Skip to content

Commit 8af5813

Browse files
committed
Update summary-rules-tutorial.md
1 parent 94d1524 commit 8af5813

File tree

1 file changed

+11
-2
lines changed

1 file changed

+11
-2
lines changed

articles/sentinel/summary-rules-tutorial.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: usx-security
1919
This article provides an example of how to use summary rules to aggregate insights from an [auxiliary logs table](basic-logs-use-cases.md) to an Analytics table. In this example, you ingest CEF data from Logstash by deploying a custom connector using an ARM template.
2020

2121
> [!IMPORTANT]
22-
> Summary rules are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
22+
> Summary rules are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2323
>
2424
> [!INCLUDE [unified-soc-preview-without-alert](includes/unified-soc-preview-without-alert.md)]
2525
>
@@ -50,6 +50,7 @@ This diagram shows the process described in this tutorial:
5050

5151

5252
1. **Create a data collection endpoint (DCE), data collection rule (DCR), and a custom Auxiliary table.**
53+
5354
Deploy this ARM template to create the required resources:
5455

5556
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FDataConnectors%2Fmicrosoft-sentinel-log-analytics-logstash-output-plugin%2Fexamples%2Fauxiliry-logs%2Farm-template%2Fdeploy-dcr-dce-cef-table.json)
@@ -65,7 +66,7 @@ This diagram shows the process described in this tutorial:
6566

6667
1. **Grant your application permission to send data to your data collection endpoint.**
6768

68-
Navigate to your data collection endpoint, and assign the **Log Analytics Data Contributor** role to your your Microsoft Entra application.
69+
Navigate to your data collection endpoint, and assign the **Log Analytics Data Contributor** role to your Microsoft Entra application.
6970

7071
For more information, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
7172

@@ -88,6 +89,9 @@ This diagram shows the process described in this tutorial:
8889
8990
1. **Create a summary rule.**
9091
92+
Create a summary rule to aggregate insights from the Auxiliary table to an Analytics table.
93+
For more information about creating summary rules in Microsoft Sentinel, see [Create a new summary rule](../summary-rules.md#create-a-new-summary-rule).
94+
9195
Here are a couple of examples of summary rules to aggregate your CEF data:
9296
9397
- **Lookup indicator of compromise (IoC) data**: Hunt for specific IoCs by running aggregated summary queries to bring unique occurrences, and then query only those occurrences for faster results. The following example shows an example of how to bring a unique `Source Ip` feed along with other metadata, which can then be used against IoC lookups:
@@ -117,6 +121,11 @@ This diagram shows the process described in this tutorial:
117121
  | make-series TotalBytesSent=sum(SentBytes) on TimeGenerated from startofday(ago(starttime)) to startofday(ago(endtime)) step timeframe by DeviceVendor
118122
```
119123
124+
1. **Query the destination Analytics table.**
125+
126+
To view the data that was aggregated by the summary rule, run a query against the Analytics table you specified in the summary rule.
127+
128+
120129
See more information on the following items used in the preceding examples, in the Kusto documentation:
121130
- [***let*** statement](/kusto/query/let-statement?view=microsoft-sentinel&preserve-view=true)
122131
- [***where*** operator](/kusto/query/where-operator?view=microsoft-sentinel&preserve-view=true)

0 commit comments

Comments
 (0)