Skip to content

Commit cd084c6

Browse files
authored
Update articles/sentinel/summary-rules.md
1 parent 73a4433 commit cd084c6

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/sentinel/summary-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ The current detection also runs a summary query on a separate logic app for each
213213
214214
Generate alerts on threat intelligence matches against noisy, high volume, and low-security value network data.
215215
216-
**Scenario**: You need to build an analytics rule for firewall logs to match domain names in the system that have been visted against a threat intelligence domain name list.
216+
**Scenario**: You need to build an analytics rule for firewall logs to match domain names in the system that have been visited against a threat intelligence domain name list.
217217
218218
Most of the data sources are raw logs that are noisy and have high volume, but have lower security value, including IP addresses, Azure Firewall traffic, Fortigate traffic, and so on. There's a total volume of about 1 TB per day.
219219

0 commit comments

Comments
 (0)