Skip to content

Commit ea4a0ce

Browse files
committed
more-articles-about-microsoft-sentinel-solutions
1 parent dd9a879 commit ea4a0ce

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/sentinel/sentinel-analytic-rules-creation.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ ms.date: 1/27/2025
1212

1313
# Create and publish analytics rules for Microsoft Sentinel solutions
1414

15-
Microsoft Sentinel analytics rules are sets of criteria that define how data should be monitored, what should be detected, and what actions should be taken when specific conditions are met. These rules help identify suspicious behavior, anomalies, and potential security threats by analyzing logs and signals from various data sources. Microsoft Sentinel analytics rules are a powerful tool for enhancing an organization's security posture because they proactively detect and respond to potential threats. By following a structured approach to creating and managing these rules, organizations can use Microsoft Sentinel's capabilities to protect their digital assets and maintain a robust security infrastructure. For more information, see [Threat detection in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/threat-detection)
15+
Microsoft Sentinel analytics rules are sets of criteria. They define how data should be monitored, what should be detected, and what actions should be taken when specific conditions are met. These rules help identify suspicious behavior, anomalies, and potential security threats by analyzing logs and signals from various data sources.
16+
17+
Microsoft Sentinel analytics rules are a powerful tool for enhancing an organization's security posture because they proactively detect and respond to potential threats. By following a structured approach to creating and managing these rules, organizations can use Microsoft Sentinel's capabilities to protect their digital assets and maintain a robust security infrastructure. For more information, see [Threat detection in Microsoft Sentinel | Microsoft Learn](/azure/sentinel/threat-detection)
1618

1719
This article walks you through the process of creating and publishing analytics rules to Microsoft Sentinel solutions.
1820

@@ -85,7 +87,7 @@ The `severity` attribute defines the severity level of the detection. Severity s
8587
* High: The identified activity provides the threat actor with wide-ranging access to conduct actions on the environment.
8688

8789
> [!NOTE]
88-
> Severity level defaults aren't a guarantee of current or environment impact level. Severity level applies only to Microsoft Sentinel analytics templates. Severity in the **Alerts** table is otherwise controlled by the security service from which the alert came from. You can use `alertDetailsOverride` to provide a dynamic severity that depends on the actual outcome of the query.
90+
> Severity level defaults aren't a guarantee of current or environment impact level. Severity level applies only to Microsoft Sentinel analytics templates. Severity in the **Alerts** table is otherwise controlled by the security service from which the alert came. You can use `alertDetailsOverride` to provide a dynamic severity that depends on the actual outcome of the query.
8991
9092
### Required data connectors
9193

@@ -129,7 +131,7 @@ This field is mandatory for scheduled analytics rules.
129131

130132
The `triggerThreshold` attribute represents the threshold that triggers the alert. Threshold is the value that the `triggerOperator` references. Supported values include any integer between 0 and 10,000.
131133

132-
For example, if the `triggerOperator` is set to `gt` and the `triggerThreshold` is `1`, the alert will trigger when a value is greater than 1.
134+
For example, if the `triggerOperator` is set to `gt` and the `triggerThreshold` is `1`, the alert triggers when a value is greater than 1.
133135

134136
This field is mandatory for scheduled analytics rules.
135137

0 commit comments

Comments
 (0)