Skip to content

Commit 64b5d9a

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-li-1740044101
2 parents e3a91f1 + d03ccb2 commit 64b5d9a

File tree

2 files changed

+16
-7
lines changed

2 files changed

+16
-7
lines changed

defender-xdr/breadcrumb/toc.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,15 @@
1212
- name: Microsoft Defender XDR
1313
tocHref: /unified-secops-platform/
1414
topicHref: /defender-xdr/index
15+
- name: Microsoft Defender XDR
16+
tocHref: /defender-for-endpoint/
17+
topicHref: /defender-xdr/index
18+
- name: Microsoft Defender XDR
19+
tocHref: /defender-office-365/
20+
topicHref: /defender-xdr/index
21+
- name: Microsoft Defender XDR
22+
tocHref: /defender-cloud-apps/
23+
topicHref: /defender-xdr/index
1524

1625
## Azure override
1726
- name: 'Microsoft Defender'

defender-xdr/custom-detection-rules.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To manage required permissions, a Global Administrator can:
5858
- Check RBAC settings for Microsoft Defender for Endpoint in [Microsoft Defender XDR](https://security.microsoft.com/) under **Settings** \> **Permissions** > **Roles**. Select the corresponding role to assign the **manage security settings** permission.
5959

6060
> [!NOTE]
61-
> A user also needs to have the appropriate permissions for the devices in the [device scope](#5-set-the-rule-scope) of a custom detection rule that they are creating or editing before they can proceed. A user can't edit a custom detection rule that is scoped to run on all devices, if the same user does not have permissions for all devices.
61+
> A user also needs to have the appropriate permissions for the devices in the [device scope](#5-set-the-rule-scope) of a custom detection rule that they're creating or editing before they can proceed. A user can't edit a custom detection rule that is scoped to run on all devices, if the same user doesn't have permissions for all devices.
6262
6363
## Create a custom detection rule
6464

@@ -95,14 +95,14 @@ To create a custom detection rule, the query must return the following columns:
9595
- `InitiatingProcessAccountObjectId`
9696

9797
> [!NOTE]
98-
> Support for additional entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
98+
> Support for more entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
9999
100100
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
101101

102102
There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`.
103103

104104
> [!IMPORTANT]
105-
> Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is pre-filtered based on the detection frequency.
105+
> Avoid filtering custom detections using the `Timestamp` column. The data used for custom detections is prefiltered based on the detection frequency.
106106
107107
The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this count to find only the devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
108108

@@ -115,19 +115,19 @@ DeviceEvents
115115
```
116116

117117
> [!TIP]
118-
> For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day will cover all new data.
118+
> For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is _every 24 hours_, filtering for the past day covers all new data.
119119
120120
### 2. Create new rule and provide alert details
121121

122122
With the query in the query editor, select **Create detection rule** and specify the following alert details:
123123

124124
- **Detection name** - Name of the detection rule; should be unique
125125
- **Frequency** -Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
126-
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
126+
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
127127
- **Severity** - Potential risk of the component or activity identified by the rule.
128128
- **Category** - Threat component or activity identified by the rule.
129129
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
130-
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
130+
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
131131
- **Recommended actions** - Additional actions that responders might take in response to an alert.
132132

133133
#### Rule frequency
@@ -265,7 +265,7 @@ Only data from devices in the scope will be queried. Also, actions are taken onl
265265
After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
266266

267267
> [!IMPORTANT]
268-
> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you are creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules).
268+
> Custom detections should be regularly reviewed for efficiency and effectiveness. To make sure you're creating detections that trigger true alerts, take time to review your existing custom detections by following the steps in [Manage existing custom detection rules](#manage-existing-custom-detection-rules).
269269
>
270270
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
271271

0 commit comments

Comments
 (0)