Skip to content

Commit bbbb5a1

Browse files
committed
Final for now
1 parent 11109ba commit bbbb5a1

File tree

4 files changed

+30
-41
lines changed

4 files changed

+30
-41
lines changed

articles/sentinel/create-analytics-rules.md

Lines changed: 25 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -210,26 +210,17 @@ In the **Incident settings** tab, choose whether Microsoft Sentinel turns alerts
210210

211211
### Review or add automated responses
212212

213-
In the **Automated responses** tab, see the [automation rules](automate-incident-handling-with-automation-rules.md) displayed in the list. If you want to add any responses that aren't already covered by existing rules, you have two choices:
213+
1. In the **Automated responses** tab, see the automation rules displayed in the list. If you want to add any responses that aren't already covered by existing rules, you have two choices:
214214

215-
- Edit an existing rule if you want the added response to apply to many or all rules.
216-
- Select **Add new** to [create a new automation rule](create-manage-use-automation-rules.md) that will apply only to this analytics rule.
215+
- Edit an existing rule if you want the added response to apply to many or all rules.
216+
- Select **Add new** to [create a new automation rule](create-manage-use-automation-rules.md) that will apply only to this analytics rule.
217217

218+
To learn more about what you can use automation rules for, see [Automate threat response in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md)
218219

219-
to set automated responses to occur at any of three types of occasions:
220-
- When an alert is generated by this analytics rule.
221-
- When an incident is created from alerts generated by this analytics rule.
222-
- When an incident is updated with alerts generated by this analytics rule.
220+
- Under **Alert automation (classic)** at the bottom of the screen, you'll see any playbooks you've configured to run automatically when an alert is generated using the old method.
221+
- **As of June 2023**, you can no longer add playbooks to this list. Playbooks already listed here will continue to run until this method is **deprecated, effective March 2026**.
223222

224-
The grid displayed under **Automation rules** shows the automation rules that already apply to this analytics rule (by virtue of it meeting the conditions defined in those rules). You can edit any of these by selecting the name of the rule or the ellipsis at the end of each row. Or, you can
225-
226-
Use automation rules to perform [basic triage](investigate-incidents.md#navigate-and-triage-incidents), assignment, [workflow](incident-tasks.md), and closing of incidents.
227-
228-
Automate more complex tasks and invoke responses from remote systems to remediate threats by calling playbooks from these automation rules. You can invoke playbooks for incidents as well as for individual alerts.
229-
230-
- For more information and instructions on creating playbooks and automation rules, see [Automate threat responses](tutorial-respond-threats-playbook.md#automate-threat-responses).
231-
232-
- For more information about when to use the **incident created trigger**, the **incident updated trigger**, or the **alert created trigger**, see [Use triggers and actions in Microsoft Sentinel playbooks](playbook-triggers-actions.md#microsoft-sentinel-triggers-summary).
223+
- If you still have any playbooks listed here, you should instead create an automation rule based on the **alert created trigger** and invoke the playbook from the automation rule. After you've done that, select the ellipsis at the end of the line of the playbook listed here, and select **Remove**. See [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md) for full instructions.
233224

234225
# [Azure portal](#tab/azure-portal)
235226

@@ -241,12 +232,15 @@ Automate more complex tasks and invoke responses from remote systems to remediat
241232

242233
---
243234

244-
- Under **Alert automation (classic)** at the bottom of the screen, you'll see any playbooks you've configured to run automatically when an alert is generated using the old method.
245-
- **As of June 2023**, you can no longer add playbooks to this list. Playbooks already listed here will continue to run until this method is **deprecated, effective March 2026**.
235+
1. Select **Next: Review and create** to review all the settings for your new analytics rule.
236+
237+
### Validate configuration and create the rule
246238

247-
- If you still have any playbooks listed here, you should instead create an automation rule based on the **alert created trigger** and invoke the playbook from the automation rule. After you've done that, select the ellipsis at the end of the line of the playbook listed here, and select **Remove**. See [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md) for full instructions.
239+
1. When the "Validation passed" message appears, select **Create**.
248240

249-
Select **Next: Review and create** to review all the settings for your new analytics rule. When the "Validation passed" message appears, select **Create**.
241+
1. If an error appears instead, find and select the red X on the tab in the wizard where the error occurred.
242+
243+
1. Correct the error and go back to the **Review and create** tab to run the validation again.
250244

