Skip to content

Commit 3ea767d

Browse files
revised mapping docs
1 parent 5667a71 commit 3ea767d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

solutions/security/detect-and-alert/create-detection-rule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,13 +269,13 @@ To filter noisy {{ml}} rules, use [rule exceptions](/solutions/security/detect-a
269269
Only single-value fields are supported.
270270
::::
271271
272-
To define which fields are compared from the indices and how, add a threat mapping entry:
272+
To specify fields to compare from your specified source event and threat indicator indices, create a threat mapping entry and configure the following:
273273
274274
* **Field**: Select a field from your source event indices for comparison.
275275
* **MATCHES/DOES NOT MATCH**: Choose whether the source event field value should match or not match the threat indicator field value that it's being compared to.
276276
277277
::::{note}
278-
When creating a threat mapping, start with the `MATCHES` condition and then add `DOES NOT MATCH` conditions to exclude field values that you want to ignore. Also note that single `DOES NOT MATCH` entries are not supproted.
278+
Define matching (MATCHES) conditions first, narrow down your results even more by adding `DOES NOT MATCH` conditions to exclude field values that you want to ignore. Mapping entries that _only_ use the `DOES NOT MATCH` condition are not supported. When configuring your threat mappings, at least one entry must have a `MATCHES` condition.
279279
::::
280280
281281
* **Indicator index field**: Select a field from your threat indicator index for comparison.

0 commit comments

Comments
 (0)