Skip to content

Commit 0c4361e

Browse files
committed
Updates for now
1 parent 7182a24 commit 0c4361e

File tree

3 files changed

+100
-51
lines changed

3 files changed

+100
-51
lines changed

defender-xdr/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -322,8 +322,10 @@
322322
items:
323323
- name: Custom detections overview
324324
href: custom-detections-overview.md
325-
- name: Create & manage detection rules
325+
- name: Create detection rules
326326
href: custom-detection-rules.md
327+
- name: Manage detection rules
328+
href: custom-detection-manage.md
327329
- name: Take action on query results
328330
href: advanced-hunting-take-action.md
329331
- name: Link query results to an incident
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
---
2+
title: Manage custom detection rules in Microsoft Defender XDR
3+
description: Learn how to manage custom detections rules based on advanced hunting queries.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: maccruz
10+
author: schmurky
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- m365initiative-m365-defender
17+
- tier2
18+
ms.custom:
19+
- cx-ti
20+
- cx-ah
21+
appliesto:
22+
- Microsoft Defender XDR
23+
- Microsoft Sentinel in the Microsoft Defender portal
24+
ms.topic: how-to
25+
ms.date: 05/02/2025
26+
---
27+
28+
## Manage existing custom detection rules
29+
30+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
31+
32+
33+
34+
35+
36+
You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
37+
38+
> [!TIP]
39+
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
40+
41+
### View existing rules
42+
43+
To view all existing custom detection rules, navigate to **Hunting** > **Custom detection rules**. The page lists all the rules with the following run information:
44+
45+
- **Last run** - When a rule was last run to check for query matches and generate alerts
46+
- **Last run status** - Whether a rule ran successfully
47+
- **Next run** - The next scheduled run
48+
- **Status** - Whether a rule has been turned on or off
49+
50+
### View rule details, modify rule, and run rule
51+
52+
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
53+
54+
:::image type="content" source="/defender/media/custom-detect-rules-view.png" alt-text="Screenshot of the Custom detection rule details page in the Microsoft Defender portal." lightbox="/defender/media/custom-detect-rules-view.png":::
55+
56+
You can also take the following actions on the rule from this page:
57+
58+
- **Run** - Run the rule immediately. This also resets the interval for the next run.
59+
- **Edit** - Modify the rule without changing the query.
60+
- **Modify query** - Edit the query in advanced hunting.
61+
- **Turn on** / **Turn off** - Enable the rule or stop it from running.
62+
- **Delete** - Turn off the rule and remove it.
63+
64+
### View and manage triggered alerts
65+
66+
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
67+
68+
- Manage the alert by setting its status and classification (true or false alert)
69+
- Link the alert to an incident
70+
- Run the query that triggered the alert on advanced hunting
71+
72+
### Review actions
73+
74+
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
75+
76+
> [!TIP]
77+
> To quickly view information and take action on an item in a table, use the selection column [✓] at the left of the table.
78+
79+
> [!NOTE]
80+
> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
81+
82+
## See also
83+
84+
- [Custom detections overview](custom-detections-overview.md)
85+
- [Advanced hunting overview](advanced-hunting-overview.md)
86+
- [Learn the advanced hunting query language](advanced-hunting-query-language.md)
87+
- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)
88+
- [Microsoft Graph security API for custom detections](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)
89+
90+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/custom-detection-rules.md

Lines changed: 7 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create and manage custom detection rules in Microsoft Defender XDR
3-
description: Learn how to create and manage custom detections rules based on advanced hunting queries.
2+
title: Create custom detection rules in Microsoft Defender XDR
3+
description: Learn how to create custom detections rules based on advanced hunting queries.
44
search.appverid: met150
55
ms.service: defender-xdr
66
ms.subservice: adv-hunting
@@ -22,10 +22,10 @@ appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
2424
ms.topic: how-to
25-
ms.date: 02/10/2025
25+
ms.date: 05/02/2025
2626
---
2727

28-
# Create and manage custom detections rules
28+
# Create custom detection rules
2929

3030
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3131

@@ -132,6 +132,8 @@ With the query in the query editor, select **Create detection rule** and specify
132132
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
133133
- **Recommended actions** - Additional actions that responders might take in response to an alert.
134134

135+
#### Dynamic
136+
135137
#### Rule frequency
136138

137139
When you save a new rule, it runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals, applying a lookback period based on the frequency you choose:
@@ -271,57 +273,12 @@ After reviewing the rule, select **Create** to save it. The custom detection rul
271273
>
272274
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
273275
274-
## Manage existing custom detection rules
275-
276-
You can view the list of existing custom detection rules, check their previous runs, and review the alerts that were triggered. You can also run a rule on demand and modify it.
277-
278-
> [!TIP]
279-
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
280-
281-
### View existing rules
282-
283-
To view all existing custom detection rules, navigate to **Hunting** > **Custom detection rules**. The page lists all the rules with the following run information:
284-
285-
- **Last run** - When a rule was last run to check for query matches and generate alerts
286-
- **Last run status** - Whether a rule ran successfully
287-
- **Next run** - The next scheduled run
288-
- **Status** - Whether a rule has been turned on or off
289-
290-
### View rule details, modify rule, and run rule
291-
292-
To view comprehensive information about a custom detection rule, go to **Hunting** > **Custom detection rules** and then select the name of rule. You can then view general information about the rule, including information, its run status, and scope. The page also provides the list of triggered alerts and actions.
293-
294-
:::image type="content" source="/defender/media/custom-detect-rules-view.png" alt-text="Screenshot of the Custom detection rule details page in the Microsoft Defender portal." lightbox="/defender/media/custom-detect-rules-view.png":::
295276

296-
You can also take the following actions on the rule from this page:
297-
298-
- **Run** - Run the rule immediately. This also resets the interval for the next run.
299-
- **Edit** - Modify the rule without changing the query.
300-
- **Modify query** - Edit the query in advanced hunting.
301-
- **Turn on** / **Turn off** - Enable the rule or stop it from running.
302-
- **Delete** - Turn off the rule and remove it.
303-
304-
### View and manage triggered alerts
305-
306-
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
307-
308-
- Manage the alert by setting its status and classification (true or false alert)
309-
- Link the alert to an incident
310-
- Run the query that triggered the alert on advanced hunting
311-
312-
### Review actions
313-
314-
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
315-
316-
> [!TIP]
317-
> To quickly view information and take action on an item in a table, use the selection column [✓] at the left of the table.
318-
319-
> [!NOTE]
320-
> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
321277

322278
## See also
323279

324280
- [Custom detections overview](custom-detections-overview.md)
281+
- [Manage custom detections](custom-detection-manage.md)
325282
- [Advanced hunting overview](advanced-hunting-overview.md)
326283
- [Learn the advanced hunting query language](advanced-hunting-query-language.md)
327284
- [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md)

0 commit comments

Comments
 (0)