Skip to content

Commit d90fa85

Browse files
committed
Fixes
1 parent ce393c3 commit d90fa85

File tree

1 file changed

+22
-6
lines changed

1 file changed

+22
-6
lines changed

articles/sentinel/tutorial-log4j-detection.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,23 @@ To complete this tutorial, make sure you have:
3232

3333
- An Azure user with the [**Microsoft Sentinel Contributor**](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role assigned on the Log Analytics workspace where Microsoft Sentinel is deployed.
3434

35-
- XYZ data connectors connected (and being used)
36-
37-
When using analytics rules to detect threats from Microsoft Sentinel, make sure that you enable all rules associated with your connected data sources in order to ensure full security coverage for your environment. The most efficient way to enable analytics rules is directly from the data connector page, which lists any related rules. For more information, see [Connect data sources](connect-data-sources.md).
35+
- The following data sources are referenced in this rule. The more of these you have deployed connectors for, the more effective the rule will be. You must have at least one.
36+
37+
| Data source | Log Analytics tables referenced |
38+
| ---- | ---- |
39+
| **Office 365** | OfficeActivity (SharePoint)<br>OfficeActivity (Exchange)<br>OfficeActivity (Teams) |
40+
| **DNS** | DnsEvents |
41+
| **Azure Monitor** (VM Insights) | VMConnection |
42+
| **Cisco ASA** | CommonSecurityLog (Cisco) |
43+
| **Palo Alto Networks (Firewall)** | CommonSecurityLog (PaloAlto) |
44+
| **Security Events** | SecurityEvents |
45+
| **Azure Active Directory** | SigninLogs<br>AADNonInteractiveUserSignInLogs |
46+
| **Azure Monitor (WireData)** | WireData |
47+
| **Azure Monitor (IIS)** | W3CIISLog |
48+
| **Azure Activity** | AzureActivity |
49+
| **Amazon Web Services** | AWSCloudTrail |
50+
| **Microsoft 365 Defender** | DeviceNetworkEvents |
51+
| **Azure Firewall** | AzureDiagnostics (Azure Firewall) |
3852

3953
## Sign in to the Azure portal and Microsoft Sentinel
4054

@@ -46,7 +60,7 @@ To complete this tutorial, make sure you have:
4660

4761
1. On the **Microsoft Sentinel | Overview** page, select **Analytics** from the navigation menu, under **Configuration**.
4862

49-
## Create a Scheduled analytics rule from a template
63+
## Create a scheduled analytics rule from a template
5064

5165
1. From the **Analytics** page, select the **Rule templates** tab.
5266

@@ -68,7 +82,9 @@ To complete this tutorial, make sure you have:
6882

6983
## Review rule query logic and configuration of settings
7084

71-
In the **Set rule logic** tab, review the query as it appears under the **Rule query** heading. To see more of the query text at one time, select the diagonal double-arrow icon at the upper right corner of the query window to expand the window to a larger size.
85+
- In the **Set rule logic** tab, review the query as it appears under the **Rule query** heading.
86+
87+
To see more of the query text at one time, select the diagonal double-arrow icon at the upper right corner of the query window to expand the window to a larger size.
7288

7389
:::image type="content" source="media/tutorial-log4j-detection/set-rule-logic-tab.png" alt-text="Screenshot of the Set rule logic tab of the Analytics rule wizard." lightbox="media/tutorial-log4j-detection/set-rule-logic-tab.png":::
7490

@@ -182,7 +198,7 @@ If you're not going to continue to use this analytics rule, delete (or at least
182198

183199
Now that you've learned how to search for exploits of a common vulnerability using analytics rules, learn more about what you can do with analytics in Microsoft Sentinel:
184200

185-
- Learn about the full range of settings and configurations in [Scheduled analytics rules](detect-threats-custom.md).
201+
- Learn about the full range of settings and configurations in [scheduled analytics rules](detect-threats-custom.md).
186202
- In particular, learn more about the different types of alert enrichment you saw here:
187203
- [Entity mapping](map-data-fields-to-entities.md)
188204
- [Custom details](surface-custom-details-in-alerts.md)

0 commit comments

Comments
 (0)