Skip to content

Commit c6813c2

Browse files
Merge pull request #292540 from yelevin/yelevin/kusto-updates-2
Final ADX cleanup
2 parents 561e4ce + 690c3f0 commit c6813c2

27 files changed

+272
-72
lines changed

articles/sentinel/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -912,13 +912,13 @@
912912
- name: Overview
913913
href: kusto-overview.md
914914
- name: Query best practices
915-
href: /kusto/query/best-practices?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel&preserve-view=true
915+
href: /kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
916916
- name: SQL to KQL cheat sheet
917-
href: /kusto/query/sql-cheat-sheet?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel&preserve-view=true
917+
href: /kusto/query/sql-cheat-sheet?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
918918
- name: Splunk to KQL cheat sheet
919-
href: /kusto/query/splunk-cheat-sheet?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel&preserve-view=true
919+
href: /kusto/query/splunk-cheat-sheet?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
920920
- name: KQL quick reference
921-
href: /kusto/query/kql-quick-reference?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json&view=microsoft-sentinel&preserve-view=true
921+
href: /kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
922922
- name: Other KQL resources
923923
href: kusto-resources.md
924924
- name: Create custom query

articles/sentinel/audit-sentinel-data.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ LAQueryLogs
177177
|summarize arg_max(StatsCPUTimeMs, *) by AADClientId
178178
| extend User = AADEmail, QueryRunTime = StatsCPUTimeMs
179179
| project User, QueryRunTime, QueryText
180-
| order by QueryRunTime desc
180+
| sort by QueryRunTime desc
181181
```
182182

183183
### Show users who ran the most queries in the past week
@@ -233,6 +233,22 @@ Use Microsoft Sentinel's own features to monitor events and actions that occur w
233233

234234
- **Monitor data connector health** using the [Connector Health Push Notification Solution](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Send-ConnectorHealthStatus) playbook to watch for stalled or stopped ingestion, and send notifications when a connector has stopped collecting data or machines have stopped reporting.
235235

236+
See more information on the following items used in the preceding examples, in the Kusto documentation:
237+
- [***let*** statement](/kusto/query/let-statement?view=microsoft-sentinel&preserve-view=true)
238+
- [***where*** operator](/kusto/query/where-operator?view=microsoft-sentinel&preserve-view=true)
239+
- [***project*** operator](/kusto/query/project-operator?view=microsoft-sentinel&preserve-view=true)
240+
- [***count*** operator](/kusto/query/count-operator?view=microsoft-sentinel&preserve-view=true)
241+
- [***sort*** operator](/kusto/query/sort-operator?view=microsoft-sentinel&preserve-view=true)
242+
- [***extend*** operator](/kusto/query/extend-operator?view=microsoft-sentinel&preserve-view=true)
243+
- [***join*** operator](/kusto/query/join-operator?view=microsoft-sentinel&preserve-view=true)
244+
- [***summarize*** operator](/kusto/query/summarize-operator?view=microsoft-sentinel&preserve-view=true)
245+
- [***ago()*** function](/kusto/query/ago-function?view=microsoft-sentinel&preserve-view=true)
246+
- [***ingestion_time()*** function](/kusto/query/ingestion-time-function?view=microsoft-sentinel&preserve-view=true)
247+
- [***count()*** aggregation function](/kusto/query/count-aggregation-function?view=microsoft-sentinel&preserve-view=true)
248+
- [***arg_max()*** aggregation function](/kusto/query/arg-max-aggregation-function?view=microsoft-sentinel&preserve-view=true)
249+
250+
[!INCLUDE [kusto-reference-general-no-alert](includes/kusto-reference-general-no-alert.md)]
251+
236252
## Next step
237253

238254
In Microsoft Sentinel, use the **Workspace audit** workbook to audit the activities in your SOC environment. For more information, see [Visualize and monitor your data](monitor-your-data.md).

articles/sentinel/audit-track-tasks.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ The detailed information added to the **Tasks** field consists of key-value pair
3030
| --- | ----- |
3131
| **createdBy** | The identity that created the task:<br>**- email**: email address of identity<br>**- name**: name of the identity<br>**- objectId**: GUID of the identity<br>**- userPrincipalName**: UPN of the identity |
3232
| **createdTimeUtc** | Time the task was created, in UTC. |
33-
| **lastCompletedTimeUtc** | Time the task was marked complete, in UTC.
33+
| **lastCompletedTimeUtc** | Time the task was marked complete, in UTC. |
3434
| **lastModifiedBy** | The identity that last modified the task:<br>**- email**: email address of identity<br>**- name**: name of the identity<br>**- objectId**: GUID of the identity<br>**- userPrincipalName**: UPN of the identity |
35-
| **lastModifiedTimeUtc** | Time the task was last modified, in UTC.
35+
| **lastModifiedTimeUtc** | Time the task was last modified, in UTC. |
3636
| **status** | Current status of the task: New, Completed, Deleted. |
3737
| **taskId** | Resource ID of the task. |
3838
| **title** | Friendly name given to the task by its creator. |
@@ -118,9 +118,17 @@ SecurityIncident
118118
| summarize arg_max(lastModifiedTimeUtc, *) by taskId
119119
| where status !in ('Completed', 'Deleted')
120120
| project TaskTitle = ['title'], TaskStatus = ['status'], createdTimeUtc, lastModifiedTimeUtc = column_ifexists("lastModifiedTimeUtc", datetime(null)), TaskCreator = ['createdBy'].name, lastModifiedBy, IncidentNumber, IncidentOwner = Owner.userPrincipalName
121-
| order by lastModifiedTimeUtc desc
121+
| sort by lastModifiedTimeUtc desc
122122
```
123123

