You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/summary-rules.md
+16-28Lines changed: 16 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,7 +134,7 @@ This section reviews common scenarios for creating summary rules in Microsoft Se
134
134
135
135
```kusto
136
136
let csl_columnmatch=(column_name: string) {
137
-
CommonSecurityLog
137
+
summarized_CommonSecurityLog
138
138
| where isnotempty(column_name)
139
139
| extend
140
140
Date = format_datetime(TimeGenerated, "yyyy-MM-dd"),
@@ -167,36 +167,24 @@ Most of the data sources are raw logs that are noisy and have high volume, but h
167
167
168
168
**Solution**: We recommend using summary rules to do the following:
169
169
170
-
1. Summarize McAfee firewall logs every 10 minutes, updating the data in the same custom table with each run. [ASIM functions](normalization-functions.md) might be helpful in the summary query when interacting with your McAfee logs.
170
+
1. **Create a summary rule**:
171
171
172
-
1. Create an analytics rule to trigger an alert for anytime a domain name in the summary data matches an entry on the threat intelligence list. For example:
172
+
1. Extend your query to extract key fields, such as the source address, destination address, and destination port from CommonSecurityLog_CL, which is the *CommonSecurityLog* table with the Auxilairy plan.
1. Perform an inner lookup against your active Threat Intelligence Indicators to identify any matches with the source address. This allows you to cross-reference your data with known threats.
175
+
176
+
1. Project relevant information, including the time generated, activity type, and any malicious source IPs, along with the destination details. Set the frequency you want the query to run, and the destination table for the `MaliciousIPDetection’ example. The results in this table are in the analytic tier and charged accordingly.
177
+
178
+
1. **Create an alert**. Create an analytics rule in Microsoft Sentinel that alerts based on results from the `MaliciousIPDetection` table. This step is crucial for proactive threat detection and incident response.
## Use summary rules with auxiliary logs (sample process)
201
189
202
190
This procedure describes a sample process for using summary rules with [auxiliary logs](basic-logs-use-cases.md), using a custom connection created via an ARM template to ingest CEF data from Logstash.
0 commit comments