You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/create-analytics-rules.md
+25-26Lines changed: 25 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -210,26 +210,17 @@ In the **Incident settings** tab, choose whether Microsoft Sentinel turns alerts
210
210
211
211
### Review or add automated responses
212
212
213
-
In the **Automated responses** tab, see the [automation rules](automate-incident-handling-with-automation-rules.md) displayed in the list. If you want to add any responses that aren't already covered by existing rules, you have two choices:
213
+
1.In the **Automated responses** tab, see the automation rules displayed in the list. If you want to add any responses that aren't already covered by existing rules, you have two choices:
214
214
215
-
- Edit an existing rule if you want the added response to apply to many or all rules.
216
-
- Select **Add new** to [create a new automation rule](create-manage-use-automation-rules.md) that will apply only to this analytics rule.
215
+
- Edit an existing rule if you want the added response to apply to many or all rules.
216
+
- Select **Add new** to [create a new automation rule](create-manage-use-automation-rules.md) that will apply only to this analytics rule.
217
217
218
+
To learn more about what you can use automation rules for, see [Automate threat response in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md)
218
219
219
-
to set automated responses to occur at any of three types of occasions:
220
-
- When an alert is generated by this analytics rule.
221
-
- When an incident is created from alerts generated by this analytics rule.
222
-
- When an incident is updated with alerts generated by this analytics rule.
220
+
- Under **Alert automation (classic)** at the bottom of the screen, you'll see any playbooks you've configured to run automatically when an alert is generated using the old method.
221
+
-**As of June 2023**, you can no longer add playbooks to this list. Playbooks already listed here will continue to run until this method is **deprecated, effective March 2026**.
223
222
224
-
The grid displayed under **Automation rules** shows the automation rules that already apply to this analytics rule (by virtue of it meeting the conditions defined in those rules). You can edit any of these by selecting the name of the rule or the ellipsis at the end of each row. Or, you can
225
-
226
-
Use automation rules to perform [basic triage](investigate-incidents.md#navigate-and-triage-incidents), assignment, [workflow](incident-tasks.md), and closing of incidents.
227
-
228
-
Automate more complex tasks and invoke responses from remote systems to remediate threats by calling playbooks from these automation rules. You can invoke playbooks for incidents as well as for individual alerts.
229
-
230
-
- For more information and instructions on creating playbooks and automation rules, see [Automate threat responses](tutorial-respond-threats-playbook.md#automate-threat-responses).
231
-
232
-
- For more information about when to use the **incident created trigger**, the **incident updated trigger**, or the **alert created trigger**, see [Use triggers and actions in Microsoft Sentinel playbooks](playbook-triggers-actions.md#microsoft-sentinel-triggers-summary).
223
+
- If you still have any playbooks listed here, you should instead create an automation rule based on the **alert created trigger** and invoke the playbook from the automation rule. After you've done that, select the ellipsis at the end of the line of the playbook listed here, and select **Remove**. See [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md) for full instructions.
233
224
234
225
# [Azure portal](#tab/azure-portal)
235
226
@@ -241,12 +232,15 @@ Automate more complex tasks and invoke responses from remote systems to remediat
241
232
242
233
---
243
234
244
-
- Under **Alert automation (classic)** at the bottom of the screen, you'll see any playbooks you've configured to run automatically when an alert is generated using the old method.
245
-
-**As of June 2023**, you can no longer add playbooks to this list. Playbooks already listed here will continue to run until this method is **deprecated, effective March 2026**.
235
+
1. Select **Next: Review and create** to review all the settings for your new analytics rule.
236
+
237
+
### Validate configuration and create the rule
246
238
247
-
- If you still have any playbooks listed here, you should instead create an automation rule based on the **alert created trigger** and invoke the playbook from the automation rule. After you've done that, select the ellipsis at the end of the line of the playbook listed here, and select **Remove**. See [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md) for full instructions.
239
+
1. When the "Validation passed" message appears, select **Create**.
248
240
249
-
Select **Next: Review and create** to review all the settings for your new analytics rule. When the "Validation passed" message appears, select **Create**.
