Skip to content

Commit c3dc97b

Browse files
More changes
1 parent 9aa775a commit c3dc97b

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

solutions/security/detect-and-alert/create-detection-rule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -259,14 +259,14 @@ To filter noisy {{ml}} rules, use [rule exceptions](/solutions/security/detect-a
259259
::::
260260
261261
4. **Indicator index query**: The query that searches threat intelligence indicator data. The default KQL query `@timestamp > "now-30d/d"` searches the the specified threat intelligence indicator indices for indicators that were ingested during the past 30 days. The start time is rounded down to the nearest day (resolves to UTC `00:00:00`).
262-
5. **Indicator mapping**: Compares the values of the event and indicator fields, and generates an alert if the values match or do not match.
262+
5. **Indicator mapping**: Lets you compare fields from the event and threat intelligence indicator indices to find values that match or do not match.
263263
264264
::::{note}
265265
Only single-value fields are supported.
266266
::::
267267
268268
269-
To define which field values are compared from the indices, add the following:
269+
To define which fields are compared from the indices, add the following:
270270
271271
* **Field**: The field used for comparing values in the {{elastic-sec}} event indices.
272272
* **Indicator index field**: The field used for comparing values in the indicator indices.

0 commit comments

Comments
 (0)