Skip to content

Commit ba080a2

Browse files
author
Ken Lawson
committed
Updated rule types and ran Acrolinx
1 parent d13879d commit ba080a2

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

learn-pr/wwl-sci/analyze-data-in-sentinel/3-azure-sentinel-analytics-overview.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: What is Microsoft Sentinel Analytics?
44
metadata:
55
title: What is Microsoft Sentinel Analytics?
66
description: "Explain what is Microsoft Sentinel Analytics."
7-
ms.date: 05/15/2023
7+
ms.date: 02/11/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/includes/3-azure-sentinel-analytics-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Common security analytics use cases include:
2929

3030
- Threat hunting
3131

32-
You might not be able to detect some of the threats by using conventional protection tools, such as firewalls or antimalware solutions. Certain threats can go undetected for months. Combining data, gathered by multiple tools and products, with the power of threat intelligence can help you to detect, analyze, and mitigate insider threats.
32+
You might not be able to detect some of the threats by using conventional protection tools, such as firewalls or anti-malware solutions. Certain threats can go undetected for months. Combining data, gathered by multiple tools and products, with the power of threat intelligence can help you to detect, analyze, and mitigate insider threats.
3333

3434
You can also use analytics rules to create custom alerts that use indicators of attack. These indicators can identify potential attacks that are in progress in real time.
3535

@@ -61,7 +61,7 @@ The **Analytics** home page provides the following filters:
6161

6262
- **Severity**. Use to filter the rules by levels of severity.
6363

64-
- **Rule Type**. There are currently four types of rules: Scheduled, Fusion, Microsoft Security, Machine Learning Behavior Analytics.
64+
- **Rule Type**. There are currently six types of rules: Scheduled, NRT (near real time), Fusion, Microsoft Security, ML (machine learning) Behavior Analytics, and Threat Intelligence.
6565

6666
- **Tactics**. Use to filter the rules based on 14 specific methodologies in ATT&CK model.
6767

learn-pr/wwl-sci/analyze-data-in-sentinel/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.azure.analyze-data-in-sentinel
33
metadata:
44
title: Threat detection with Microsoft Sentinel analytics
55
description: "Threat detection with Microsoft Sentinel analytics"
6-
ms.date: 09/12/2024
6+
ms.date: 02/11/2025
77
author: wwlpublish
88
ms.author: kelawson
99
ms.topic: module

0 commit comments

Comments
 (0)