Skip to content

Commit 02b8c63

Browse files
Merge branch 'main' into maccruz-cdadx
2 parents 85f77e8 + cd0c9e0 commit 02b8c63

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

defender-xdr/advanced-hunting-microsoft-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,12 @@ ms.topic: conceptual
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
26-
ms.date: 10/18/2024
26+
ms.date: 02/10/2025
2727
---
2828

2929
# Advanced hunting with Microsoft Sentinel data in Microsoft Defender portal
3030

31-
Advanced hunting allows you to view and query all the data sources available within the [unified Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal). The data sources might include Microsoft Defender XDR and various Microsoft security services. If you onboard Microsoft Sentinel to the Defender portal, access and use all your existing Microsoft Sentinel workspace content, including queries and functions.
31+
Advanced hunting allows you to view and query all the data sources available within the [unified Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal), which include Microsoft Defender XDR and various Microsoft security services. If you onboard Microsoft Sentinel to the Defender portal, you can also access and use all your existing Microsoft Sentinel workspace content, including queries and functions.
3232

3333
Querying from a single portal across different data sets makes hunting more efficient and removes the need for context-switching.
3434

defender-xdr/custom-detection-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- cx-ti
2020
- cx-ah
2121
ms.topic: how-to
22-
ms.date: 07/18/2024
22+
ms.date: 02/10/2025
2323
---
2424

2525
# Create and manage custom detections rules
@@ -132,7 +132,7 @@ With the query in the query editor, select **Create detection rule** and specify
132132

133133
#### Rule frequency
134134

135-
When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback duration based on the frequency you choose:
135+
When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback period based on the frequency you choose:
136136

137137
- **Every 24 hours** - Runs every 24 hours, checking data from the past 30 days.
138138
- **Every 12 hours** - Runs every 12 hours, checking data from the past 48 hours.
@@ -141,7 +141,7 @@ When you save a new rule, it runs and checks for matches from the past 30 days o
141141
- **Continuous (NRT)** - Runs continuously, checking data from events as they're collected and processed in near real-time (NRT), see [Continuous (NRT) frequency](custom-detection-rules.md#continuous-nrt-frequency).
142142

143143
> [!TIP]
144-
> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
144+
> Match the time filters in your query with the lookback period. Results outside of the lookback period are ignored.
145145
146146
When you edit a rule, it will run with the applied changes in the next run time scheduled according to the frequency you set. The rule frequency is based on the event timestamp and not the ingestion time.
147147

0 commit comments

Comments
 (0)