Skip to content

Commit 7c42fa4

Browse files
committed
Add about scrubbed strings
1 parent d0d9b73 commit 7c42fa4

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-xdr/custom-detection-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,11 +123,11 @@ With the query in the query editor, select **Create detection rule** and specify
123123

124124
- **Detection name** - Name of the detection rule; should be unique
125125
- **Frequency** -Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
126-
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique.
126+
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
127127
- **Severity** - Potential risk of the component or activity identified by the rule.
128128
- **Category** - Threat component or activity identified by the rule.
129129
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
130-
- **Description** - More information about the component or activity identified by the rule.
130+
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Makrdown, and other code won't work.
131131
- **Recommended actions** - Additional actions that responders might take in response to an alert.
132132

133133
#### Rule frequency

0 commit comments

Comments
 (0)