Skip to content

Commit af59f5b

Browse files
Merge pull request #231370 from austinmccollum/austinmc-mdti-secure
update data sources and matching criteria
2 parents c6c6950 + d40e776 commit af59f5b

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: austinmc
1010

1111
# Use matching analytics to detect threats
1212

13-
Take advantage of threat intelligence produced by Microsoft to generate high fidelity alerts and incidents with the **Microsoft Threat Intelligence Analytics** rule. This rule will match Common Event Format (CEF) logs, Syslog data or Windows DNS events with domain, IP and URL threat indicators.
13+
Take advantage of threat intelligence produced by Microsoft to generate high fidelity alerts and incidents with the **Microsoft Threat Intelligence Analytics** rule. Check the prerequisites to validate which logs this rule will match indicators with.
1414

1515
> [!IMPORTANT]
1616
> Matching analytics is currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -23,6 +23,8 @@ One or more of the following data sources must be connected:
2323
- Common Event Format (CEF)
2424
- DNS (Preview)
2525
- Syslog
26+
- Office activity logs
27+
- Azure activity logs
2628

2729
:::image type="content" source="media/use-matching-analytics-to-detect-threats/data-sources.png" alt-text="A screenshot showing the Microsoft Threat Intelligence Analytics rule data source connections.":::
2830

0 commit comments

Comments
 (0)