You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/tutorial-log4j-detection.md
+22-6Lines changed: 22 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,9 +32,23 @@ To complete this tutorial, make sure you have:
32
32
33
33
- An Azure user with the [**Microsoft Sentinel Contributor**](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role assigned on the Log Analytics workspace where Microsoft Sentinel is deployed.
34
34
35
-
- XYZ data connectors connected (and being used)
36
-
37
-
When using analytics rules to detect threats from Microsoft Sentinel, make sure that you enable all rules associated with your connected data sources in order to ensure full security coverage for your environment. The most efficient way to enable analytics rules is directly from the data connector page, which lists any related rules. For more information, see [Connect data sources](connect-data-sources.md).
35
+
- The following data sources are referenced in this rule. The more of these you have deployed connectors for, the more effective the rule will be. You must have at least one.
## Sign in to the Azure portal and Microsoft Sentinel
40
54
@@ -46,7 +60,7 @@ To complete this tutorial, make sure you have:
46
60
47
61
1. On the **Microsoft Sentinel | Overview** page, select **Analytics** from the navigation menu, under **Configuration**.
48
62
49
-
## Create a Scheduled analytics rule from a template
63
+
## Create a scheduled analytics rule from a template
50
64
51
65
1. From the **Analytics** page, select the **Rule templates** tab.
52
66
@@ -68,7 +82,9 @@ To complete this tutorial, make sure you have:
68
82
69
83
## Review rule query logic and configuration of settings
70
84
71
-
In the **Set rule logic** tab, review the query as it appears under the **Rule query** heading. To see more of the query text at one time, select the diagonal double-arrow icon at the upper right corner of the query window to expand the window to a larger size.
85
+
- In the **Set rule logic** tab, review the query as it appears under the **Rule query** heading.
86
+
87
+
To see more of the query text at one time, select the diagonal double-arrow icon at the upper right corner of the query window to expand the window to a larger size.
72
88
73
89
:::image type="content" source="media/tutorial-log4j-detection/set-rule-logic-tab.png" alt-text="Screenshot of the Set rule logic tab of the Analytics rule wizard." lightbox="media/tutorial-log4j-detection/set-rule-logic-tab.png":::
74
90
@@ -182,7 +198,7 @@ If you're not going to continue to use this analytics rule, delete (or at least
182
198
183
199
Now that you've learned how to search for exploits of a common vulnerability using analytics rules, learn more about what you can do with analytics in Microsoft Sentinel:
184
200
185
-
- Learn about the full range of settings and configurations in [Scheduled analytics rules](detect-threats-custom.md).
201
+
- Learn about the full range of settings and configurations in [scheduled analytics rules](detect-threats-custom.md).
186
202
- In particular, learn more about the different types of alert enrichment you saw here:
0 commit comments