Skip to content

Commit 72e3b15

Browse files
update data sources and indicators section
1 parent af59f5b commit 72e3b15

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,10 @@ Microsoft Threat Intelligence Analytics matches your logs with domain, IP and U
5757

5858
- **Syslog** events where `Facility == "cron"` ingested into the **Syslog** table will match domain and IPv4 indicators directly from the `SyslogMessage` field.
5959

60+
- **Office activity logs** ingested into the **OfficeActivity** table will match IPv4 indicators directly from the `ClientIP` field.
61+
62+
- **Azure activity logs** ingested into the **AzureActivity** table will match IPv4 indicators directly from the `CallerIpAddress` field.
63+
6064

6165
## Triage an incident generated by matching analytics
6266

0 commit comments

Comments
 (0)