Skip to content

Commit a7bf4e1

Browse files
committed
Pared down conceptual article
1 parent bbbb5a1 commit a7bf4e1

File tree

1 file changed

+18
-104
lines changed

1 file changed

+18
-104
lines changed

articles/sentinel/scheduled-rules-overview.md

Lines changed: 18 additions & 104 deletions
Original file line numberDiff line numberDiff line change
@@ -76,29 +76,17 @@ For more information on maximizing your coverage of the MITRE ATT&CK threat land
7676
- Select **Disabled**, and the rule will be added to your **Active rules** tab. You can enable it from there when you need it.
7777
- Schedule the rule to first run at a specific date and time. This method is currently in PREVIEW. See [Query scheduling](#query-scheduling) later on in this article.
7878

79-
### *Set rule logic* tab
79+
### Rule query
8080

81-
In this tab you decide what information is in the alerts created by this rule, and how the information is organized. This configuration has follow-on effects on what the resulting incidents look like, and how easy or difficult they are to investigate, remediate, and resolve. It's important to make your alerts as rich in information as possible, and to make that information easily accessible.
82-
83-
# [Azure portal](#tab/azure-portal)
84-
85-
:::image type="content" source="media/create-analytics-rules/set-rule-logic-1.png" alt-text="Screenshot of first half of set rule logic tab in the analytics rule wizard in the Azure portal.":::
86-
87-
# [Defender portal](#tab/defender-portal)
88-
89-
:::image type="content" source="media/create-analytics-rules/defender-set-rule-logic-1.png" alt-text="Screenshot of first half of set rule logic tab in the analytics rule wizard in the Defender portal.":::
90-
91-
---
92-
93-
#### Rule query
81+
This is the essence of the rule: you decide what information is in the alerts created by this rule, and how the information is organized. This configuration has follow-on effects on what the resulting incidents look like, and how easy or difficult they are to investigate, remediate, and resolve. It's important to make your alerts as rich in information as possible, and to make that information easily accessible.
9482

9583
View or input the Kusto query that analyzes the raw log data. If you're creating a rule from scratch, it's a good idea to plan and design your query before opening this wizard. You can build and test queries in the **Logs** page.
9684

9785
Everything you type into the rule query window is instantly validated, so you find out right away if you make any mistakes.
9886

99-
##### Best practices for analytics rule queries
87+
**Best practices for analytics rule queries**
10088

101-
- It's recommended to use an [Advanced Security Information Model (ASIM) parser](normalization-about-parsers.md) as your query source, instead of using a native table. This will ensure that the query supports any current or future relevant data source or family of data sources, rather than relying on a single data source.
89+
- We recommend you use an [Advanced Security Information Model (ASIM) parser](normalization-about-parsers.md) as your query source, instead of using a native table. This will ensure that the query supports any current or future relevant data source or family of data sources, rather than relying on a single data source.
10290

10391
- The query length should be between 1 and 10,000 characters and cannot contain "`search *`" or "`union *`". You can use [user-defined functions](/azure/data-explorer/kusto/query/functions/user-defined-functions) to overcome the query length limitation, as a single function can replace dozens of lines of code.
10492

@@ -110,7 +98,7 @@ Everything you type into the rule query window is instantly validated, so you fi
11098

11199
For more help building Kusto queries, see [Kusto Query Language in Microsoft Sentinel](kusto-overview.md) and [Best practices for Kusto Query Language queries](/azure/data-explorer/kusto/query/best-practices?toc=%2Fazure%2Fsentinel%2FTOC.json&bc=%2Fazure%2Fsentinel%2Fbreadcrumb%2Ftoc.json).
112100

113-
#### Alert enhancement
101+
### Alert enhancement
114102

115103
If you want your alerts to surface their findings so that they can be immediately visible in incidents, and tracked and investigated appropriately, use the alert enhancement configuration to surface all the important information in the alerts.
116104

@@ -122,19 +110,19 @@ There are three types of alert enhancements you can configure:
122110
- Custom details
123111
- Alert details (also known as dynamic content)
124112

125-
##### Entity mapping
113+
#### Entity mapping
126114

127115
Entities are the players on either side of any attack story. Identifying all the entities in an alert is essential for detecting and investigating threats. To ensure that Microsoft Sentinel identifies the entities in your raw data, you must map the entity types recognized by Microsoft Sentinel onto fields in your query results. This mapping integrates the identified entities into the [*Entities* field in your alert schema](security-alert-schema.md).
128116

129117
To learn more about entity mapping, and to get complete instructions, see [Map data fields to entities in Microsoft Sentinel](map-data-fields-to-entities.md).
130118

