Skip to content

Commit 9306042

Browse files
committed
added feature to what's new
1 parent 64af829 commit 9306042

File tree

2 files changed

+28
-14
lines changed

2 files changed

+28
-14
lines changed

articles/sentinel/summary-rules-tutorial.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: usx-security
1616

1717
# Tutorial: Send logs to low-cost storage and extract actionable analytics using summary rules in Microsoft Sentinel (Preview)
1818

19-
This article provides an example of how to use summary rules to aggregate insights from an [auxiliary logs table](basic-logs-use-cases.md) to an Analytics table. In this example, you ingest CEF data from Logstash by deploying a custom connector using an ARM template.
19+
This article provides an example of how to use summary rules to aggregate insights from an [auxiliary logs table](basic-logs-use-cases.md) to an Analytics table. In this example, you ingest Common Event Format (CEF) data from Logstash by deploying a custom connector using an ARM template.
2020

2121
> [!IMPORTANT]
2222
> Summary rules are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -94,36 +94,42 @@ This diagram shows the process described in this tutorial:
9494
9595
Here are a couple of examples of summary rules to aggregate your CEF data:
9696
97-
- **Lookup indicator of compromise (IoC) data**: Hunt for specific IoCs by running aggregated summary queries to bring unique occurrences, and then query only those occurrences for faster results. The following example shows an example of how to bring a unique `Source Ip` feed along with other metadata, which can then be used against IoC lookups:
97+
- **Lookup indicator of compromise (IoC) data**: Hunt for specific IoCs by running aggregated summary queries to bring unique occurrences, and then query only those occurrences for faster results. The `Message` field is device-specific and in JSON format, so you need to parse this field to extract relevant data. This summary rule is an example of how to bring a unique `SourceIP` feed along with other metadata, which you can then use against IoC lookups:
9898
9999
```kusto
100100
// Daily Network traffic trend Per Destination IP along with Data transfer stats
101101
// Frequency - Daily - Maintain 30 day or 60 Day History.
102-
  CommonSecurityLog_CL
103-
  | extend Day = format_datetime(TimeGenerated, "yyyy-MM-dd")
104-
  | summarize Count= count(), DistinctSourceIps = dcount(SourceIP), NoofBytesTransferred = sum(SentBytes), NoofBytesReceived = sum(ReceivedBytes)
105-
  by Day,DestinationIp, DeviceVendor
102+
CommonSecurityLog_CL
103+
| extend j=parse_json(Message)
104+
| extend DestinationIP=tostring(j.destinationAddress)
105+
| extend SourceIP=tostring(j.sourceAddress)
106+
| extend SentBytes=toint(j.bytesOut)
107+
| extend ReceivedBytes=toint(j.bytesOut)
108+
| extend Day = format_datetime(TimeGenerated, "yyyy-MM-dd")
109+
| summarize Count= count(), DistinctSourceIps = dcount(SourceIP), NoofBytesTransferred = sum(SentBytes), NoofBytesReceived = sum(ReceivedBytes) by Day,DestinationIP, DeviceVendor
106110
```
107111
108-
- **Query a summary baseline for anomaly detections**. Instead of running your queries against large historical periods, such as 30 or 60 days, we recommend that you ingest data into custom logs, and then only query summary baseline data, such as for time series anomaly detections. For example:
112+
- **Query a summary baseline for anomaly detections**. Instead of running your queries against large historical periods, such as 30 or 60 days, we recommend that you ingest data into an Auxiliary table, and then only query summary baseline data, such as for time series anomaly detections. For example:
109113
110114
```kusto
111115
// Time series data for Firewall traffic logs
112116
let starttime = 14d;
113117
let endtime = 1d;
114118
let timeframe = 1h;
115-
let TimeSeriesData =
116119
CommonSecurityLog_CL
117-
  | where TimeGenerated between (startofday(ago(starttime))..startofday(ago(endtime)))
118-
  | where isnotempty(DestinationIP) and isnotempty(SourceIP)
119-
  | where ipv4_is_private(DestinationIP) == false
120-
  | project TimeGenerated, SentBytes, DeviceVendor
121-
  | make-series TotalBytesSent=sum(SentBytes) on TimeGenerated from startofday(ago(starttime)) to startofday(ago(endtime)) step timeframe by DeviceVendor
120+
| extend j=parse_json(Message)
121+
| extend DestinationIP=tostring(j.destinationAddress)
122+
| extend SourceIP=tostring(j.sourceAddress)
123+
| extend SentBytes=toint(j.bytesOut)
124+
| where isnotempty(DestinationIP) and isnotempty(SourceIP)
125+
| where ipv4_is_private(DestinationIP) == false
126+
| project TimeGenerated, SentBytes, DeviceVendor
127+
| make-series TotalBytesSent=sum(SentBytes) on TimeGenerated from startofday(ago(starttime)) to startofday(ago(endtime)) step timeframe by DeviceVendor
122128
```
123129
124130
1. **Query the destination Analytics table.**
125131
126-
To view the data that was aggregated by the summary rule, run a query against the Analytics table you specified in the summary rule.
132+
To view the aggregated data, run a query against the Analytics table you specified in the summary rule.
127133
128134
129135
See more information on the following items used in the preceding examples, in the Kusto documentation:

articles/sentinel/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,14 @@ The listed features were released in the last three months. For information abou
1818

1919
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2020

21+
## June 2025
22+
23+
- [Summary rule templates now in public preview](#summary-rule-templates-now-in-public-preview)
24+
25+
### Summary rule templates now in public preview
26+
27+
You can now use summary rule templates to deploy pre-built summary rules tailored to common security scenarios. These templates help you aggregate and analyze large datasets efficiently, don't require deep expertise, reduce setup time, and ensure best practices. For more information, see [Aggregate Microsoft Sentinel data with summary rules (Preview)](summary-rules.md#use-summary-rule-templates).
28+
2129
## May 2025
2230

2331
- [All Microsoft Sentinel use cases generally available in the Defender portal](#all-microsoft-sentinel-use-cases-generally-available-in-the-defender-portal)

0 commit comments

Comments
 (0)