Skip to content

Commit a1dd0a5

Browse files
committed
amit's comments
1 parent a5e87a3 commit a1dd0a5

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/defender-for-iot/organizations/concept-sentinel-integration.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ After you've configured the Defender for IoT data connector and have IoT/OT aler
4747
|Method |Description |
4848
|---------|---------|
4949
|**Use the default data connector rule** | Use the default, **Create incidents based on all alerts generated in Microsoft Defender for IOT** analytics rule provided with the data connector. This rule creates a separate incident in Microsoft Sentinel for each alert streamed from Defender for IoT. |
50-
|**Use out-of-the-box solution rules** | Enable some or all of the out-of-the-box analytics rules provided with the **Microsoft Defender for IoT** solution.<br><br> These analytics rules help to reduce alert fatigue by creating incidents only in specific situations. For example, you might choose to create incidents for excessive login attempts, but for multiple scans detected in the network. |
50+
|**Use out-of-the-box solution rules** | Enable some or all of the [out-of-the-box analytics rules](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview) provided with the **Microsoft Defender for IoT** solution.<br><br> These analytics rules help to reduce alert fatigue by creating incidents only in specific situations. For example, you might choose to create incidents for excessive login attempts, but for multiple scans detected in the network. |
5151
|**Create custom rules** | Create custom analytics rules to create incidents based only on your specific needs. You can use the out-of-the-box analytics rules as a starting point, or create rules from scratch. <br><br>Add the following filter to prevent duplicate incidents for the same alert ID: `| where TimeGenerated <= ProcessingEndTime + 60m` |
5252

5353
Regardless of the method you choose to create alerts, only one incident should be created for each Defender for IoT alert ID.
@@ -87,12 +87,13 @@ You'll typically see more Defender for IoT *events* in Microsoft Sentinel than *
8787

8888
```kql
8989
SecurityAlert
90-
| where ProviderName != 'ASI Scheduled Alerts' and ProviderName != 'CustomAlertRule
90+
| where ProviderName == 'IoTSecurity' or ProviderName == 'CustomAlertRule'
91+
Instead
9192
```
9293
9394
- **Alerts**: Microsoft Sentinel creates alerts based on your current analytics rules and the alert logs listed in the **SecurityAlert** table. If you don't have any active analytics rules for Defender for IoT, Microsoft Sentinel considers each alert log as an *event*.
9495
95-
To view all Defender for IoT alerts in Microsoft Sentinel, run the following query on the **SecurityAlert** table:
96+
To view alerts in Microsoft Sentinel, run the following query on the **SecurityAlert** table:
9697
9798
```kql
9899
SecurityAlert
@@ -101,7 +102,7 @@ You'll typically see more Defender for IoT *events* in Microsoft Sentinel than *
101102
102103
- **Incidents**. Microsoft Sentinel creates incidents based on your analytics rules. You might have several alerts grouped in the same incident, or you may have analytics rules configured to *not* create incidents for specific alert types.
103104
104-
To view all Defender for IoT incidents in Microsoft Sentinel, run the following query:
105+
To view incidents in Microsoft Sentinel, run the following query:
105106
106107
```kql
107108
SecurityIncident

0 commit comments

Comments
 (0)