Skip to content

Commit d0fa208

Browse files
author
Jill Grant
authored
Update detect-threats-custom.md
Reverted bullets
1 parent a14d229 commit d0fa208

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/sentinel/detect-threats-custom.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,15 @@ Analytics rules search for specific events or sets of events across your environ
3333

3434
### Analytics rule wizard—General tab
3535

36-
1. Provide a unique **Name** and a **Description**.
36+
- Provide a unique **Name** and a **Description**.
3737

38-
1. In the **Tactics and techniques** field, you can choose from among categories of attacks by which to classify the rule. These are based on the tactics and techniques of the [MITRE ATT&CK](https://attack.mitre.org/) framework.
38+
- In the **Tactics and techniques** field, you can choose from among categories of attacks by which to classify the rule. These are based on the tactics and techniques of the [MITRE ATT&CK](https://attack.mitre.org/) framework.
3939

4040
[Incidents](investigate-cases.md) created from alerts that are detected by rules mapped to MITRE ATT&CK tactics and techniques automatically inherit the rule's mapping.
4141

42-
1. Set the alert **Severity** as appropriate.
42+
- Set the alert **Severity** as appropriate.
4343

44-
1. When you create the rule, its **Status** is **Enabled** by default, which means it will run immediately after you finish creating it. If you don’t want it to run immediately, select **Disabled**, and the rule will be added to your **Active rules** tab and you can enable it from there when you need it.
44+
- When you create the rule, its **Status** is **Enabled** by default, which means it will run immediately after you finish creating it. If you don’t want it to run immediately, select **Disabled**, and the rule will be added to your **Active rules** tab and you can enable it from there when you need it.
4545

4646
:::image type="content" source="media/tutorial-detect-threats-custom/general-tab.png" alt-text="Start creating a custom analytics rule":::
4747

@@ -106,7 +106,7 @@ In the **Set rule logic** tab, you can either write a query directly in the **Ru
106106
107107
### Query scheduling and alert threshold
108108
109-
1. In the **Query scheduling** section, set the following parameters:
109+
- In the **Query scheduling** section, set the following parameters:
110110
111111
:::image type="content" source="media/tutorial-detect-threats-custom/set-rule-logic-tab-2.png" alt-text="Set query schedule and event grouping" lightbox="media/tutorial-detect-threats-custom/set-rule-logic-tab-all-2-new.png":::
112112

0 commit comments

Comments
 (0)