Skip to content

Commit beda4b8

Browse files
authored
Merge pull request #196119 from yelevin/yelevin/bugfix-alert-details
Removed Preview disclaimers from other enrichment docs
2 parents d0941b9 + 62f1a05 commit beda4b8

File tree

9 files changed

+12
-23
lines changed

9 files changed

+12
-23
lines changed

articles/sentinel/customize-alert-details.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
2828

2929
1. Click the **Set rule logic** tab.
3030

31-
1. In the **Alert enrichment (Preview)** section, expand **Alert details**.
31+
1. In the **Alert enrichment** section, expand **Alert details**.
3232

3333
:::image type="content" source="media/customize-alert-details/alert-enrichment.png" alt-text="Customize alert details":::
3434

articles/sentinel/map-data-fields-to-entities.md

Lines changed: 7 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Map data fields to Microsoft Sentinel entities | Microsoft Docs
33
description: Map data fields in tables to Microsoft Sentinel entities in analytics rules, for better incident information
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 11/09/2021
6+
ms.date: 04/26/2022
77
ms.author: yelevin
88
ms.custom: ignite-fall-2021
99
---
@@ -14,11 +14,7 @@ ms.custom: ignite-fall-2021
1414

1515
> [!IMPORTANT]
1616
>
17-
> - The new version of the entity mapping feature is in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18-
19-
> [!IMPORTANT]
20-
>
21-
> - See [Notes on the new version](#notes-on-the-new-version) at the end of this document for important information about backward compatibility and differences between the new and old versions of entity mapping.
17+
> - See "[Notes on the new version](#notes-on-the-new-version)" at the end of this document for important information about backward compatibility and differences between the new and old versions of entity mapping.
2218
2319
## Introduction
2420

@@ -34,7 +30,7 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
3430

3531
1. Select the **Set rule logic** tab.
3632

37-
1. In the **Alert enrichment (Preview)** section, expand **Entity mapping**.
33+
1. In the **Alert enrichment** section, expand **Entity mapping**.
3834

3935
:::image type="content" source="media/map-data-fields-to-entities/alert-enrichment.png" alt-text="Expand entity mapping":::
4036

@@ -58,24 +54,19 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
5854
> - **Each mapped entity can identify *up to ten entities***.
5955
> - If an alert contains more than ten items that correspond to a single entity mapping, only the first ten will be recognized as entities and be able to be analyzed as such.
6056
> - This limitation applies to actual mappings, not to entity types. So if you have three different mapped entities for IP addresses (say, source, destination, and gateway), each of those mappings can accommodate ten entities.
57+
>
6158
> - **The size limit for an entire alert is *64 KB***.
6259
> - Alerts that grow larger than 64 KB will be truncated. As entities are identified, they are added to the alert one by one until the alert size reaches 64 KB, and any remaining entities are dropped from the alert.
6360
6461
## Notes on the new version
6562

66-
- If you had previously defined entity mappings for this analytics rule using the old version, those mappings appear in the query code. Entity mappings defined under the new version **do not appear in the query code**. Analytics rules can only support one version of entity mappings at a time, and the new version takes precedence. Therefore, any single mapping you define here will cause **any and all** mappings defined in the query code to be **disregarded** when the query runs.
67-
68-
- If you still need to use the **old version** of entity mapping (as long as the new version is still in preview), you can still access it using a feature flag in the URL. Place your cursor between `https://portal.azure.com/` and `#blade`, and insert the text `?feature.EntityMapping=false`.
69-
70-
- The limits of the old version will continue to apply. You can map only the user, host, IP address, URL, and file hash entities, and only one of each.
71-
72-
- You must **remove** any entity mappings created using the new version **before** you return to the old version, otherwise any entity mappings that use the old version **will not work**.
73-
74-
- Once the new version of entity mapping is in General Availability, it will no longer be possible to use the old version. It is highly recommended that you migrate your old entity mappings to the new version.
63+
- As the new version is now generally available (GA), the feature-flag workaround to use the old version is no longer available.
7564

65+
- If you had previously defined entity mappings for this analytics rule using the old version, they will be automatically converted to the new version.
7666

7767
## Next steps
7868

7969
In this document, you learned how to map data fields to entities in Microsoft Sentinel analytics rules. To learn more about Microsoft Sentinel, see the following articles:
70+
8071
- Get the complete picture on [scheduled query analytics rules](detect-threats-custom.md).
8172
- Learn more about [entities in Microsoft Sentinel](entities.md).
-1.07 KB
Loading
-1.57 KB
Loading
8.17 KB
Loading
-2.09 KB
Loading
Binary file not shown.
-1.22 KB
Loading

articles/sentinel/surface-custom-details-in-alerts.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Surface custom details in Microsoft Sentinel alerts | Microsoft Docs
33
description: Extract and surface custom event details in alerts in Microsoft Sentinel analytics rules, for better and more complete incident information
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 11/09/2021
6+
ms.date: 04/26/2022
77
ms.author: yelevin
88
ms.custom: ignite-fall-2021
99
---
@@ -12,10 +12,6 @@ ms.custom: ignite-fall-2021
1212

1313
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
1414

15-
> [!IMPORTANT]
16-
>
17-
> - The custom details feature is in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18-
1915
## Introduction
2016

2117
[Scheduled query analytics rules](detect-threats-custom.md) analyze **events** from data sources connected to Microsoft Sentinel, and produce **alerts** when the contents of these events are significant from a security perspective. These alerts are further analyzed, grouped, and filtered by Microsoft Sentinel's various engines and distilled into **incidents** that warrant a SOC analyst's attention. However, when the analyst views the incident, only the properties of the component alerts themselves are immediately visible. Getting to the actual content - the information contained in the events - requires doing some digging.
@@ -32,7 +28,7 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
3228

3329
1. Click the **Set rule logic** tab.
3430

35-
1. In the **Alert enrichment (Preview)** section, expand **Custom details**.
31+
1. In the **Alert enrichment** section, expand **Custom details**.
3632

3733
:::image type="content" source="media/surface-custom-details-in-alerts/alert-enrichment.png" alt-text="Find and select custom details":::
3834

@@ -58,6 +54,8 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
5854
> - The size limit for all custom details, collectively, is **2 KB**.
5955
6056
## Next steps
57+
6158
In this document, you learned how to surface custom details in alerts using Microsoft Sentinel analytics rules. To learn more about Microsoft Sentinel, see the following articles:
59+
6260
- Get the complete picture on [scheduled query analytics rules](detect-threats-custom.md).
6361
- Learn more about [entities in Microsoft Sentinel](entities.md).

0 commit comments

Comments
 (0)