Skip to content

Commit a035039

Browse files
committed
edits
1 parent f1ad36a commit a035039

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

defender-xdr/custom-detection-rules.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To manage required permissions, a Global Administrator can:
6969
In the Microsoft Defender portal, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
7070

7171
> [!IMPORTANT]
72-
> To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
72+
> To prevent the service from returning too many alerts, each rule is limited to generating only 150 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
7373
7474
#### Required columns in the query results
7575

@@ -127,13 +127,13 @@ DeviceEvents
127127

128128
With the query in the query editor, select **Create detection rule** and specify the following alert details:
129129

130-
- **Detection name** - Name of the detection rule; should be unique
130+
- **Detection name** - Name of the detection rule; should be unique.
131131
- **Frequency** - Interval for running the query and taking action. [See more guidance in the rule frequency section](#rule-frequency)
132132
- **Alert title** - Title displayed with alerts triggered by the rule; should be unique and in plaintext. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work. Any URLs included in the title should follow the [percent-encoding format](https://en.m.wikipedia.org/wiki/Percent-encoding) for them to display properly.
133133
- **Severity** - Potential risk of the component or activity identified by the rule.
134134
- **Category** - Threat component or activity identified by the rule.
135135
- **MITRE ATT&CK techniques** - One or more attack techniques identified by the rule as documented in the [MITRE ATT&CK framework](https://attack.mitre.org/). This section is hidden for certain alert categories, including malware, ransomware, suspicious activity, and unwanted software.
136-
- **Threat analytics report** - Link the generated alert to an existing threat analytics report so that it appears in the [Related incidents](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports) tab in threat analytics
136+
- **Threat analytics report** - Link the generated alert to an existing threat analytics report so that it appears in the [Related incidents](threat-analytics.md#set-up-custom-detections-and-link-them-to-threat-analytics-reports) tab in threat analytics.
137137
- **Description** - More information about the component or activity identified by the rule. Strings are sanitized for security purposes so HTML, Markdown, and other code won't work. Any URLs included in the description should follow the percent-encoding format for them to display properly.
138138
- **Recommended actions** - Additional actions that responders might take in response to an alert.
139139

@@ -161,7 +161,7 @@ Setting a custom detection to run in Continuous (NRT) frequency allows you to in
161161

162162
From the custom detection rules page, you can migrate custom detections rules that fit the Continuous (NRT) frequency with a single button, **Migrate now**:
163163

164-
:::image type="content" source="media/custom-detection-migrate-now.png" alt-text="Screenshot of the migrate now button in advanced hunting." lightbox="media/custom-detection-migrate-now.png":::
164+
:::image type="content" source="media/custom-detection-migrate-now.png" alt-text="Screenshot of the Migrate now button in advanced hunting." lightbox="media/custom-detection-migrate-now.png":::
165165

166166

167167
Selecting **Migrate now** gives you a list of all compatible rules according to their KQL query. You can choose to migrate all or selected rules only according to your preferences:
@@ -238,7 +238,7 @@ For example: `User {{AccountName}} unexpectedly signed in from {{Location}}`
238238
>[!NOTE]
239239
>The number of columns you can reference in each field is limited to three.
240240
241-
:::image type="content" source="/defender/media/ah-dynamic-alert.png" alt-text="Screenshot that shows the dynamic alert title and description fields in the Custom detections setup guide." lightbox="/defender/media/ah-dynamic-alert.png":::
241+
:::image type="content" source="/defender/media/ah-dynamic-alert.png" alt-text="Screenshot that shows the dynamic alert title and description fields in the Custom detections wizard." lightbox="/defender/media/ah-dynamic-alert.png":::
242242

243243
To help you decide on the exact column names you want to reference, you can select **Explore query and results**, which opens the Advanced hunting context pane on top of the rule creation wizard, where you can examine your query logic and its results.
244244

@@ -250,7 +250,7 @@ In the **Custom details** section, add key-value pairs corresponding to the de
250250
- In the **Key** field, enter a name of your choosing that will appear as the field name in alerts.
251251
- In the **Parameter** field, choose the event parameter you wish to surface in the alerts from the dropdown list. This list will be populated by values corresponding to the columns names that your KQL query outputs.
252252

253-
:::image type="content" source="/defender/media/ah-custom-details.png" alt-text="Screenshot that shows the Custom details option in the Custom detections setup guide." lightbox="/defender/media/ah-custom-details.png":::
253+
:::image type="content" source="/defender/media/ah-custom-details.png" alt-text="Screenshot that shows the Custom details option in the Custom detections wizard." lightbox="/defender/media/ah-custom-details.png":::
254254

255255
The following screenshot shows how the custom details are surfaced in the alert side panel:
256256

@@ -373,7 +373,9 @@ After reviewing the rule, select **Create** to save it. The custom detection rul
373373
>
374374
> You maintain control over the broadness or specificity of your custom detections so any false alerts generated by custom detections might indicate a need to modify certain parameters of the rules.
375375
376+
#### How custom detections handle duplicate alerts
376377

378+
An important consideration when creating and reviewing custom detection rules is alert noise and fatigue. Custom detections group and deduplicate events into a single alert. For example, if a custom detection fires twice on an event that contains the same entities, custom details, and dynamic details, only one alert is created for both of these events. If the detection recognizes that the events are identical, it logs only one of the events on the created alert and then takes care of the duplicates, which could occur when the lookback period is longer than the frequency. If the events are different, the custom detection logs both events on the alert.
377379

378380
## See also
379381

defender-xdr/custom-detections-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,6 @@ Custom detections provide:
3939
- Alerts for rule-based detections built from advanced hunting queries
4040
- Automatic response actions
4141

42-
Custom detections also help reduce alert noise and fatigue by grouping and deduplicating events into a single alert, helping you focus on incidents that matter. For example, if a custom detection fires twice on an event that contains the same entities, custom details, and dynamic details, only one alert is created for both of these events. If the detection recognizes that the events are identical, it logs only one of the events on the created alert and then takes care of the duplicates, which could occur when the lookback period is longer than the frequency. If the events are different, the custom detection logs both events on the alert.
43-
4442
Optimizing your queries in custom detection rules is important in avoiding time-outs and ensuring efficiency. There are several resources available that provide guidance on optimizing your queries in [Advanced hunting query best practices](advanced-hunting-best-practices.md).
4543

4644
## See also

0 commit comments

Comments
 (0)