Skip to content

Commit e4e50af

Browse files
update screenshot for new data sources
1 parent 0a128c5 commit e4e50af

File tree

3 files changed

+2
-0
lines changed

3 files changed

+2
-0
lines changed
32.1 KB
Loading
Binary file not shown.

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ One or more of the following data sources must be connected:
2626
- Office activity logs
2727
- Azure activity logs
2828

29+
:::image type="content" source="media/use-matching-analytics-to-detect-threats/data-sources.png" alt-text="A screenshot showing the Microsoft Defender Threat Intelligence Analytics rule data source connections.":::
30+
2931
## Configure the matching analytics rule
3032

3133
Matching analytics is configured when you enable the **Microsoft Defender Threat Intelligence Analytics** rule.

0 commit comments

Comments
 (0)