124+
See more information on the following items used in the preceding examples, in the Kusto documentation:
125+
- [***where*** operator](/kusto/query/where-operator?view=microsoft-sentinel&preserve-view=true)
126+
- [***project*** operator](/kusto/query/project-operator?view=microsoft-sentinel&preserve-view=true)
127+
- [***sort*** operator](/kusto/query/sort-operator?view=microsoft-sentinel&preserve-view=true)
128+
- [***summarize*** operator](/kusto/query/summarize-operator?view=microsoft-sentinel&preserve-view=true)
129+
- [***arg_max()*** aggregation function](/kusto/query/arg-max-aggregation-function?view=microsoft-sentinel&preserve-view=true)
130+
131+
[!INCLUDE [kusto-reference-general-no-alert](includes/kusto-reference-general-no-alert.md)]
124132

125133
## Next steps
126134

articles/sentinel/aws-s3-troubleshoot.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,15 @@ There might be errors in the health logs, or the health feature might not be ena
149149
150150
1. If the health feature isn’t enabled, [enable it](enable-monitoring.md).
151151
152+
See more information on the following items used in the preceding example, in the Kusto documentation:
153+
- [***where*** operator](/kusto/query/where-operator?view=microsoft-sentinel&preserve-view=true)
154+
- [***extend*** operator](/kusto/query/extend-operator?view=microsoft-sentinel&preserve-view=true)
155+
- [***project*** operator](/kusto/query/project-operator?view=microsoft-sentinel&preserve-view=true)
156+
- [***mv-expand*** operator](/kusto/query/mv-expand-operator?view=microsoft-sentinel&preserve-view=true)
157+
- [***ago()*** function](/kusto/query/ago-function?view=microsoft-sentinel&preserve-view=true)
158+
159+
[!INCLUDE [kusto-reference-general-no-alert](includes/kusto-reference-general-no-alert.md)]
160+
152161
## Next steps
153162
154163
In this article, you learned how to quickly identify causes and resolve common issues with the AWS S3 connector.

articles/sentinel/billing-monitor-costs.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Usage
7575
| where StartTime >= startofday(ago(31d)) and EndTime < startofday(now())
7676
| where IsBillable == true
7777
| summarize BillableDataGB = sum(Quantity) / 1000. by bin(StartTime, 1d), Solution
78-
| extend Solution = iif(Solution == "SecurityInsights", "AzureSentinel", Solution)
78+
| extend Solution = iff(Solution == "SecurityInsights", "AzureSentinel", Solution)
7979
| render columnchart
8080
```
8181

@@ -97,10 +97,26 @@ Usage
9797
| where StartTime >= startofday(ago(31d)) and EndTime < startofday(now())
9898
| where IsBillable == true
9999
| summarize BillableDataGB = sum(Quantity) / 1000. by Solution, DataType
100-
| extend Solution = iif(Solution == "SecurityInsights", "AzureSentinel", Solution)
100+
| extend Solution = iff(Solution == "SecurityInsights", "AzureSentinel", Solution)
101101
| sort by Solution asc, DataType asc
102102
```
103103

