You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+14-3Lines changed: 14 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,17 +108,28 @@ For editable queries, more options are available:
108
108
109
109
## Create custom analytics and detection rules
110
110
111
-
To help discover threats and anomalous behaviors in your environment, you can create customized detection rules.
111
+
To help discover threats and anomalous behaviors in your environment, you can create customized detection rules. There are two kinds:
112
+
- Analytics rules - to generate detections from rules that query data that is ingested through Microsoft Sentinel
113
+
- Custom detection rules - to generate detections from rules that query data from Defender XDR or from both Microsoft Sentinel and Defender XDR
114
+
115
+
116
+
##### Analytics rules
112
117
113
118
For analytics rules that apply to data ingested through the connected Microsoft Sentinel workspace, select **Manage rules > Create analytics rule**.
114
119
115
120
:::image type="content" source="/defender/media/advanced-hunting-unified-rules.png" alt-text="Screenshot of the options to create custom analytics or detections in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-rules.png":::
116
121
117
122
The **Analytics rule wizard** appears. Fill up the required details as described in [Analytics rule wizard—General tab](/azure/sentinel/detect-threats-custom#analytics-rule-wizardgeneral-tab).
118
123
119
-
You can also create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
120
124
121
-
In custom detection rule creation, you can only query data ingested as analytics logs (that is, not as basic logs or auxiliary logs, see [log management plans](/azure/sentinel/log-plans#log-management-plans) to check the different tiers) otherwise the rule creation won't proceed.
125
+
##### Custom detection rules
126
+
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
127
+
128
+
129
+
In both custom detection and analytics rule creation, you can only query data ingested as analytics logs (that is, not as basic logs or auxiliary logs. See [log management plans](/azure/sentinel/log-plans#log-management-plans) to check the different tiers) otherwise the rule creation won't proceed.
122
130
123
131
If your Defender XDR data is ingested into Microsoft Sentinel, you have the option to choose between **Create custom detection** and **Create analytics rule**.
124
132
133
+
134
+
> [!NOTE]
135
+
> If a Defender XDR table is not set up to stream to log analytics in Microsoft Sentinel but is recognized as a standard table in Microsoft Sentinel, an analytics rule can be created successfully but the rule won't run correctly since no data is actually available in Microsoft Sentinel. For these cases, use the custom detection rule wizard instead.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-urlclickevents-table.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,6 +49,8 @@ For information on other tables in the advanced hunting schema, see [the advance
49
49
|`UrlChain`|`string`| For scenarios involving redirections, it includes URLs present in the redirection chain|
50
50
|`ReportId`|`string`| The unique identifier for a click event. For clickthrough scenarios, report ID would have same value, and therefore it should be used to correlate a click event.|
51
51
52
+
> [!NOTE]
53
+
> For clicks originating from email in Drafts and Sent items folders, email metadata is either not available or `NetworkMessageId` is assigned by default. In this case, `UrlClickEvents` can't be joined with `Email*` tables like `EmailEvents`, `EmailPostDeliveryEvents`, and others, using `NetworkMessageId`.
52
54
53
55
You can try this example query that uses the `UrlClickEvents` table to return a list of links where a user was allowed to proceed:
Copy file name to clipboardExpand all lines: exposure-management/initiatives-list.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,10 @@ The CIS Microsoft 365 Foundations Benchmark (v3.0.0) is a set of security assess
25
25
26
26
This initiative aims to reflect the status around cloud security coverage, ROI, health, configuration, and performance. It consists of measurements across multiple domains and disciplines to provide security managers with a high-level view into how posture is enforced in cloud ops.
27
27
28
+
> [!NOTE]
29
+
>
30
+
> The current Cloud initiative will be deprecated soon. A new Cloud initiative will be available soon. Please use it for updates and support.
31
+
28
32
## Critical Asset Protection
29
33
30
34
Critical asset protection refers to the strategies, processes, and technologies implemented to safeguard an organization's most valuable and important assets from various threats and risks. It involves identifying, prioritizing, and applying targeted security measures to ensure the resilience and integrity of these critical assets.
@@ -43,11 +47,11 @@ IoT devices are often connected to endpoints, to one another or to the internet,
43
47
44
48
## External Attack Surface Protection
45
49
46
-
The External Attack Surface Initiative in Microsoft Security Exposure Management uses Defender EASM to continuously discover and map your digital attack surface, providing an external view of your online infrastructure. This helps security and IT teams identify unknown assets, prioritize risks, eliminate threats, and extend control beyond the firewall.
50
+
The External Attack Surface Management (EASM) initiative in Microsoft Security Exposure Management uses Defender EASM to continuously discover and map your digital attack surface, providing an external view of your online infrastructure. This helps security and IT teams identify unknown assets, prioritize risks, eliminate threats, and extend control beyond the firewall.
47
51
48
52
> [!NOTE]
49
53
>
50
-
> This initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only.
54
+
> This initiative provides high-level insights without a full connection to the MDEASM subscription and supports prebuilt footprints only.
51
55
52
56
[Learn more here.](https://aka.ms/xspm/EasmLearnMore)
53
57
@@ -75,6 +79,9 @@ This initiative focuses on displaying the current state of SaaS (software as a s
75
79
76
80
This initiative serves as a central hub for security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track, and delegate vulnerabilities with in the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement. This collaborative environment ensures a holistic approach to vulnerability management, empowering stakeholders to proactively strengthen their security defenses, reduce the attack surface, and enhance overall resilience against evolving cyber threats.
77
81
82
+
> [!NOTE]
83
+
> The Vulnerability Assessment initiative will be deprecated soon, as it is now part of the new Cloud initiative. Use the new Cloud initiative for updates and support.
84
+
78
85
## Zero Trust (Foundational)
79
86
80
87
Zero Trust is a security strategy that follows three principles, verify explicitly, use least privilege access, and assume breach. This initiative follows Microsoft's Zero Trust adoption framework to help you identify next steps in your Zero Trust strategy. You can learn more about the Zero Trust adoption framework here.
0 commit comments