You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sentinel-analytic-rules-creation.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,9 @@ ms.date: 1/27/2025
12
12
13
13
# Create and publish analytics rules for Microsoft Sentinel solutions
14
14
15
-
Microsoft Sentinel analytics rules are sets of criteria that define how data should be monitored, what should be detected, and what actions should be taken when specific conditions are met. These rules help identify suspicious behavior, anomalies, and potential security threats by analyzing logs and signals from various data sources. Microsoft Sentinel analytics rules are a powerful tool for enhancing an organization's security posture because they proactively detect and respond to potential threats. By following a structured approach to creating and managing these rules, organizations can use Microsoft Sentinel's capabilities to protect their digital assets and maintain a robust security infrastructure. For more information, see [Threat detection in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/threat-detection)
15
+
Microsoft Sentinel analytics rules are sets of criteria. They define how data should be monitored, what should be detected, and what actions should be taken when specific conditions are met. These rules help identify suspicious behavior, anomalies, and potential security threats by analyzing logs and signals from various data sources.
16
+
17
+
Microsoft Sentinel analytics rules are a powerful tool for enhancing an organization's security posture because they proactively detect and respond to potential threats. By following a structured approach to creating and managing these rules, organizations can use Microsoft Sentinel's capabilities to protect their digital assets and maintain a robust security infrastructure. For more information, see [Threat detection in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/threat-detection)
16
18
17
19
This article walks you through the process of creating and publishing analytics rules to Microsoft Sentinel solutions.
18
20
@@ -85,7 +87,7 @@ The `severity` attribute defines the severity level of the detection. Severity s
85
87
* High: The identified activity provides the threat actor with wide-ranging access to conduct actions on the environment.
86
88
87
89
> [!NOTE]
88
-
> Severity level defaults aren't a guarantee of current or environment impact level. Severity level applies only to Microsoft Sentinel analytics templates. Severity in the **Alerts** table is otherwise controlled by the security service from which the alert came from. You can use `alertDetailsOverride` to provide a dynamic severity that depends on the actual outcome of the query.
90
+
> Severity level defaults aren't a guarantee of current or environment impact level. Severity level applies only to Microsoft Sentinel analytics templates. Severity in the **Alerts** table is otherwise controlled by the security service from which the alert came. You can use `alertDetailsOverride` to provide a dynamic severity that depends on the actual outcome of the query.
89
91
90
92
### Required data connectors
91
93
@@ -129,7 +131,7 @@ This field is mandatory for scheduled analytics rules.
129
131
130
132
The `triggerThreshold` attribute represents the threshold that triggers the alert. Threshold is the value that the `triggerOperator` references. Supported values include any integer between 0 and 10,000.
131
133
132
-
For example, if the `triggerOperator` is set to `gt` and the `triggerThreshold` is `1`, the alert will trigger when a value is greater than 1.
134
+
For example, if the `triggerOperator` is set to `gt` and the `triggerThreshold` is `1`, the alert triggers when a value is greater than 1.
133
135
134
136
This field is mandatory for scheduled analytics rules.
0 commit comments