You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/map-data-fields-to-entities.md
+7-16Lines changed: 7 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Map data fields to Microsoft Sentinel entities | Microsoft Docs
3
3
description: Map data fields in tables to Microsoft Sentinel entities in analytics rules, for better incident information
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 11/09/2021
6
+
ms.date: 04/26/2022
7
7
ms.author: yelevin
8
8
ms.custom: ignite-fall-2021
9
9
---
@@ -14,11 +14,7 @@ ms.custom: ignite-fall-2021
14
14
15
15
> [!IMPORTANT]
16
16
>
17
-
> - The new version of the entity mapping feature is in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
-
19
-
> [!IMPORTANT]
20
-
>
21
-
> - See [Notes on the new version](#notes-on-the-new-version) at the end of this document for important information about backward compatibility and differences between the new and old versions of entity mapping.
17
+
> - See "[Notes on the new version](#notes-on-the-new-version)" at the end of this document for important information about backward compatibility and differences between the new and old versions of entity mapping.
22
18
23
19
## Introduction
24
20
@@ -34,7 +30,7 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
34
30
35
31
1. Select the **Set rule logic** tab.
36
32
37
-
1. In the **Alert enrichment (Preview)** section, expand **Entity mapping**.
33
+
1. In the **Alert enrichment** section, expand **Entity mapping**.
@@ -58,24 +54,19 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
58
54
> -**Each mapped entity can identify *up to ten entities***.
59
55
> - If an alert contains more than ten items that correspond to a single entity mapping, only the first ten will be recognized as entities and be able to be analyzed as such.
60
56
> - This limitation applies to actual mappings, not to entity types. So if you have three different mapped entities for IP addresses (say, source, destination, and gateway), each of those mappings can accommodate ten entities.
57
+
>
61
58
> -**The size limit for an entire alert is *64 KB***.
62
59
> - Alerts that grow larger than 64 KB will be truncated. As entities are identified, they are added to the alert one by one until the alert size reaches 64 KB, and any remaining entities are dropped from the alert.
63
60
64
61
## Notes on the new version
65
62
66
-
- If you had previously defined entity mappings for this analytics rule using the old version, those mappings appear in the query code. Entity mappings defined under the new version **do not appear in the query code**. Analytics rules can only support one version of entity mappings at a time, and the new version takes precedence. Therefore, any single mapping you define here will cause **any and all** mappings defined in the query code to be **disregarded** when the query runs.
67
-
68
-
- If you still need to use the **old version** of entity mapping (as long as the new version is still in preview), you can still access it using a feature flag in the URL. Place your cursor between `https://portal.azure.com/` and `#blade`, and insert the text `?feature.EntityMapping=false`.
69
-
70
-
- The limits of the old version will continue to apply. You can map only the user, host, IP address, URL, and file hash entities, and only one of each.
71
-
72
-
- You must **remove** any entity mappings created using the new version **before** you return to the old version, otherwise any entity mappings that use the old version **will not work**.
73
-
74
-
- Once the new version of entity mapping is in General Availability, it will no longer be possible to use the old version. It is highly recommended that you migrate your old entity mappings to the new version.
63
+
- As the new version is now generally available (GA), the feature-flag workaround to use the old version is no longer available.
75
64
65
+
- If you had previously defined entity mappings for this analytics rule using the old version, they will be automatically converted to the new version.
76
66
77
67
## Next steps
78
68
79
69
In this document, you learned how to map data fields to entities in Microsoft Sentinel analytics rules. To learn more about Microsoft Sentinel, see the following articles:
70
+
80
71
- Get the complete picture on [scheduled query analytics rules](detect-threats-custom.md).
81
72
- Learn more about [entities in Microsoft Sentinel](entities.md).
Copy file name to clipboardExpand all lines: articles/sentinel/surface-custom-details-in-alerts.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Surface custom details in Microsoft Sentinel alerts | Microsoft Docs
3
3
description: Extract and surface custom event details in alerts in Microsoft Sentinel analytics rules, for better and more complete incident information
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 11/09/2021
6
+
ms.date: 04/26/2022
7
7
ms.author: yelevin
8
8
ms.custom: ignite-fall-2021
9
9
---
@@ -12,10 +12,6 @@ ms.custom: ignite-fall-2021
12
12
13
13
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14
14
15
-
> [!IMPORTANT]
16
-
>
17
-
> - The custom details feature is in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
-
19
15
## Introduction
20
16
21
17
[Scheduled query analytics rules](detect-threats-custom.md) analyze **events** from data sources connected to Microsoft Sentinel, and produce **alerts** when the contents of these events are significant from a security perspective. These alerts are further analyzed, grouped, and filtered by Microsoft Sentinel's various engines and distilled into **incidents** that warrant a SOC analyst's attention. However, when the analyst views the incident, only the properties of the component alerts themselves are immediately visible. Getting to the actual content - the information contained in the events - requires doing some digging.
@@ -32,7 +28,7 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
32
28
33
29
1. Click the **Set rule logic** tab.
34
30
35
-
1. In the **Alert enrichment (Preview)** section, expand **Custom details**.
31
+
1. In the **Alert enrichment** section, expand **Custom details**.
36
32
37
33
:::image type="content" source="media/surface-custom-details-in-alerts/alert-enrichment.png" alt-text="Find and select custom details":::
38
34
@@ -58,6 +54,8 @@ The procedure detailed below is part of the analytics rule creation wizard. It's
58
54
> - The size limit for all custom details, collectively, is **2 KB**.
59
55
60
56
## Next steps
57
+
61
58
In this document, you learned how to surface custom details in alerts using Microsoft Sentinel analytics rules. To learn more about Microsoft Sentinel, see the following articles:
59
+
62
60
- Get the complete picture on [scheduled query analytics rules](detect-threats-custom.md).
63
61
- Learn more about [entities in Microsoft Sentinel](entities.md).
0 commit comments