You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/custom-detection-rules.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ To manage required permissions, a Global Administrator can:
69
69
In the Microsoft Defender portal, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
70
70
71
71
> [!IMPORTANT]
72
-
> To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
72
+
> To prevent the service from returning too many alerts, each rule is limited to generating only 150 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
73
73
74
74
#### Required columns in the query results
75
75
@@ -127,13 +127,13 @@ DeviceEvents
127
127
128
128
With the query in the query editor, select **Create detection rule** and specify the following alert details:
129
129
130
-
-**Detection name** - Name of the detection rule; should be unique
130
+
-**Detection name** - Name of the detection rule; should be unique.
131
131
-**Frequency** - Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
132
132
-**Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work. Any URLs included in the title should follow the [percent-encoding format](https://en.m.wikipedia.org/wiki/Percent-encoding) for them to display properly.
133
133
-**Severity** - Potential risk of the component or activity identified by the rule.
134
134
-**Category** - Threat component or activity identified by the rule.
135
135
-**MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
136
-
-**Threat analytics report** - Link the generated alert to an existing threat analytics report so that it appears in the [Related incidents](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports) tab in threat analytics
136
+
-**Threat analytics report** - Link the generated alert to an existing threat analytics report so that it appears in the [Related incidents](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports) tab in threat analytics.
137
137
-**Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work. Any URLs included in the description should follow the percent-encoding format for them to display properly.
138
138
-**Recommended actions** - Additional actions that responders might take in response to an alert.
139
139
@@ -161,7 +161,7 @@ Setting a custom detection to run in Continuous (NRT) frequency allows you to in
161
161
162
162
From the custom detection rules page, you can migrate custom detections rules that fit the Continuous (NRT) frequency with a single button, **Migrate now**:
163
163
164
-
:::image type="content" source="media/custom-detection-migrate-now.png" alt-text="Screenshot of the migrate now button in advanced hunting." lightbox="media/custom-detection-migrate-now.png":::
164
+
:::image type="content" source="media/custom-detection-migrate-now.png" alt-text="Screenshot of the Migrate now button in advanced hunting." lightbox="media/custom-detection-migrate-now.png":::
165
165
166
166
167
167
Selecting **Migrate now** gives you a list of all compatible rules according to their KQL query. You can choose to migrate all or selected rules only according to your preferences:
@@ -238,7 +238,7 @@ For example: `User {{AccountName}} unexpectedly signed in from {{Location}}`
238
238
>[!NOTE]
239
239
>The number of columns you can reference in each field is limited to three.
240
240
241
-
:::image type="content" source="/defender/media/ah-dynamic-alert.png" alt-text="Screenshot that shows the dynamic alert title and description fields in the Custom detections setup guide." lightbox="/defender/media/ah-dynamic-alert.png":::
241
+
:::image type="content" source="/defender/media/ah-dynamic-alert.png" alt-text="Screenshot that shows the dynamic alert title and description fields in the Custom detections wizard." lightbox="/defender/media/ah-dynamic-alert.png":::
242
242
243
243
To help you decide on the exact column names you want to reference, you can select **Explore query and results**, which opens the Advanced hunting context pane on top of the rule creation wizard, where you can examine your query logic and its results.
244
244
@@ -250,7 +250,7 @@ In the **Custom details** section, add key-value pairs corresponding to the de
250
250
- In the **Key** field, enter a name of your choosing that will appear as the field name in alerts.
251
251
- In the **Parameter** field, choose the event parameter you wish to surface in the alerts from the dropdown list. This list will be populated by values corresponding to the columns names that your KQL query outputs.
252
252
253
-
:::image type="content" source="/defender/media/ah-custom-details.png" alt-text="Screenshot that shows the Custom details option in the Custom detections setup guide." lightbox="/defender/media/ah-custom-details.png":::
253
+
:::image type="content" source="/defender/media/ah-custom-details.png" alt-text="Screenshot that shows the Custom details option in the Custom detections wizard." lightbox="/defender/media/ah-custom-details.png":::
254
254
255
255
The following screenshot shows how the custom details are surfaced in the alert side panel:
256
256
@@ -373,7 +373,9 @@ After reviewing the rule, select **Create** to save it. The custom detection rul
373
373
>
374
374
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
375
375
376
+
#### How custom detections handle duplicate alerts
376
377
378
+
An important consideration when creating and reviewing custom detection rules is alert noise and fatigue. Custom detections group and deduplicate events into a single alert. For example, if a custom detection fires twice on an event that contains the same entities, custom details, and dynamic details, only one alert is created for both of these events. If the detection recognizes that the events are identical, it logs only one of the events on the created alert and then takes care of the duplicates, which could occur when the lookback period is longer than the frequency. If the events are different, the custom detection logs both events on the alert.
Copy file name to clipboardExpand all lines: defender-xdr/custom-detections-overview.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,8 +39,6 @@ Custom detections provide:
39
39
- Alerts for rule-based detections built from advanced hunting queries
40
40
- Automatic response actions
41
41
42
-
Custom detections also help reduce alert noise and fatigue by grouping and deduplicating events into a single alert, helping you focus on incidents that matter. For example, if a custom detection fires twice on an event that contains the same entities, custom details, and dynamic details, only one alert is created for both of these events. If the detection recognizes that the events are identical, it logs only one of the events on the created alert and then takes care of the duplicates, which could occur when the lookback period is longer than the frequency. If the events are different, the custom detection logs both events on the alert.
43
-
44
42
Optimizing your queries in custom detection rules is important in avoiding time-outs and ensuring efficiency. There are several resources available that provide guidance on optimizing your queries in [Advanced hunting query best practices](advanced-hunting-best-practices.md).
0 commit comments