104+
See more information on the following items used in the preceding examples, in the Kusto documentation:
105+
- [***where*** operator](/kusto/query/where-operator?view=microsoft-sentinel&preserve-view=true)
106+
- [***extend*** operator](/kusto/query/extend-operator?view=microsoft-sentinel&preserve-view=true)
107+
- [***summarize*** operator](/kusto/query/summarize-operator?view=microsoft-sentinel&preserve-view=true)
108+
- [***render*** operator](/kusto/query/render-operator?view=microsoft-sentinel&preserve-view=true)
109+
- [***sort*** operator](/kusto/query/sort-operator?view=microsoft-sentinel&preserve-view=true)
110+
- [***iff()*** function](/kusto/query/iff-function?view=microsoft-sentinel&preserve-view=true)
111+
- [***ago()*** function](/kusto/query/ago-function?view=microsoft-sentinel&preserve-view=true)
112+
- [***now()*** function](/kusto/query/now-function?view=microsoft-sentinel&preserve-view=true)
113+
- [***bin()*** function](/kusto/query/bin-function?view=microsoft-sentinel&preserve-view=true)
114+
- [***startofday()*** function](/kusto/query/startofday-function?view=microsoft-sentinel&preserve-view=true)
115+
- [***count()*** aggregation function](/kusto/query/count-aggregation-function?view=microsoft-sentinel&preserve-view=true)
116+
- [***sum()*** aggregation function](/kusto/query/sum-aggregation-function?view=microsoft-sentinel&preserve-view=true)
117+
118+
[!INCLUDE [kusto-reference-general-no-alert](includes/kusto-reference-general-no-alert.md)]
119+
104120
## Deploy a workbook to visualize data ingestion
105121

106122
The **Workspace Usage Report workbook** provides your workspace's data consumption, cost, and usage statistics. The workbook gives the workspace's data ingestion status and amount of free and billable data. You can use the workbook logic to monitor data ingestion and costs, and to build custom views and rule-based alerts.

articles/sentinel/bookmarks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ View bookmarked queries, results, or their history.
120120

121121
:::image type="content" source="media/bookmarks/bookmark-logs.png" alt-text="Screenshot of bookmark logs command.":::
122122

123-
This view shows all your bookmarks with associated metadata. You can use [Kusto Query Language (KQL)](/azure/data-explorer/kql-quick-reference) queries to filter down to the latest version of the specific bookmark you're looking for.
123+
This view shows all your bookmarks with associated metadata. You can use [Kusto Query Language (KQL)](/kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true) queries to filter down to the latest version of the specific bookmark you're looking for.
124124

125125
There can be a significant delay (measured in minutes) between the time you create a bookmark and when it's displayed in the **Bookmarks** tab.
126126

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To ingest and synchronize Microsoft Defender XDR incidents with all their alerts
6666

6767
```kusto
6868
SecurityIncident
69-
| where ProviderName == "Microsoft 365 Defender"
69+
| where ProviderName == "Microsoft 365 Defender"
7070
```
7171

7272
When you enable the Microsoft Defender XDR connector, any Microsoft Defender components’ connectors that were previously connected are automatically disconnected in the background. Although they continue to *appear* connected, no data flows through them.
@@ -178,6 +178,22 @@ let Now = now();
178178
| render timechart
179179
```
180180

181+
See more information on the following items used in the preceding examples, in the Kusto documentation:
182+
- [***let*** statement](/kusto/query/let-statement?view=microsoft-sentinel&preserve-view=true)
183+
- [***where*** operator](/kusto/query/where-operator?view=microsoft-sentinel&preserve-view=true)
184+
- [***extend*** operator](/kusto/query/extend-operator?view=microsoft-sentinel&preserve-view=true)
185+
- [***project*** operator](/kusto/query/project-operator?view=microsoft-sentinel&preserve-view=true)
186+
- [***union*** operator](/kusto/query/union-operator?view=microsoft-sentinel&preserve-view=true)
187+
- [***sort*** operator](/kusto/query/sort-operator?view=microsoft-sentinel&preserve-view=true)
188+
- [***summarize*** operator](/kusto/query/summarize-operator?view=microsoft-sentinel&preserve-view=true)
189+
- [***render*** operator](/kusto/query/render-operator?view=microsoft-sentinel&preserve-view=true)
190+
- [***ago()*** function](/kusto/query/ago-function?view=microsoft-sentinel&preserve-view=true)
191+
- [***iff()*** function](/kusto/query/iff-function?view=microsoft-sentinel&preserve-view=true)
192+
- [***max()*** aggregation function](/kusto/query/max-aggregation-function?view=microsoft-sentinel&preserve-view=true)
193+
- [***count()*** aggregation function](/kusto/query/count-aggregation-function?view=microsoft-sentinel&preserve-view=true)
194+
195+
[!INCLUDE [kusto-reference-general-no-alert](includes/kusto-reference-general-no-alert.md)]
196+
181197
## Next step
182198

183199
In this document, you learned how to integrate Microsoft Defender XDR incidents, alerts, and advanced hunting event data from Microsoft Defender services, into Microsoft Sentinel, by using the Microsoft Defender XDR connector.

articles/sentinel/connect-microsoft-purview.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,14 +97,23 @@ To disconnect the Azure Information Protection connector:
9797
'"MySensitivityLabelId": "MyLabel3"'
9898
'}');
9999
MicrosoftPurviewInformationProtection
100-
| extend SensitivityLabelName = iif(isnotempty(SensitivityLabelId),
100+
| extend SensitivityLabelName = iff(isnotempty(SensitivityLabelId),
101101
tostring(labelsMap[tostring(SensitivityLabelId)]), "")
102-
| extend OldSensitivityLabelName = iif(isnotempty(OldSensitivityLabelId),
102+
| extend OldSensitivityLabelName = iff(isnotempty(OldSensitivityLabelId),
103103
tostring(labelsMap[tostring(OldSensitivityLabelId)]), "")
104104
```
105105
106106
- The `MicrosoftPurviewInformationProtection` table and the `OfficeActivity` table might include some duplicated events.
107-
107+
108+
See more information on the following items used in the preceding examples, in the Kusto documentation:
109+
- [***let*** statement](/kusto/query/let-statement?view=microsoft-sentinel&preserve-view=true)
110+
- [***extend*** operator](/kusto/query/extend-operator?view=microsoft-sentinel&preserve-view=true)
111+
- [***parse_json()*** function](/kusto/query/parse-json-function?view=microsoft-sentinel&preserve-view=true)
112+
- [***iff()*** function](/kusto/query/iff-function?view=microsoft-sentinel&preserve-view=true)
113+
- [***tostring()*** function](/kusto/query/tostring-function?view=microsoft-sentinel&preserve-view=true)
114+
115+
[!INCLUDE [kusto-reference-general-no-alert](includes/kusto-reference-general-no-alert.md)]
116+
108117
## Next steps
109118
110119
In this article, you learned how to set up the Microsoft Purview Information Protection connector to track, analyze, report on the data, and use it for compliance purposes. To learn more about Microsoft Sentinel, see the following articles:

