Skip to content

Commit fdbc7f5

Browse files
authored
Replaced "SOC-ML" language with "customizable anomalies"
------- cc: @yelevin
1 parent 1baed30 commit fdbc7f5

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/sentinel/work-with-anomaly-rules.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ ms.custom: ignite-fall-2021
1616
>
1717
> - Anomaly rules are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1818
19-
## View SOC-ML anomaly rule templates
19+
## View customizable anomaly rule templates
2020

21-
Microsoft Sentinel’s [SOC-ML anomalies feature](soc-ml-anomalies.md) provides [built-in anomaly templates](detect-threats-built-in.md#anomaly) for immediate value out-of-the-box. These anomaly templates were developed to be robust by using thousands of data sources and millions of events, but this feature also enables you to change thresholds and parameters for the anomalies easily within the user interface. Anomaly rules must be activated before they will generate anomalies, which you can find in the **Anomalies** table in the **Logs** section.
21+
Microsoft Sentinel’s [customizable anomalies feature](soc-ml-anomalies.md) provides [built-in anomaly templates](detect-threats-built-in.md#anomaly) for immediate value out-of-the-box. These anomaly templates were developed to be robust by using thousands of data sources and millions of events, but this feature also enables you to change thresholds and parameters for the anomalies easily within the user interface. Anomaly rules must be activated before they will generate anomalies, which you can find in the **Anomalies** table in the **Logs** section.
2222

2323
1. From the Microsoft Sentinel navigation menu, select **Analytics**.
2424

@@ -34,7 +34,7 @@ Microsoft Sentinel’s [SOC-ML anomalies feature](soc-ml-anomalies.md) provides
3434

3535
## Activate anomaly rules
3636

37-
When you click on one of the rule templates, you will see the following information in the details pane, along with a **Create rule** button:
37+
When you select one of the rule templates, you will see the following information in the details pane, along with a **Create rule** button:
3838

3939
- **Description** explains how the anomaly works and the data it requires.
4040

@@ -135,7 +135,7 @@ This is by design, to give you the opportunity to compare the results generated
135135
136136
## Next steps
137137
138-
In this document, you learned how to work with SOC-ML anomaly detection analytics rules in Microsoft Sentinel.
138+
In this document, you learned how to work with customizable anomaly detection analytics rules in Microsoft Sentinel.
139139
140-
- Get some background information about [SOC-ML](soc-ml-anomalies.md).
140+
- Get some background information about [customizable anomalies](soc-ml-anomalies.md).
141141
- Explore other [analytics rule types](detect-threats-built-in.md).

0 commit comments

Comments
 (0)