You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/work-with-anomaly-rules.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,9 @@ ms.custom: ignite-fall-2021
16
16
>
17
17
> - Anomaly rules are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
18
19
-
## View SOC-ML anomaly rule templates
19
+
## View customizable anomaly rule templates
20
20
21
-
Microsoft Sentinel’s [SOC-ML anomalies feature](soc-ml-anomalies.md) provides [built-in anomaly templates](detect-threats-built-in.md#anomaly) for immediate value out-of-the-box. These anomaly templates were developed to be robust by using thousands of data sources and millions of events, but this feature also enables you to change thresholds and parameters for the anomalies easily within the user interface. Anomaly rules must be activated before they will generate anomalies, which you can find in the **Anomalies** table in the **Logs** section.
21
+
Microsoft Sentinel’s [customizable anomalies feature](soc-ml-anomalies.md) provides [built-in anomaly templates](detect-threats-built-in.md#anomaly) for immediate value out-of-the-box. These anomaly templates were developed to be robust by using thousands of data sources and millions of events, but this feature also enables you to change thresholds and parameters for the anomalies easily within the user interface. Anomaly rules must be activated before they will generate anomalies, which you can find in the **Anomalies** table in the **Logs** section.
22
22
23
23
1. From the Microsoft Sentinel navigation menu, select **Analytics**.
24
24
@@ -34,7 +34,7 @@ Microsoft Sentinel’s [SOC-ML anomalies feature](soc-ml-anomalies.md) provides
34
34
35
35
## Activate anomaly rules
36
36
37
-
When you click on one of the rule templates, you will see the following information in the details pane, along with a **Create rule** button:
37
+
When you select one of the rule templates, you will see the following information in the details pane, along with a **Create rule** button:
38
38
39
39
-**Description** explains how the anomaly works and the data it requires.
40
40
@@ -135,7 +135,7 @@ This is by design, to give you the opportunity to compare the results generated
135
135
136
136
## Next steps
137
137
138
-
In this document, you learned how to work with SOC-ML anomaly detection analytics rules in Microsoft Sentinel.
138
+
In this document, you learned how to work with customizable anomaly detection analytics rules in Microsoft Sentinel.
139
139
140
-
- Get some background information about [SOC-ML](soc-ml-anomalies.md).
140
+
- Get some background information about [customizable anomalies](soc-ml-anomalies.md).
141
141
- Explore other [analytics rule types](detect-threats-built-in.md).
0 commit comments