Skip to content

Commit f6ced9d

Browse files
yoninalmsftbatamig
andauthored
Update articles/sentinel/iot-advanced-threat-monitoring.md
Co-authored-by: Batami Gold <[email protected]>
1 parent 63b90de commit f6ced9d

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/sentinel/iot-advanced-threat-monitoring.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,6 @@ The following table describes the out-of-the-box analytics rules provided in the
8484
> For more information, see [Detect threats out-of-the-box](detect-threats-built-in.md).
8585

8686

87-
- Manually create and manage analytics rules in the Microsoft Sentinel **Analytics > Active rules** page. For example, you might use this option to use the out-of-the box analytics rules as templates for customized rules, or to configure analytics rules for scenarios not yet covered by the solution. For more information, see [Detect threats out-of-the-box](detect-threats-built-in.md).
8887

8988
- Configure the **Defender for IoT** data connector to automatically create incidents for *all* alerts generated by Defender for IoT. In the **Instructions** tab of the data connector page, scroll down to the **Create incidents** section and select **Enable**.
9089

0 commit comments

Comments
 (0)