Skip to content

Commit 1be80d1

Browse files
authored
Merge pull request #49124 from KenMAG/Bugs
Updated rule types per triage feedback, and ran Acrolinx
2 parents d13879d + ba080a2 commit 1be80d1

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

learn-pr/wwl-sci/analyze-data-in-sentinel/3-azure-sentinel-analytics-overview.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: What is Microsoft Sentinel Analytics?
44
metadata:
55
title: What is Microsoft Sentinel Analytics?
66
description: "Explain what is Microsoft Sentinel Analytics."
7-
ms.date: 05/15/2023
7+
ms.date: 02/11/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/includes/3-azure-sentinel-analytics-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Common security analytics use cases include:
2929

3030
- Threat hunting
3131

32-
You might not be able to detect some of the threats by using conventional protection tools, such as firewalls or antimalware solutions. Certain threats can go undetected for months. Combining data, gathered by multiple tools and products, with the power of threat intelligence can help you to detect, analyze, and mitigate insider threats.
32+
You might not be able to detect some of the threats by using conventional protection tools, such as firewalls or anti-malware solutions. Certain threats can go undetected for months. Combining data, gathered by multiple tools and products, with the power of threat intelligence can help you to detect, analyze, and mitigate insider threats.
3333

3434
You can also use analytics rules to create custom alerts that use indicators of attack. These indicators can identify potential attacks that are in progress in real time.
3535

@@ -61,7 +61,7 @@ The **Analytics** home page provides the following filters:
6161

6262
- **Severity**. Use to filter the rules by levels of severity.
6363

64-
- **Rule Type**. There are currently four types of rules: Scheduled, Fusion, Microsoft Security, Machine Learning Behavior Analytics.
64+
- **Rule Type**. There are currently six types of rules: Scheduled, NRT (near real time), Fusion, Microsoft Security, ML (machine learning) Behavior Analytics, and Threat Intelligence.
6565

6666
- **Tactics**. Use to filter the rules based on 14 specific methodologies in ATT&CK model.
6767

learn-pr/wwl-sci/analyze-data-in-sentinel/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.azure.analyze-data-in-sentinel
33
metadata:
44
title: Threat detection with Microsoft Sentinel analytics
55
description: "Threat detection with Microsoft Sentinel analytics"
6-
ms.date: 09/12/2024
6+
ms.date: 02/11/2025
77
author: wwlpublish
88
ms.author: kelawson
99
ms.topic: module

0 commit comments

Comments
 (0)