Skip to content

Commit f712f6c

Browse files
authored
Merge pull request #5402 from MicrosoftDocs/poliveria-custom-detections
Add note recommending custom detections for new rules
2 parents a5a7c82 + 86e1820 commit f712f6c

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,9 @@ For editable queries, more options are available:
108108

109109
## Create custom analytics and detection rules
110110

111+
>[!IMPORTANT]
112+
> [**Custom detections**](custom-detections-overview.md) is now the best way to create new rules across Microsoft Sentinel SIEM Microsoft Defender XDR. With custom detections, you can reduce ingestion costs, get unlimited real-time detections, and benefit from seamless integration with Defender XDR data, functions, and remediation actions with automatic entity mapping. For more information, read [this blog](https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/custom-detections-are-now-the-unified-experience-for-creating-detections-in-micr/4463875).
113+
111114
To help discover threats and anomalous behaviors in your environment, you can create customized detection rules. There are two kinds:
112115
- Analytics rules - to generate detections from rules that query data that is ingested through Microsoft Sentinel
113116
- Custom detection rules - to generate detections from rules that query data from Defender XDR or from both Microsoft Sentinel and Defender XDR

0 commit comments

Comments
 (0)