Skip to content

Commit 74fbe3a

Browse files
committed
Deleted unused images
1 parent ea1af1f commit 74fbe3a

File tree

6 files changed

+1
-1
lines changed

6 files changed

+1
-1
lines changed

articles/sentinel/detect-threats-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ After [connecting your data sources](quickstart-onboard.md) to Microsoft Sentine
1515
Analytics rules search for specific events or sets of events across your environment, alert you when certain event thresholds or conditions are reached, generate incidents for your SOC to triage and investigate, and respond to threats with automated tracking and remediation processes.
1616

1717
> [!TIP]
18-
> When creating custom rules, use existing rules as templates or references. Using existing rules as a baseline helps by building out most of the logic before you make any changes needed.
18+
> When creating custom rules, use existing rules as templates or references. Using existing rules as a baseline helps by building out most of the logic before you make any needed changes.
1919
2020
> [!div class="checklist"]
2121
> - Create analytics rules
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

0 commit comments

Comments
 (0)