You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/summary-rules-tutorial.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.collection: usx-security
19
19
This article provides an example of how to use summary rules to aggregate insights from an [auxiliary logs table](basic-logs-use-cases.md) to an Analytics table. In this example, you ingest CEF data from Logstash by deploying a custom connector using an ARM template.
20
20
21
21
> [!IMPORTANT]
22
-
> Summary rules are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
22
+
> Summary rules are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -50,6 +50,7 @@ This diagram shows the process described in this tutorial:
50
50
51
51
52
52
1.**Create a data collection endpoint (DCE), data collection rule (DCR), and a custom Auxiliary table.**
53
+
53
54
Deploy this ARM template to create the required resources:
54
55
55
56
[](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FDataConnectors%2Fmicrosoft-sentinel-log-analytics-logstash-output-plugin%2Fexamples%2Fauxiliry-logs%2Farm-template%2Fdeploy-dcr-dce-cef-table.json)
@@ -65,7 +66,7 @@ This diagram shows the process described in this tutorial:
65
66
66
67
1.**Grant your application permission to send data to your data collection endpoint.**
67
68
68
-
Navigate to your data collection endpoint, and assign the **Log Analytics Data Contributor** role to your your Microsoft Entra application.
69
+
Navigate to your data collection endpoint, and assign the **Log Analytics Data Contributor** role to your Microsoft Entra application.
69
70
70
71
For more information, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
71
72
@@ -88,6 +89,9 @@ This diagram shows the process described in this tutorial:
88
89
89
90
1. **Create a summary rule.**
90
91
92
+
Create a summary rule to aggregate insights from the Auxiliary table to an Analytics table.
93
+
For more information about creating summary rules in Microsoft Sentinel, see [Create a new summary rule](../summary-rules.md#create-a-new-summary-rule).
94
+
91
95
Here are a couple of examples of summary rules to aggregate your CEF data:
92
96
93
97
- **Lookup indicator of compromise (IoC) data**: Hunt for specific IoCs by running aggregated summary queries to bring unique occurrences, and then query only those occurrences for faster results. The following example shows an example of how to bring a unique `Source Ip` feed along with other metadata, which can then be used against IoC lookups:
@@ -117,6 +121,11 @@ This diagram shows the process described in this tutorial:
117
121
| make-series TotalBytesSent=sum(SentBytes) on TimeGenerated from startofday(ago(starttime)) to startofday(ago(endtime)) step timeframe by DeviceVendor
118
122
```
119
123
124
+
1. **Query the destination Analytics table.**
125
+
126
+
To view the data that was aggregated by the summary rule, run a query against the Analytics table you specified in the summary rule.
127
+
128
+
120
129
See more information on the following items used in the preceding examples, in the Kusto documentation:
0 commit comments