Azure-Sentinel/Detections
Shain Wray (MSTIC) 9bab7ea76d updating Names and filenames to remove suspect or suspicious and go with preferred terms 2019-09-12 11:29:23 -07:00
..
AWSCloudTrail Fixing typos and updating titles for TI to preview 2019-09-09 07:03:00 -07:00
AuditLogs updating Names and filenames to remove suspect or suspicious and go with preferred terms 2019-09-12 11:29:23 -07:00
AzureActivity update syntax 2019-09-09 14:53:19 +03:00
AzureDiagnostics update syntax 2019-09-09 14:53:19 +03:00
CommonSecurityLog update syntax 2019-09-09 14:53:19 +03:00
DnsEvents update syntax 2019-09-09 14:53:19 +03:00
MultipleDataSources typo fixes in description 2019-09-10 12:38:42 -07:00
OfficeActivity typo fixes in description 2019-09-10 12:38:42 -07:00
SecurityEvent update syntax 2019-09-09 14:53:19 +03:00
SigninLogs updating Names and filenames to remove suspect or suspicious and go with preferred terms 2019-09-12 11:29:23 -07:00
Syslog fix preview prefix (#312) 2019-09-10 11:50:36 +03:00
ThreatIntelligenceIndicator fix preview prefix (#312) 2019-09-10 11:50:36 +03:00
W3CIISLog updating Names and filenames to remove suspect or suspicious and go with preferred terms 2019-09-12 11:29:23 -07:00
readme.md Updating Detections Readme 2019-03-11 10:30:25 -07:00

readme.md

About

  • This folder contains Detections based on different types of data sources that you can leverage in order to create alerts and respond to threats in your environment.
  • These detections are written using KQL query langauge and will provide you a starting point to protect your environment and get familiar with the different data tables.
  • To create the detection in your environment -
    • go to the 'Analytics' section
    • copy the required query
    • update the alert rule parameters according to the detection parameters - copy the name, the description, lookback time, threshold and severity.
    • the query will be simulated and you will be able to immediately see if a you have hits based on the detection.
    • create the alert rule
  • The rule created will run the query on the scheduled time that was defined, and trigger an alert that will be seen both in the SecurityAlert table and in a case in the Cases page

For questions or feedback, please contact AzureSentinel@microsoft.com