131-
##### Custom details
119+
#### Custom details
132120

133121
By default, only the alert entities and metadata are visible in incidents without drilling down into the raw events in the query results. To give other fields from your query results immediate visibility in your alerts and incidents, define them as **custom details**. Microsoft Sentinel integrates these custom details into the [*ExtendedProperties* field in your alerts](security-alert-schema.md), causing them to be displayed up front in your alerts, and in any incidents created from those alerts.
134122

135123
To learn more about surfacing custom details, and to get complete instructions, see [Surface custom event details in alerts in Microsoft Sentinel](surface-custom-details-in-alerts.md).
136124

137-
##### Alert details
125+
#### Alert details
138126

139127
This setting allows you to customize otherwise-standard alert properties according to the content of various fields in each individual alert. These customizations are integrated into the [*ExtendedProperties* field in your alerts](security-alert-schema.md). For example, you can customize the alert name or description to include a username or IP address featured in the alert.
140128

@@ -143,7 +131,7 @@ To learn more about customizing alert details, and to get complete instructions,
143131
> [!NOTE]
144132
> In the unified security operations platform, the Defender XDR correlation engine is solely in charge of naming incidents, so any alert names you customized may be overridden when incidents are created from these alerts.
145133
146-
#### Query scheduling
134+
### Query scheduling
147135

148136
The following parameters determine how often your scheduled rule will run, and what time period it will examine each time it runs.
149137

@@ -177,15 +165,15 @@ The **Start running** setting, now in PREVIEW, allows you to create a rule with
177165
>
178166
> For more information, see [Handle ingestion delay in scheduled analytics rules](ingestion-delay.md).
179167
180-
#### Alert threshold
168+
### Alert threshold
181169

182170
Many types of security events are normal or even expected in small numbers, but are a sign of a threat in larger numbers. Different scales of large numbers can mean different kinds of threats. For example, two or three failed sign-in attempts in the space of a minute is a sign of a user not remembering a password, but fifty in a minute could be a sign of a human attack, and a thousand is probably an automated attack.
183171

184172
Depending on what kind of activity your rule is trying to detect, you can set a minimum number of events (query results) necessary to trigger an alert. The threshold applies separately to each time the rule runs, not collectively.
185173

186174
The threshold can also be set to a maximum number of results, or an exact number.
187175

188-
#### Event grouping
176+
### Event grouping
189177

190178
There are two ways to handle the grouping of **events** into **alerts**:
191179

@@ -197,11 +185,11 @@ Analytics rules can generate up to 150 alerts. If **Event grouping** is set to *
197185

198186
The **Trigger an alert for each event** setting might cause an issue where query results appear to be missing or different than expected. For more information on this scenario, see [Troubleshooting analytics rules in Microsoft Sentinel | Issue: No events appear in query results](troubleshoot-analytics-rules.md#issue-no-events-appear-in-query-results).
199187

200-
#### Suppression
188+
### Suppression
201189

202190
If you want this rule to stop working for a period of time after it generates an alert, turn the **Stop running query after alert is generated** setting **On**. Then, you must set **Stop running query for** to the amount of time the query should stop running, up to 24 hours.
203191

204-
#### Results simulation
192+
### Results simulation
205193

206194
The analytics rule wizard allows you to test its efficacy by running it on the current data set. When you run the test, the **Results simulation** window shows you a graph of the results the query would have generated over the last 50 times it would have run, according to the currently defined schedule. If you modify the query, you can run the test again to update the graph. The graph shows the number of results over the defined time period, which is determined by the query schedule you defined.
207195

@@ -211,33 +199,9 @@ Here's what the results simulation might look like for the query in the screensh
211199

212200
If you see that your query would trigger too many or too-frequent alerts, you can experiment with the scheduling and threshold settings and run the simulation again.
213201

214-
# [Azure portal](#tab/azure-portal)
215-
216-
:::image type="content" source="media/create-analytics-rules/set-rule-logic-2.png" alt-text="Screenshot of second half of set rule logic tab in the analytics rule wizard in the Azure portal.":::
217-
218-
# [Defender portal](#tab/defender-portal)
219-
220-
:::image type="content" source="media/create-analytics-rules/defender-set-rule-logic-2.png" alt-text="Screenshot of second half of set rule logic tab in the analytics rule wizard in the Defender portal.":::
221-
222-
---
223-
224-
### *Incident settings* tab
202+
### Incident settings
225203

226-
Built in to your analytics rule configuration is what happens next, after an alert is created.
227-
228-
There are two decisions to make here. Choose whether Microsoft Sentinel turns alerts into actionable incidents, and whether and how alerts are grouped together in incidents.
229-
230-
# [Azure portal](#tab/azure-portal)
231-
232-
:::image type="content" source="media/create-analytics-rules/incident-settings-tab.png" alt-text="Screenshot of incident settings screen of analytics rule wizard in the Azure portal.":::
233-
234-
# [Defender portal](#tab/defender-portal)
235-
236-
:::image type="content" source="media/create-analytics-rules/defender-incident-settings.png" alt-text="Screenshot of incident settings screen of analytics rule wizard in the Defender portal.":::
237-
238-
---
239-
240-
#### Incident settings
204+
Choose whether Microsoft Sentinel turns alerts into actionable incidents.
241205

