Skip to content

Commit f1d0190

Browse files
yoninalmsftbatamig
andauthored
Update articles/sentinel/iot-advanced-threat-monitoring.md
Co-authored-by: Batami Gold <[email protected]>
1 parent 9cabe33 commit f1d0190

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/sentinel/iot-advanced-threat-monitoring.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,10 @@ The following table describes the out-of-the-box analytics rules provided in the
7878
| **Unauthorized remote access to the network** | Unauthorized remote access to the network can compromise the target device. <br><br> This means that if another device on the network is compromised, the target devices can be accessed remotely, increasing the attack surface. |
7979
| **No traffic on Sensor Detected** | A sensor that no longer detects network traffic indicates that the system may be insecure. |
8080

81-
### Alternate options for triggering incidents from Defender for IoT data
81+
> [!TIP]
82+
> You can also manually create and manage analytics rules in the Microsoft Sentinel **Analytics > Active rules** page. For example, you might use this option to use the out-of-the box analytics rules as templates for customized rules, or to configure analytics rules for scenarios not yet covered by the solution.
83+
>
84+
> For more information, see [Detect threats out-of-the-box](detect-threats-built-in.md).
8285

8386
The following alternative options are available for you to ensure that incidents are triggered for Defender for IoT data in Microsoft Sentinel:
8487

0 commit comments

Comments
 (0)