Skip to content

Commit d041fc7

Browse files
author
Ken Lawson
committed
Updated units, fixed MD and fixed ARM template
1 parent d697247 commit d041fc7

15 files changed

+20
-71
lines changed

learn-pr/wwl-sci/analyze-data-in-sentinel/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Provide an introduction of Microsoft Sentinel Analytics."
7-
ms.date: 05/15/2023
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/2-exercise-setup.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Exercise - Detect threats with Microsoft Sentinel analytics
44
metadata:
55
title: Exercise - Detect threats with Microsoft Sentinel analytics
66
description: "Detect threats by using Microsoft Sentinel Analytics."
7-
ms.date: 02/24/2025
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/4-analytics-rules.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Types of analytics rules
44
metadata:
55
title: Types of analytics rules
66
description: "Identify different template rules to create analytic rules."
7-
ms.date: 05/15/2023
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/5-create-rule-from-templates.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Create an analytics rule from templates
44
metadata:
55
title: Create an analytics rule from templates
66
description: "Describes the procedure to create an analytics rule from templates."
7-
ms.date: 05/15/2023
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/6-create-rule-from-wizard.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Create an analytics rule from wizard
44
metadata:
55
title: Create an analytics rule from wizard
66
description: "Describes how to create an analytics rule by using the wizard."
7-
ms.date: 05/15/2023
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/7-manage-analytics-rules.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Manage analytics rules
44
metadata:
55
title: Manage analytics rules
66
description: "Describes how to manage and modify analytics rules."
7-
ms.date: 05/15/2023
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/8-exercise-detect-threats.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Exercise - Detect threats with Microsoft Sentinel analytics
44
metadata:
55
title: Exercise - Detect threats with Microsoft Sentinel analytics
66
description: "Detect threats by using Microsoft Sentinel Analytics."
7-
ms.date: 05/15/2023
7+
ms.date: 03/18/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/analyze-data-in-sentinel/includes/2-exercise-setup.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
2-
31
The Threat detection with Microsoft Sentinel Analytics exercise in this module is an optional unit. However, if you want to perform this exercise, you need access to an Azure subscription where you can create Azure resources. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?azure-portal=true) before you begin.
42

53
To deploy the prerequisites for the exercise, perform the following tasks.

learn-pr/wwl-sci/analyze-data-in-sentinel/includes/3-azure-sentinel-analytics-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,11 +61,11 @@ The **Analytics** home page provides the following filters:
6161

6262
- **Severity**. Use to filter the rules by levels of severity.
6363

64-
- **Rule Type**. There are currently six types of rules: Scheduled, NRT (near real time), Fusion, Microsoft Security, ML (machine learning) Behavior Analytics, and Threat Intelligence.
64+
- **Rule Type**. There are currently seven types of rules: Scheduled, NRT (near real time), Fusion, Microsoft Security, ML (machine learning) Behavior Analytics, and Threat Intelligence.
6565

6666
- **Tactics**. Use to filter the rules based on 14 specific methodologies in ATT&CK model.
6767

6868
- **Data Sources**. Use to filter the rules by the data source connector that generates the alert.
6969

7070
> [!NOTE]
71-
> MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
71+
> MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

learn-pr/wwl-sci/analyze-data-in-sentinel/includes/4-analytics-rules.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ By default, Fusion detection is enabled in Microsoft Sentinel. Microsoft is cons
4343

4444
- Microsoft Defender for IoT
4545

46-
- Microsoft Defender XDR
47-
46+
- Microsoft Defender XDR
4847

4948
- Microsoft Defender for Cloud Apps
5049

@@ -68,7 +67,7 @@ Some of the common attack detection scenarios that Fusion alerts identify includ
6867

6968
- **Ransomware**. After a suspicious sign-in to a Microsoft Entra account, unusual user behavior used to encrypt data can trigger a ransomware execution alert.
7069

71-
> [!Note]
70+
> [!NOTE]
7271
> For more information on the Fusion technology in Microsoft Sentinel, see [Advanced multistage attack detection in Microsoft Sentinel](/azure/sentinel/fusion)
7372
7473
## Microsoft security
@@ -93,7 +92,7 @@ You can configure the following security solutions to pass their alerts to Micro
9392

9493
- Microsoft Defender for Endpoint
9594

96-
> [!Note]
95+
> [!NOTE]
9796
> Microsoft unifies security information and event management (SIEM) and extended detection and response (XDR) terminology across their security products.
9897
9998
You can filter these alerts by severity and by specific text that is contained in the alert name.

0 commit comments

Comments
 (0)