Skip to content

Commit 72a42e4

Browse files
authored
Merge pull request #4412 from MicrosoftDocs/maccruz-customta
Add TA section to custom detections
2 parents c8ddec8 + f972337 commit 72a42e4

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

defender-xdr/custom-detection-rules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,7 @@ With the query in the query editor, select **Create detection rule** and specify
132132
- **Severity** - Potential risk of the component or activity identified by the rule.
133133
- **Category** - Threat component or activity identified by the rule.
134134
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
135+
- **Threat analytics report** - Link the generated alert to an existing threat analytics report so that it appears in the [Related incidents](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports) tab in threat analytics
135136
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
136137
- **Recommended actions** - Additional actions that responders might take in response to an alert.
137138

defender-xdr/threat-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ In the **Recommended actions** tab, review the list of specific actionable recom
201201

202202
## Set up custom detections and link them to Threat analytics reports
203203

204-
You can set up [custom detection rules](custom-detections-overview.md) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
204+
You can set up [custom detection rules](custom-detection-rules.md#2-create-new-rule-and-provide-alert-details) and link them to Threat analytics reports. If these rules get triggered and an alert generates an incident, the report shows up in that incident and the incident appears under the **Related incidents** tab, just like any other Microsoft-defined detection.
205205

206206
:::image type="content" source="/defender/media/threat-analytics/ta-custom-detection.png" alt-text="Screenshot of custom detection setup page with Threat analytics option highlighted." lightbox="/defender/media/threat-analytics/ta-custom-detection.png":::
207207

0 commit comments

Comments
 (0)