You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-defender-use-custom-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -138,7 +138,7 @@ If your Defender XDR data is ingested into Microsoft Sentinel, you have the opti
138
138
139
139
You can view all your user-defined rules—both custom detection rules and analytics rules—in the **Detection rules** page. Read [Manage custom detections](custom-detection-manage.md) for more details.
140
140
141
-
You can migrate any analytics rule that can run in [Continuous (near real-time) frequency](custom-detection-rules.md#continuous-nrt-frequency) by selecting the **Migrate now** button in the banner that appears when you open the detection rules list page.
141
+
142
142
143
143
For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
Copy file name to clipboardExpand all lines: defender-xdr/custom-detection-manage.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,8 @@ You can view the list of existing custom detection rules, check their previous r
34
34
> [!TIP]
35
35
> Alerts raised by custom detections are available over alerts and incident APIs. For more information, see [Supported Microsoft Defender XDR APIs](api-supported.md).
36
36
37
+
For users who have onboarded a Microsoft Sentinel workspace to the unified Microsoft Defender portal, the custom detection rules list includes [analytics rules](advanced-hunting-defender-use-custom-rules.md#analytics-rules). The following sections also apply to analytics rules unless otherwise indicated.
38
+
37
39
### View existing rules
38
40
39
41
To view your existing custom detection rules and analytics rules, navigate to **Hunting** > **Custom detection rules**.
@@ -49,7 +51,7 @@ For multiworkspace organizations that onboarded multiple workspaces to Microsoft
49
51
The page lists all the rules with the following run information:
50
52
51
53
-**Last run** - When a rule was last run to check for query matches and generate alerts
52
-
-**Last run status** - Whether a rule ran successfully
54
+
-**Last run status** - Whether a rule ran successfully (for custom detection rules only)
53
55
-**Next run** - The next scheduled run
54
56
-**Status** - Whether a rule has been turned on or off
55
57
@@ -61,22 +63,22 @@ To view comprehensive information about a custom detection rule or an analytics
61
63
62
64
You can also take the following actions on the rule from this page:
63
65
64
-
-**Open detection rule page** - opens the detection rule page to view triggered alerts and actions (for custom detection rules only)
66
+
-**Open detection rule page** - opens the detection rule page to view triggered alerts and review actions (for custom detection rules only)
65
67
-**Run** - runs the rule immediately; this also resets the interval for the next run (for custom detection rules only)
66
68
-**Edit** - allows you to modify the rule without changing the query
67
69
-**Modify query** - allows you to edit the query in advanced hunting
68
70
-**Turn on** / **Turn off** - allows you to enable the rule or stop it from running
69
71
-**Delete** - allows you to turn off the rule and remove it
70
72
71
-
### View and manage triggered alerts
73
+
####View and manage triggered alerts
72
74
73
75
In the rule details screen (**Hunting**\>**Custom detections**\>**[Rule name]**), go to **Triggered alerts**, which lists the alerts generated by matches to the rule. Select an alert to view detailed information about it and take the following actions:
74
76
75
77
- Manage the alert by setting its status and classification (true or false alert)
76
78
- Link the alert to an incident
77
79
- Run the query that triggered the alert on advanced hunting
78
80
79
-
### Review actions
81
+
####Review actions
80
82
81
83
In the rule details screen (**Hunting**\>**Custom detections**\>**[Rule name]**), go to **Triggered actions**, which lists the actions taken based on matches to the rule.
Copy file name to clipboardExpand all lines: defender-xdr/custom-detection-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -171,7 +171,7 @@ Once you click **Save**, the selected rules' frequency gets updated to Continuou
171
171
You can run a query continuously as long as:
172
172
173
173
- The query references one table only.
174
-
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174
+
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
175
175
- The query doesn't use joins, unions, or the `externaldata` operator.
176
176
- The query doesn't include any comments line/information.
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,6 @@ You can also get product updates and important notifications through the [messag
35
35
36
36
## May 2025
37
37
- (Preview) In advanced hunting, you can now [view all your user-defined rules](custom-detection-manage.md)—both custom detection rules and analytics rules—in the **Detection rules** page. This feature also brings the following improvements:
38
-
- You can now migrate any analytics rule that can run in Continuous (near real-time) frequency by selecting the **Migrate now** button in the banner that appears when you open the detection rules list page.
39
38
- You can now filter for *every* column (in addition to **Frequency** and **Organizational scope**).
40
39
- For multiworkspace organizations that have onboarded multiple workspaces to Microsoft Defender, you can now view the **Workspace ID** column and filter by workspace.
41
40
- You can now view the details pane even for analytics rules.
0 commit comments