Skip to content

Commit f08438b

Browse files
update config screenshot
1 parent 2501623 commit f08438b

File tree

2 files changed

+3
-1
lines changed

2 files changed

+3
-1
lines changed
37.3 KB
Loading

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ Take advantage of threat intelligence produced by Microsoft to generate high-fid
2525
You must install one or more of the supported data connectors to produce high-fidelity alerts and incidents. A premium Microsoft Defender Threat Intelligence license isn't required. Install the appropriate solutions from the **Content hub** to connect these data sources:
2626

2727
- Common Event Format (CEF) via Legacy Agent
28+
- Windows DNS via Legacy Agent (Preview)
2829
- Syslog via Legacy Agent
2930
- Microsoft 365 (formerly, Office 365)
3031
- Azure activity logs
@@ -41,7 +42,7 @@ You must install one or more of the supported data connectors to produce high-fi
4142
|[Windows Server DNS](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-dns?tab=Overview) |[DNS connector for Microsoft Sentinel](data-connectors/dns.md) |
4243
|[Syslog solution for Sentinel](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-syslog?tab=Overview) |[Syslog connector for Microsoft Sentinel](data-connectors/syslog.md) |
4344
|[Microsoft 365 solution for Sentinel](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-office365?tab=Overview) | [Office 365 connector for Microsoft Sentinel](data-connectors/office-365.md) |
44-
|[Azure Activity solution for Sentinel](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-azureactivity?tab=Overview) | [Azure Activity connector for Microsoft Sentinel](data-connectors/azure-activity.md) |
45+
|[Azure Activity solution for Sentinel](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-azureactivity?tab=Overview) | [Azure Activity connector for Microsoft Sentinel](data-connectors/azure-activity.md) |
4546

4647
## Configure the matching analytics rule
4748

@@ -66,6 +67,7 @@ Matching analytics is configured when you enable the **Microsoft Defender Threat
6667
Microsoft Defender Threat Intelligence Analytics matches your logs with domain, IP, and URL indicators in the following ways:
6768

6869
- **CEF logs** ingested into the Log Analytics `CommonSecurityLog` table match URL and domain indicators if populated in the `RequestURL` field, and IPv4 indicators in the `DestinationIP` field.
70+
- **Windows DNS logs**, where `SubType == "LookupQuery"` ingested into the `DnsEvents` table matches domain indicators populated in the `Name` field, and IPv4 indicators in the `IPAddresses` field.
6971
- **Syslog events**, where `Facility == "cron"` ingested into the `Syslog` table matches domain and IPv4 indicators directly from the `SyslogMessage` field.
7072
- **Office activity logs** ingested into the `OfficeActivity` table match IPv4 indicators directly from the `ClientIP` field.
7173
- **Azure activity logs** ingested into the `AzureActivity` table match IPv4 indicators directly from the `CallerIpAddress` field.

0 commit comments

Comments
 (0)