articles/sentinel/create-analytics-rule-from-template.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,11 @@ From the Microsoft Defender navigation menu, expand **Microsoft Sentinel**, then
8484

8585
1. Cycle through the tabs of the wizard, customizing the logic and other rule settings where possible to better suit your specific needs.
8686

87+
If you need to make any changes to the query itself, consult the following articles from the Kusto documentation for help:
88+
- [Kusto Query Language in Microsoft Sentinel](kusto-overview.md)
89+
- [KQL quick reference guide](/kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true)
90+
- [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true)
91+
8792
When you get to the end of the rule creation wizard, Microsoft Sentinel creates the rule. The new rule appears in the **Active rules** tab.
8893

8994
Repeat the process to create more rules. For more details on how to customize your rules in the rule creation wizard, see [Create a custom analytics rule from scratch](create-analytics-rules.md).

articles/sentinel/create-analytics-rules.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Before you do anything else, you should design and build a query in Kusto Query
4646

4747
For some helpful tips for building Kusto queries, see [Best practices for analytics rule queries](scheduled-rules-overview.md#best-practices-for-analytics-rule-queries).
4848

49-
For more help building Kusto queries, see [Kusto Query Language in Microsoft Sentinel](kusto-overview.md) and [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=%2Fazure%2Fsentinel%2FTOC.json&bc=%2Fazure%2Fsentinel%2Fbreadcrumb%2Ftoc.json).
49+
For more help building Kusto queries, see [Kusto Query Language in Microsoft Sentinel](kusto-overview.md) and [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true) (from the Kusto documentation).
5050

5151
## Create your analytics rule
5252

@@ -239,15 +239,15 @@ In the **Incident settings** tab, choose whether Microsoft Sentinel turns alerts
239239

240240
- If you still have any playbooks listed here, you should instead create an automation rule based on the **alert created trigger** and invoke the playbook from the automation rule. After you've done that, select the ellipsis at the end of the line of the playbook listed here, and select **Remove**. See [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md) for full instructions.
241241

242-
# [Azure portal](#tab/azure-portal)
242+
# [Azure portal](#tab/azure-portal)
243243

244-
:::image type="content" source="media/create-analytics-rules/automated-response-tab.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Azure portal.":::
244+
:::image type="content" source="media/create-analytics-rules/automated-response-tab.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Azure portal.":::
245245

246-
# [Defender portal](#tab/defender-portal)
246+
# [Defender portal](#tab/defender-portal)
247247

248-
:::image type="content" source="media/create-analytics-rules/defender-automated-response.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Defender portal.":::
248+
:::image type="content" source="media/create-analytics-rules/defender-automated-response.png" alt-text="Screenshot of automated response screen of analytics rule wizard in the Defender portal.":::
249249

250-
---
250+
---
251251

252252
1. Select **Next: Review and create** to review all the settings for your new analytics rule.
253253

0 commit comments

Comments
 (0)