinel.
4-
author: batamig
4+
author: limwainstein
55
ms.topic: how-to
66
ms.date: 11/09/2021
7-
ms.author: bagol
7+
ms.author: lwainstein
88
ms.custom: ignite-fall-2021
99
---
1010

articles/sentinel/connect-log-forwarder.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Deploy a log forwarder to ingest Syslog and CEF logs to Microsoft Sentinel | Microsoft Docs
33
description: Learn how to deploy a log forwarder, consisting of a Syslog daemon and the Log Analytics agent, as part of the process of ingesting Syslog and CEF logs to Microsoft Sentinel.
4-
author: batamig
4+
author: limwainstein
55
ms.topic: how-to
66
ms.date: 12/23/2021
7-
ms.author: bagol
7+
ms.author: lwainstein
88
ms.custom: ignite-fall-2021
99
---
1010

articles/sentinel/create-custom-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Resources for creating Microsoft Sentinel custom connectors | Microsoft Docs
33
description: Learn about available resources for creating custom connectors for Microsoft Sentinel. Methods include the Log Analytics agent and API, Logstash, Logic Apps, PowerShell, and Azure Functions.
4-
author: batamig
4+
author: limwainstein
55
ms.topic: conceptual
66
ms.custom: mvc, ignite-fall-2021
77
ms.date: 11/21/2021
8-
ms.author: bagol
8+
ms.author: lwainstein
99
---
1010

1111
# Resources for creating Microsoft Sentinel custom connectors

articles/sentinel/create-nrt-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You create NRT rules the same way you create regular [scheduled-query analytics
5555

5656
- **Query scheduling** is not configurable, since queries are automatically scheduled to run once per minute with a one-minute lookback period.
5757
- **Alert threshold** is irrelevant, since an alert is always generated.
58-
- **Event grouping** configuration is not available, since events are always grouped into the alert created by the rule that captures the events. NRT rules cannot produce an alert for each event.
58+
- **Event grouping** configuration is now available to a limited degree. You can choose to have an NRT rule generate an alert for each event for up to 30 events. If you choose this option and the rule results in more than 30 events, single-event alerts will be generated for the first 29 events, and a 30th alert will summarize all the events in the result set.
5959

6060
In addition, the query itself has the following requirements:
6161

articles/sentinel/data-source-schema-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Microsoft Sentinel data source schema reference
33
description: This article lists Azure and third-party data source schemas supported by Microsoft Sentinel, with links to their reference documentation.
4-
author: batamig
5-
ms.author: bagol
4+
author: limwainstein
5+
ms.author: lwainstein
66
ms.topic: reference
77
ms.custom: ignite-fall-2021
88
ms.date: 11/09/2021

articles/sentinel/detect-threats-custom.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -120,12 +120,12 @@ In the **Set rule logic** tab, you can either write a query directly in the **Ru
120120
> **Query intervals and lookback period**
121121
>
122122
> These two settings are independent of each other, up to a point. You can run a query at a short interval covering a time period longer than the interval (in effect having overlapping queries), but you cannot run a query at an interval that exceeds the coverage period, otherwise you will have gaps in the overall query coverage.
123-
>
124-
> **Ingestion delay**
125-
>
126-
> To account for **latency** that may occur between an event's generation at the source and its ingestion into Microsoft Sentinel, and to ensure complete coverage without data duplication, Microsoft Sentinel runs scheduled analytics rules on a **five-minute delay** from their scheduled time.
127-
>
128-
> For more information, see [Handle ingestion delay in scheduled analytics rules](ingestion-delay.md).
123+
>
124+
> **Ingestion delay**
125+
>
126+
> To account for **latency** that may occur between an event's generation at the source and its ingestion into Microsoft Sentinel, and to ensure complete coverage without data duplication, Microsoft Sentinel runs scheduled analytics rules on a **five-minute delay** from their scheduled time.
127+
>
128+
> For more information, see [Handle ingestion delay in scheduled analytics rules](ingestion-delay.md).
129129
130130
- Use the **Alert threshold** section to define the sensitivity level of the rule. For example, set **Generate alert when number of query results** to **Is greater than** and enter the number 1000 if you want the rule to generate an alert only if the query returns more than 1000 results each time it runs. This is a required field, so if you don’t want to set a threshold – that is, if you want your alert to register every event – enter 0 in the number field.
131131

articles/sentinel/dhcp-normalization-schema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: The Advanced Security Information Model (ASIM) DHCP normalization schema reference (Public preview) | Microsoft Docs
33
description: This article describes the Microsoft Sentinel DHCP normalization schema.
4-
author: batamig
4+
author: limwainstein
55
ms.topic: reference
66
ms.date: 11/09/2021
7-
ms.author: bagol
7+
ms.author: lwainstein
88
ms.custom: ignite-fall-2021
99
---
1010

articles/sentinel/file-event-normalization-schema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: The Advanced Security Information Model (ASIM) File Event normalization schema reference (Public preview)| Microsoft Docs
33
description: This article describes the Microsoft Sentinel File Event normalization schema.
4-
author: batamig
4+
author: limwainstein
55
ms.topic: reference
66
ms.date: 11/09/2021
7-
ms.author: bagol
7+
ms.author: lwainstein
88
ms.custom: ignite-fall-2021
99
---
1010

0 commit comments

Comments
 (0)