Skip to content

Commit 8536730

Browse files
committed
updates
1 parent b42f06a commit 8536730

File tree

4 files changed

+25
-9
lines changed

4 files changed

+25
-9
lines changed

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ The **Analytics rule wizard** appears. Fill up the required details as described
123123

124124

125125
##### Custom detection rules
126-
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
126+
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create custom detection rules](custom-detection-rules.md) for more information.
127127

128128

129129
In both custom detection and analytics rule creation, you can only query data ingested as analytics logs (that is, not as basic logs or auxiliary logs. See [log management plans](/azure/sentinel/log-plans#log-management-plans) to check the different tiers) otherwise the rule creation won't proceed.
@@ -133,3 +133,12 @@ If your Defender XDR data is ingested into Microsoft Sentinel, you have the opti
133133

134134
> [!NOTE]
135135
> If a Defender XDR table is not set up to stream to log analytics in Microsoft Sentinel but is recognized as a standard table in Microsoft Sentinel, an analytics rule can be created successfully but the rule won't run correctly since no data is actually available in Microsoft Sentinel. For these cases, use the custom detection rule wizard instead.
136+
137+
## Manage custom analytics and detection rules
138+
139+
You can view all your user-defined rules—both custom detection rules and analytics rules—in the **Detection rules** page. Read [Manage custom detections](custom-detection-manage.md) for more details.
140+
141+
You can migrate any analytics rule that can run in [Continuous (near real-time) frequency](custom-detection-rules.md#continuous-nrt-frequency) by selecting the **Migrate now** button in the banner that appears when you open the detection rules list page.
142+
143+
For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
144+

defender-xdr/custom-detection-manage.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -61,11 +61,12 @@ To view comprehensive information about a custom detection rule or an analytics
6161

6262
You can also take the following actions on the rule from this page:
6363

64-
- **Run** - Run the rule immediately. This also resets the interval for the next run.
65-
- **Edit** - Modify the rule without changing the query.
66-
- **Modify query** - Edit the query in advanced hunting.
67-
- **Turn on** / **Turn off** - Enable the rule or stop it from running.
68-
- **Delete** - Turn off the rule and remove it.
64+
- **Open detection rule page** - opens the detection rule page to view triggered alerts and actions (for custom detection rules only)
65+
- **Run** - runs the rule immediately; this also resets the interval for the next run (for custom detection rules only)
66+
- **Edit** - allows you to modify the rule without changing the query
67+
- **Modify query** - allows you to edit the query in advanced hunting
68+
- **Turn on** / **Turn off** - allows you to enable the rule or stop it from running
69+
- **Delete** - allows you to turn off the rule and remove it
6970

7071
### View and manage triggered alerts
7172

@@ -82,8 +83,6 @@ In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name
8283
> [!TIP]
8384
> To quickly view information and take action on an item in a table, use the selection column [✓] at the left of the table.
8485
85-
> [!NOTE]
86-
> Some columns in this article might not be available in Microsoft Defender for Endpoint. [Turn on Microsoft Defender XDR](m365d-enable.md) to hunt for threats using more data sources. You can move your advanced hunting workflows from Microsoft Defender for Endpoint to Microsoft Defender XDR by following the steps in [Migrate advanced hunting queries from Microsoft Defender for Endpoint](advanced-hunting-migrate-from-mde.md).
8786

8887
## See also
8988

defender-xdr/custom-detection-rules.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,6 @@ With the query in the query editor, select **Create detection rule** and specify
135135
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work.
136136
- **Recommended actions** - Additional actions that responders might take in response to an alert.
137137

138-
#### Dynamic
139138

140139
#### Rule frequency
141140

defender-xdr/whats-new.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,15 @@ For more information on what's new with other Microsoft Defender security produc
3232

3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

35+
## May 2025
36+
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
37+
- You can now migrate any analytics rule that can run in Continuous (near real-time) frequency by selecting the **Migrate now** button in the banner that appears when you open the detection rules list page.
38+
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
39+
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
40+
- You can now view the details pane even for analytics rules.
41+
- You can now perform the following actions on analytics rules: Turn on/off, Delete, Edit.
42+
43+
3544
## April 2025
3645

3746
- (Preview) You can now create data security investigations in the Microsoft Defender portal with the integration of Microsoft Purview Data Security Investigations (preview) and Microsoft Defender XDR. This integration allows security operations center (SOC) teams to enhance their investigation and response to potential data security incidents like data breaches or data leaks. For more information, see [Create data security investigations in the Microsoft Defender portal](create-dsi-in-defender.md).

0 commit comments

Comments
 (0)