Skip to content

Commit d7c093b

Browse files
committed
Update
1 parent 1f0f569 commit d7c093b

File tree

4 files changed

+8
-7
lines changed

4 files changed

+8
-7
lines changed

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ If your Defender XDR data is ingested into Microsoft Sentinel, you have the opti
138138

139139
You can view all your user-defined rules—both custom detection rules and analytics rules—in the **Detection rules** page. Read [Manage custom detections](custom-detection-manage.md) for more details.
140140

141-
You can migrate any analytics rule that can run in [Continuous (near real-time) frequency](custom-detection-rules.md#continuous-nrt-frequency) by selecting the **Migrate now** button in the banner that appears when you open the detection rules list page.
141+
142142

143143
For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
144144

defender-xdr/custom-detection-manage.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ You can view the list of existing custom detection rules, check their previous r
3434
> [!TIP]
3535
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
3636
37+
For users who have onboarded a Microsoft Sentinel workspace to the unified Microsoft Defender portal, the custom detection rules list includes [analytics rules](advanced-hunting-defender-use-custom-rules.md#analytics-rules). The following sections also apply to analytics rules unless otherwise indicated.
38+
3739
### View existing rules
3840

3941
To view your existing custom detection rules and analytics rules, navigate to **Hunting** > **Custom detection rules**.
@@ -49,7 +51,7 @@ For multiworkspace organizations that onboarded multiple workspaces to Microsoft
4951
The page lists all the rules with the following run information:
5052

5153
- **Last run** - When a rule was last run to check for query matches and generate alerts
52-
- **Last run status** - Whether a rule ran successfully
54+
- **Last run status** - Whether a rule ran successfully (for custom detection rules only)
5355
- **Next run** - The next scheduled run
5456
- **Status** - Whether a rule has been turned on or off
5557

@@ -61,22 +63,22 @@ To view comprehensive information about a custom detection rule or an analytics
6163

6264
You can also take the following actions on the rule from this page:
6365

64-
- **Open detection rule page** - opens the detection rule page to view triggered alerts and actions (for custom detection rules only)
66+
- **Open detection rule page** - opens the detection rule page to view triggered alerts and review actions (for custom detection rules only)
6567
- **Run** - runs the rule immediately; this also resets the interval for the next run (for custom detection rules only)
6668
- **Edit** - allows you to modify the rule without changing the query
6769
- **Modify query** - allows you to edit the query in advanced hunting
6870
- **Turn on** / **Turn off** - allows you to enable the rule or stop it from running
6971
- **Delete** - allows you to turn off the rule and remove it
7072

71-
### View and manage triggered alerts
73+
#### View and manage triggered alerts
7274

7375
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
7476

7577
- Manage the alert by setting its status and classification (true or false alert)
7678
- Link the alert to an incident
7779
- Run the query that triggered the alert on advanced hunting
7880

79-
### Review actions
81+
#### Review actions
8082

8183
In the rule details screen (**Hunting** \> **Custom detections** \> **[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
8284

defender-xdr/custom-detection-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ Once you click **Save**, the selected rules' frequency gets updated to Continuou
171171
You can run a query continuously as long as:
172172

173173
- The query references one table only.
174-
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174+
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
175175
- The query doesn't use joins, unions, or the `externaldata` operator.
176176
- The query doesn't include any comments line/information.
177177

defender-xdr/whats-new.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ You can also get product updates and important notifications through the [messag
3535

3636
## May 2025
3737
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
38-
- You can now migrate any analytics rule that can run in Continuous (near real-time) frequency by selecting the **Migrate now** button in the banner that appears when you open the detection rules list page.
3938
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
4039
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
4140
- You can now view the details pane even for analytics rules.

0 commit comments

Comments
 (0)