Skip to content

Commit 2005ca0

Browse files
applies to tag
1 parent 3ea767d commit 2005ca0

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

solutions/security/detect-and-alert/create-detection-rule.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -256,14 +256,14 @@ To filter noisy {{ml}} rules, use [rule exceptions](/solutions/security/detect-a
256256
3. **Indicator index patterns**: The index patterns that stores your threat indicator documents. This field is automatically populated with indices specified in the [`securitySolution:defaultThreatIndex`](/solutions/security/get-started/configure-advanced-settings.md#update-threat-intel-indices) advanced setting.
257257
258258
::::{important}
259-
Data in threat intelligence indicator indices must be [ECS compatible](/reference/security/fields-and-object-schemas/siem-field-reference.md), and must contain a `@timestamp` field.
259+
Data in threat indicator indices must be [ECS compatible](/reference/security/fields-and-object-schemas/siem-field-reference.md), and must contain a `@timestamp` field.
260260
::::
261261
262262
4. **Indicator index query**: The query used to retrieve documents from your threat indicator indicies. Field values in these documents are compared against indicator values, according to the threat mapping conditions that you set.
263263
264264
The default KQL query `@timestamp > "now-30d/d"` searches the threat indicator indicies for threat intelligence indicators that were ingested during the past 30 days. The start time is rounded down to the nearest day (resolves to UTC `00:00:00`).
265265
266-
5. **Indicator mapping**: Set threat mapping conditions that compare values in source event fields with values in threat indicator fields. Alerts are generated if the conditions are met.
266+
5. **Indicator mapping**: Set threat mapping conditions that compare values in source event fields with values in threat indicator fields. Alerts are generated if the conditions are met.
267267
268268
::::{note}
269269
Only single-value fields are supported.
@@ -272,7 +272,7 @@ To filter noisy {{ml}} rules, use [rule exceptions](/solutions/security/detect-a
272272
To specify fields to compare from your specified source event and threat indicator indices, create a threat mapping entry and configure the following:
273273
274274
* **Field**: Select a field from your source event indices for comparison.
275-
* **MATCHES/DOES NOT MATCH**: Choose whether the source event field value should match or not match the threat indicator field value that it's being compared to.
275+
* {applies_to}`stack: ga 9.2` **MATCHES/DOES NOT MATCH**: Choose whether the source event field value should match or not match the threat indicator field value that it's being compared to.
276276
277277
::::{note}
278278
Define matching (MATCHES) conditions first, narrow down your results even more by adding `DOES NOT MATCH` conditions to exclude field values that you want to ignore. Mapping entries that _only_ use the `DOES NOT MATCH` condition are not supported. When configuring your threat mappings, at least one entry must have a `MATCHES` condition.

0 commit comments

Comments
 (0)