242206
Incident creation is enabled by default. Microsoft Sentinel creates a single, separate incident from each alert generated by the rule.
243207

@@ -252,9 +216,9 @@ If you want a single incident to be created from a group of alerts, instead of o
252216

253217
<a name="alert-grouping"></a>
254218

255-
#### Alert grouping
219+
### Alert grouping
256220

257-
By default, Microsoft Sentinel creates an incident for every alert generated. You have the option of grouping several alerts together into a single incident instead.
221+
Choose whether how alerts are grouped together in incidents. By default, Microsoft Sentinel creates an incident for every alert generated. You have the option of grouping several alerts together into a single incident instead.
258222

259223
The incident is created only after all the alerts have been generated. All of the alerts are added to the incident immediately upon its creation.
260224

@@ -278,7 +242,7 @@ There are a few options to consider when grouping alerts:
278242

279243
The option to reopen closed incidents is **not available** if you onboarded Microsoft Sentinel to the unified security operations platform.
280244

281-
### *Automated response* tab
245+
### Automated response
282246

283247
Microsoft Sentinel lets you set automated responses to occur when:
284248
- An alert is generated by this analytics rule.
@@ -299,56 +263,6 @@ Automate more complex tasks and invoke responses from remote systems to remediat
299263

300264
- Under the **Alert automation (classic)** heading, you might see a list of playbooks configured to run automatically using an old method due to be **deprecated in March 2026**. You can't add anything to this list. Any playbooks listed here should have automation rules created, based on the **alert created trigger**, to invoke the playbooks. After you've done that, select the ellipsis at the end of the line of the playbook listed here, and select **Remove**. See [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md) for full instructions.
301265

302-
# [Azure portal](#tab/azure-portal)
303-
304-
:::image type="content" source="media/create-analytics-rules/automated-response-tab.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Azure portal.":::
305-
306-
# [Defender portal](#tab/defender-portal)
307-
308-
:::image type="content" source="media/create-analytics-rules/defender-automated-response.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Defender portal.":::
309-
310-
---
311-
312-
### Validation and creation
313-
314-
The final tab of the analytics rule wizard runs a background validation on the entire configuration and issues warnings for any improperly configured parameters. When the validation has passed, complete the wizard, creating the rule.
315-
316-
# [Azure portal](#tab/azure-portal)
317-
318-
:::image type="content" source="media/create-analytics-rules/review-and-create-tab.png" alt-text="Screenshot of validation screen of analytics rule wizard in the Azure portal.":::
319-
320-
# [Defender portal](#tab/defender-portal)
321-
322-
:::image type="content" source="media/create-analytics-rules/defender-review-and-create.png" alt-text="Screenshot of validation screen of analytics rule wizard in the Defender portal.":::
323-
324-
---
325-
326-
## View the rule and its output
327-
328-
**View the rule definition:**
329-
330-
- You can find your newly created scheduled rule in the table under the **Active rules** tab on the **Analytics** page. From this list you can enable, disable, or delete each rule.
331-
332-
- If you onboarded Microsoft Sentinel to the unified security operations platform, the **Analytics** page can be found in the Defender portal under the **Microsoft Sentinel > Configuration** menu.
333-
334-
**View the results of the rule:**
335-
336-
# [Azure portal](#tab/azure-portal)
337-
338-
- To view the results of the analytics rules you create in the Azure portal, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
339-
340-
# [Defender portal](#tab/defender-portal)
341-
342-
- To view the results of the analytics rules you create in the Defender portal, expand **Investigation & response** in the navigation menu, then **Incidents & alerts**. View incidents on the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). View individual alerts on the **Alerts** page.
343-
344-
---
345-
346-
**Tune the rule:**
347-
- You can update the rule query to exclude false positives. For more information, see [Handle false positives in Microsoft Sentinel](false-positives.md).
348-
349-
> [!NOTE]
350-
> Alerts generated in Microsoft Sentinel are available through [Microsoft Graph Security](/graph/security-concept-overview). For more information, see the [Microsoft Graph Security alerts documentation](/graph/api/resources/security-api-overview).
351-
352266
## Next steps
353267

354268
When using Microsoft Sentinel analytics rules to detect threats across your environment, make sure you enable all rules associated with your connected data sources to ensure full security coverage for your environment.

0 commit comments

Comments
 (0)