You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-errors.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.collection:
17
17
ms.custom:
18
18
- cx-ti
19
19
ms.topic: error-reference
20
-
ms.date: 04/22/2024
20
+
ms.date: 10/29/2024
21
21
---
22
22
23
23
# Handle advanced hunting errors
@@ -36,8 +36,8 @@ Advanced hunting displays errors to notify for syntax mistakes and whenever quer
36
36
| Syntax errors | The query contains unrecognized names, including references to nonexistent operators, columns, functions, or tables. | Ensure references to [Kusto operators and functions](/azure/data-explorer/kusto/query/) are correct. Check [the schema](advanced-hunting-schema-tables.md) for the correct advanced hunting columns, functions, and tables. Enclose variable strings in quotes so they are recognized. While writing your queries, use the autocomplete suggestions from IntelliSense. |`A recognition error occurred.`|
37
37
| Semantic errors | While the query uses valid operator, column, function, or table names, there are errors in its structure and resulting logic. In some cases, advanced hunting identifies the specific operator that caused the error. | Check for errors in the structure of query. Refer to [Kusto documentation](/azure/data-explorer/kusto/query/) for guidance. While writing your queries, use the autocomplete suggestions from IntelliSense. |`'project' operator: Failed to resolve scalar expression named 'x'`|
38
38
| Timeouts | A query can only run within a [limited period before timing out](advanced-hunting-limits.md). This error can happen more frequently when running complex queries. |[Optimize the query](advanced-hunting-best-practices.md)|`Query exceeded the timeout period.`|
39
-
| CPU throttling | Queries in the same tenant have exceeded the [CPU resources](advanced-hunting-limits.md) that have been allocated based on tenant size. | The service checks CPU resource usage every 15 minutes and daily and displays warnings after usage exceeds 10% of the allocated quota. If you reach 100% utilization, the service blocks queries until after the next daily or 15-minute cycle. [Optimize your queries to avoid hitting CPU quotas](advanced-hunting-best-practices.md)|- `This query used X% of your organization's allocated resources for the current 15 minutes.`<br>- `You have exceeded processing resources allocated to this tenant. You can run queries again in <duration>.`|
40
-
| Result size limit exceeded | The aggregate size of the result set for the query has exceeded the maximum size. This error can occur if the result set is so large that truncation at the 10,000-record limit can't reduce it to an acceptable size. Results that have multiple columns with sizable content are more likely to be impacted by this error. |[Optimize the query](advanced-hunting-best-practices.md)|`Result size limit exceeded. Use "summarize" to aggregate results, "project" to drop uninteresting columns, or "take" to truncate results.`|
39
+
| CPU throttling | Queries in the same tenant have exceeded the [CPU resources](advanced-hunting-limits.md) that have been allocated based on tenant size. | The service checks CPU resource usage every 15 minutes and daily and displays warnings after usage exceeds 10% of the allocated quota. If you reach 100% utilization, the service blocks queries until after the next daily or 15-minute cycle. [Optimize your queries to avoid hitting CPU quotas](advanced-hunting-best-practices.md)|`You have exceeded processing resources allocated to this tenant. You can run queries again in <duration>.`|
40
+
| Result size limit exceeded | The aggregate size of the result set for the query has exceeded the maximum size. This error can occur if the result set is so large that truncation at the 30,000-record limit can't reduce it to an acceptable size. Results that have multiple columns with sizable content are more likely to be impacted by this error. |[Optimize the query](advanced-hunting-best-practices.md)|`Result size limit exceeded. Use "summarize" to aggregate results, "project" to drop uninteresting columns, or "take" to truncate results.`|
41
41
| Excessive resource consumption | The query has consumed excessive amounts of resources and has been stopped from completing. In some cases, advanced hunting identifies the specific operator that wasn't optimized. |[Optimize the query](advanced-hunting-best-practices.md)| -`Query stopped due to excessive resource consumption.`<br>-`Query stopped. Adjust use of the <operator name> operator to avoid excessive resource consumption.`|
42
42
| Unknown errors | The query failed because of an unknown reason. | Try running the query again. Contact Microsoft through the portal if queries continue to return unknown errors. | `An unexpected error occurred during query execution. Please try again in a few minutes.`
|Data range | 30 days | Every query | Each query can look up data from up to the past 30 days.|
38
+
|Date range | 30 days for Defender XDR data unless streamed through Microsoft Sentinel | Every query | Each query can look up Defender XDR data from up to the past 30 days, or longer if streamed through Microsoft Sentinel |
39
39
| Result set | 30,000 rows | Every query | Each query can return up to 30,000 records. |
40
40
| Timeout | 10 minutes | Every query | Each query can run for up to 10 minutes. If it doesn't complete within 10 minutes, the service displays an error.
41
-
| CPU resources | Based on tenant size | Every 15 minutes | The [portal displays an error](advanced-hunting-errors.md) whenever a query runs and the tenant consumes over 10% of allocated resources. Queries are blocked if the tenant reaches 100% until after the next 15-minute cycle. |
41
+
| CPU resources | Based on tenant size | Every 15 minutes | The portal displays a warning whenever a query runs and the tenant consumes over 10% of allocated resources. [Queries are blocked](advanced-hunting-errors.md) if the tenant reaches 100% until after the next 15-minute cycle. |
42
42
43
43
> [!NOTE]
44
44
> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)
Copy file name to clipboardExpand all lines: defender-xdr/create-custom-rbac-roles.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier3
13
13
ms.custom:
14
14
ms.topic: how-to
15
-
ms.date: 09/30/2024
15
+
ms.date: 10/31/2024
16
16
ms.reviewer:
17
17
search.appverid: met150
18
18
---
@@ -40,7 +40,7 @@ The following steps guide you on how to create custom roles in Microsoft Defende
40
40
41
41
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
42
42
43
-
2. In the navigation pane, select **Permissions**.
43
+
2. In the navigation pane, go to **System > Permissions**.
44
44
45
45
3. Select **Roles** under Microsoft Defender XDR to get to the Permissions and roles page.
46
46
@@ -69,7 +69,7 @@ The following steps guide you on how to create custom roles in Microsoft Defende
69
69
70
70
8. Once you have selected your permissions, select **Apply** and then **Next** to assign users and data sources.
71
71
72
-
9. Select **Add assignments** and Enter the Assignment name.
72
+
9. Select **Add assignments** and add the Assignment name.
73
73
74
74
10. Under **data sources**, choose if the assigned users will have the selected permissions across all the available products, or only for specific data sources:
75
75
@@ -78,7 +78,7 @@ The following steps guide you on how to create custom roles in Microsoft Defende
78
78
If a user selects all read-only permissions for a single data source, for example, Microsoft Defender for Endpoint, they will not be able to read alerts for Microsoft Defender for Office 365 or Microsoft Defender for Identity.
79
79
80
80
> [!NOTE]
81
-
> By selecting **Choose all data sources** all supported data sources within Microsoft Defender XDR Unified RBAC and any future data sources that are added are automatically assigned to this assignment.
81
+
> By selecting **Include future data sources automatically** all supported data sources within Microsoft Defender XDR Unified RBAC and any future data sources that are added are automatically assigned to this assignment.
82
82
83
83
11. In **Assigned users and groups** choose the Microsoft Entra security groups or individual users to assign the role to, and select **Add**.
0 commit comments