251245
# [Azure portal](#tab/azure-portal)
252246

@@ -260,23 +254,28 @@ Select **Next: Review and create** to review all the settings for your new analy
260254

261255
## View the rule and its output
262256

263-
**View the rule definition:**
257+
### View the rule definition
264258

265-
- You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
259+
You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
266260

267-
**View the results of the rule:**
261+
### View the results of the rule
268262

269263
# [Azure portal](#tab/azure-portal)
270264

271-
- To view the results of the analytics rules you create in the Azure portal, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
265+
To view the results of the analytics rules you create in the Azure portal, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
266+
267+
:::image type="content" source="media/create-analytics-rules/view-incidents.png" alt-text="Screenshot of incidents page in the Azure portal." lightbox="media/create-analytics-rules/view-incidents.png":::
272268

273269
# [Defender portal](#tab/defender-portal)
274270

275-
- To view the results of the analytics rules you create in the Defender portal, expand **Investigation & response** in the navigation menu, then **Incidents & alerts**. View incidents on the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). View individual alerts on the **Alerts** page.
271+
To view the results of the analytics rules you create in the Defender portal, expand **Investigation & response** in the navigation menu, then **Incidents & alerts**. View incidents on the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). View individual alerts on the **Alerts** page.
272+
273+
:::image type="content" source="media/create-analytics-rules/defender-view-incidents.png" alt-text="Screenshot of incidents page in the Azure portal." lightbox="media/create-analytics-rules/defender-view-incidents.png":::
276274

277275
---
278276

279-
**Tune the rule:**
277+
### Tune the rule
278+
280279
- You can update the rule query to exclude false positives. For more information, see [Handle false positives in Microsoft Sentinel](false-positives.md).
281280

282281
> [!NOTE]
127 KB
Loading
127 KB
Loading

articles/sentinel/scheduled-rules-overview.md

Lines changed: 5 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article helps you understand how scheduled analytics rules are built, and i
2323

2424
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2525

26-
## Use analytics rule templates
26+
## Analytics rule templates
2727

2828
The queries in **scheduled rule templates** were written by security and data science experts, either from Microsoft or from the vendor of the solution providing the template.
2929

@@ -41,29 +41,19 @@ The rest of this article explains all the possibilities for customizing the conf
4141

4242
## Analytics rule configuration
4343

44-
This section describes the configuration options available in the analytics rule wizard, giving you the information required to understand how to configure a rule in a given situation.
44+
This section explains the key considerations you need to take into account before you begin configuring your rules.
4545

46-
### *General* tab: Analytics rule details
46+
### Analytics rule name and details
4747

4848
The first page of the analytics rule wizard contains the rule’s basic information.
4949

50-
# [Azure portal](#tab/azure-portal)
51-
52-
:::image type="content" source="media/create-analytics-rules/general-tab.png" alt-text="Screenshot of opening screen of analytics rule wizard in the Azure portal.":::
53-
54-
# [Defender portal](#tab/defender-portal)
55-
56-
:::image type="content" source="media/create-analytics-rules/defender-wizard-general.png" alt-text="Screenshot of opening screen of analytics rule wizard in the Defender portal.":::
57-
58-
---
59-
6050
**Name:** The name of the rule as it appears in the list of rules and in any rule-based filters. The name must be unique to your workspace.
6151

6252
**Description:** A free-text description of the purpose of the rule.
6353

64-
**ID:** The GUID of the rule as an Azure resource, used in API requests and responses, among other things. This is a read-only field that is displayed when you're editing an existing rule. The GUID is assigned only when the rule is created, so it doesn't show up when creating a new rule, either from a template or from scratch.
54+
**ID:** The GUID of the rule as an Azure resource, used in API requests and responses, among other things. This GUID is assigned only when the rule is created, so it's displayed only when you're **editing an existing rule**. As it's a read-only field, it's displayed as grayed out and can't be changed. It doesn't yet exist when creating a new rule, either from a template or from scratch.
6555

66-
**Severity:** A rating to give the alerts produced by this rule. The severity of an activity is a product of the calculation of the **likelihood** of the activity’s occurrence and its potential negative **impact**.
56+
**Severity:** A rating to give the alerts produced by this rule. The severity of an activity is a calculation of the potential negative **impact** of the activity’s occurrence.
6757

6858
| Severity | Description |
6959
| --- | --- |

0 commit comments

Comments
 (0)