Skip to content

Commit 1708800

Browse files
Update solutions/security/detect-and-alert/create-detection-rule.md
Co-authored-by: Brandon Morelli <[email protected]>
1 parent 670be52 commit 1708800

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

solutions/security/detect-and-alert/create-detection-rule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -258,9 +258,9 @@ To filter noisy {{ml}} rules, use [rule exceptions](/solutions/security/detect-a
258258
Data in threat indicator indices must be [ECS compatible](/reference/security/fields-and-object-schemas/siem-field-reference.md), and must contain a `@timestamp` field.
259259
::::
260260
261-
4. **Indicator index query**: The query used to retrieve documents from your threat indicator indicies. Field values in these documents are compared against indicator values, according to the threat mapping conditions that you set.
261+
4. **Indicator index query**: The query used to retrieve documents from your threat indicator indices. Field values in these documents are compared against indicator values, according to the threat mapping conditions that you set.
262262
263-
The default KQL query `@timestamp > "now-30d/d"` searches the threat indicator indicies for threat intelligence indicators that were ingested during the past 30 days. The start time is rounded down to the nearest day (resolves to UTC `00:00:00`).
263+
The default KQL query `@timestamp > "now-30d/d"` searches the threat indicator indices for threat intelligence indicators that were ingested during the past 30 days. The start time is rounded down to the nearest day (resolves to UTC `00:00:00`).
264264
265265
5. **Indicator mapping**: Set threat mapping conditions that compare values in source event fields with values in threat indicator fields. Alerts are generated if the conditions are met.
266266

0 commit comments

Comments
 (0)