Skip to content

Commit 73a4433

Browse files
authored
acrolinx
1 parent 39a59ee commit 73a4433

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/sentinel/summary-rules.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ This section reviews common scenarios for creating summary rules in Microsoft Se
116116
117117
**Scenario**: You're a threat hunter, and one of your team's goals is to identify all instances of when a malicious IP address interacted in the network traffic logs from an active incident, in the last 90 days.
118118
119-
**Challenge**: Microsoft Sentinel currently ingests multiple terabytes of network logs a day. You needs to move through them quickly to find matches for the malicious IP address.
119+
**Challenge**: Microsoft Sentinel currently ingests multiple terabytes of network logs a day. You need to move through them quickly to find matches for the malicious IP address.
120120
121121
**Solution**: We recommend using summary rules to do the following:
122122
@@ -213,13 +213,13 @@ The current detection also runs a summary query on a separate logic app for each
213213
214214
Generate alerts on threat intelligence matches against noisy, high volume, and low-security value network data.
215215
216-
**Scenario**: You need to build an analytics rule for firewall logs to match domain names in the system that have been visted agsinst a threat intelligece domain name list.
216+
**Scenario**: You need to build an analytics rule for firewall logs to match domain names in the system that have been visted against a threat intelligence domain name list.
217217
218218
Most of the data sources are raw logs that are noisy and have high volume, but have lower security value, including IP addresses, Azure Firewall traffic, Fortigate traffic, and so on. There's a total volume of about 1 TB per day.
219219
220220
**Challenge**: Creating separate rules requires multiple logic apps, requiring extra setup and maintenance overhead and costs.
221221
222-
**Solution**: We recommed using summary rules to do the following:
222+
**Solution**: We recommend using summary rules to do the following:
223223
224224
1. Summarize McAfee firewall logs every 10 minutes, updating the data in the same custom table with each run. [ASIM functions](normalization-functions.md) might be helpful in the summary query when interacting with your McAfee logs.
225225
@@ -262,7 +262,7 @@ This procedure describes a sample process for using summary rules with [auxiliar
262262
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/aka.ms/DeployCEFresources)
263263
264264
265-
1. Note the following deatails from the ARM template output:
265+
1. Note the following details from the ARM template output:
266266
267267
- `tenant_id`
268268
- `data_collection_endpoint`
@@ -323,7 +323,7 @@ This procedure describes a sample process for using summary rules with [auxiliar
323323
324324
1. Create summary rules that aggregate your CEF data. For example:
325325
326-
- **Lookup incident of concern (IoC) data**: Hunt for specific IoCs by running aggregated summary queries to bring unique occurences, and then query only those occurences for faster results. The following example shows an example of how to bring a unique `Source Ip` feed along with other medata, which can then be used against IoC lookups:
326+
- **Lookup incident of concern (IoC) data**: Hunt for specific IoCs by running aggregated summary queries to bring unique occurrences, and then query only those occurrences for faster results. The following example shows an example of how to bring a unique `Source Ip` feed along with other metadata, which can then be used against IoC lookups:
327327
328328
```kusto
329329
// Daily Network traffic trend Per Destination IP along with Data transfer stats

0 commit comments

Comments
 (0)