Skip to content

Commit c988494

Browse files
committed
Update advanced-hunting-defender-use-custom-rules.md
1 parent 82627da commit c988494

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,15 +113,16 @@ To help discover threats and anomalous behaviors in your environment, you can cr
113113
- Custom detection rules - to generate detections from rules that query data from Defender XDR or from both Microsoft Sentinel and Defender XDR
114114

115115

116-
### Analytics rules
116+
##### Analytics rules
117+
117118
For analytics rules that apply to data ingested through the connected Microsoft Sentinel workspace, select **Manage rules > Create analytics rule**.
118119

119120
:::image type="content" source="/defender/media/advanced-hunting-unified-rules.png" alt-text="Screenshot of the options to create custom analytics or detections in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-rules.png":::
120121

121122
The **Analytics rule wizard** appears. Fill up the required details as described in [Analytics rule wizard—General tab](/azure/sentinel/detect-threats-custom#analytics-rule-wizardgeneral-tab).
122123

123124

124-
### Custom detection rules
125+
##### Custom detection rules
125126
You can create custom detection rules that query data from both Microsoft Sentinel and Defender XDR tables. Select **Manage rules > Create custom detection**. Read [Create and manage custom detection rules](custom-detection-rules.md) for more information.
126127

127128

0 commit comments

Comments
 (0)