241
+
1. If an error appears instead, find and select the red X on the tab in the wizard where the error occurred.
242
+
243
+
1. Correct the error and go back to the **Review and create** tab to run the validation again.
250
244
251
245
# [Azure portal](#tab/azure-portal)
252
246
@@ -260,23 +254,28 @@ Select **Next: Review and create** to review all the settings for your new analy
260
254
261
255
## View the rule and its output
262
256
263
-
**View the rule definition:**
257
+
### View the rule definition
264
258
265
-
-You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
259
+
You can find your newly created custom rule (of type "Scheduled") in the table under the **Active rules** tab on the main **Analytics** screen. From this list you can enable, disable, or delete each rule.
266
260
267
-
**View the results of the rule:**
261
+
### View the results of the rule
268
262
269
263
# [Azure portal](#tab/azure-portal)
270
264
271
-
- To view the results of the analytics rules you create in the Azure portal, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
265
+
To view the results of the analytics rules you create in the Azure portal, go to the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md).
266
+
267
+
:::image type="content" source="media/create-analytics-rules/view-incidents.png" alt-text="Screenshot of incidents page in the Azure portal." lightbox="media/create-analytics-rules/view-incidents.png":::
272
268
273
269
# [Defender portal](#tab/defender-portal)
274
270
275
-
- To view the results of the analytics rules you create in the Defender portal, expand **Investigation & response** in the navigation menu, then **Incidents & alerts**. View incidents on the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). View individual alerts on the **Alerts** page.
271
+
To view the results of the analytics rules you create in the Defender portal, expand **Investigation & response** in the navigation menu, then **Incidents & alerts**. View incidents on the **Incidents** page, where you can triage incidents, [investigate them](investigate-cases.md), and [remediate the threats](respond-threats-during-investigation.md). View individual alerts on the **Alerts** page.
272
+
273
+
:::image type="content" source="media/create-analytics-rules/defender-view-incidents.png" alt-text="Screenshot of incidents page in the Azure portal." lightbox="media/create-analytics-rules/defender-view-incidents.png":::
276
274
277
275
---
278
276
279
-
**Tune the rule:**
277
+
### Tune the rule
278
+
280
279
- You can update the rule query to exclude false positives. For more information, see [Handle false positives in Microsoft Sentinel](false-positives.md).
The queries in **scheduled rule templates** were written by security and data science experts, either from Microsoft or from the vendor of the solution providing the template.
29
29
@@ -41,29 +41,19 @@ The rest of this article explains all the possibilities for customizing the conf
41
41
42
42
## Analytics rule configuration
43
43
44
-
This section describes the configuration options available in the analytics rule wizard, giving you the information required to understand how to configure a rule in a given situation.
44
+
This section explains the key considerations you need to take into account before you begin configuring your rules.
45
45
46
-
### *General* tab: Analytics rule details
46
+
### Analytics rule name and details
47
47
48
48
The first page of the analytics rule wizard contains the rule’s basic information.
49
49
50
-
# [Azure portal](#tab/azure-portal)
51
-
52
-
:::image type="content" source="media/create-analytics-rules/general-tab.png" alt-text="Screenshot of opening screen of analytics rule wizard in the Azure portal.":::
53
-
54
-
# [Defender portal](#tab/defender-portal)
55
-
56
-
:::image type="content" source="media/create-analytics-rules/defender-wizard-general.png" alt-text="Screenshot of opening screen of analytics rule wizard in the Defender portal.":::
57
-
58
-
---
59
-
60
50
**Name:** The name of the rule as it appears in the list of rules and in any rule-based filters. The name must be unique to your workspace.
61
51
62
52
**Description:** A free-text description of the purpose of the rule.
63
53
64
-
**ID:** The GUID of the rule as an Azure resource, used in API requests and responses, among other things. This is a read-only field that is displayed when you're editing an existing rule. The GUID is assigned only when the rule is created, so it doesn't show up when creating a new rule, either from a template or from scratch.
54
+
**ID:** The GUID of the rule as an Azure resource, used in API requests and responses, among other things. This GUID is assigned only when the rule is created, so it's displayed only when you're **editing an existing rule**. As it's a read-only field, it's displayed as grayed out and can't be changed. It doesn't yet exist when creating a new rule, either from a template or from scratch.
65
55
66
-
**Severity:** A rating to give the alerts produced by this rule. The severity of an activity is a product of the calculation of the **likelihood** of the activity’s occurrence and its potential negative **impact**.
56
+
**Severity:** A rating to give the alerts produced by this rule. The severity of an activity is a calculation of the potential negative **impact** of the activity’s occurrence.
0 commit comments