Skip to content

Commit e42bb95

Browse files
committed
Update investigate-incidents.md
1 parent 145070e commit e42bb95

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-xdr/investigate-incidents.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The ***go hunt*** action takes advantage of the [advanced hunting](advanced-hunt
9191
- See all available queries – the option returns all available queries for the entity type you're investigating.
9292
- All Activity – the query returns all activities associated with an entity, providing you with a comprehensive view of the incident's context.
9393
- Related Alerts – the query searches for and returns all security alerts involving a specific entity, ensuring you don't miss any information.
94-
- All User anomalies (Preview) – the query returns all anomalies associated with the user, helping you identify unusual behavior that might be relevant to the incident. Available only for user entities if you have enabled [Microsoft Sentinel User and Entity Behavior Analytics (UEBA)](/azure/sentinel/identify-threats-with-entity-behavior-analytics).
94+
- All User anomalies (Preview) – the query returns all anomalies associated with the user from the past 30 days, helping you identify unusual behavior that might be relevant to the incident. Available only for user entities if you have enabled [Microsoft Sentinel User and Entity Behavior Analytics (UEBA)](/azure/sentinel/identify-threats-with-entity-behavior-analytics).
9595

9696
:::image type="content" source="./media/investigate-incidents/gohunt-attackstory.png" alt-text="Selecting the go hunt option on a device in an attack story" lightbox="./media/investigate-incidents/gohunt-attackstory.png":::
9797

0 commit comments

Comments
 (0)