Мигриране към среща на върха за иновации:
Научете как мигрирането и модернизирането към Azure може да повиши производителността, устойчивостта и защитата на вашия бизнес, което ви позволява да прегърнете напълно ИИ.Регистрирайте се сега
Този браузър вече не се поддържа.
Надстройте до Microsoft Edge, за да се възползвате от най-новите функции, актуализации на защитата и техническа поддръжка.
Microsoft Sentinel in the Azure portal, Microsoft Sentinel in the Microsoft Defender portal
By far the most common type of analytics rule, Scheduled rules are based on Kusto queries that are configured to run at regular intervals and examine raw data from a defined "lookback" period. These queries can perform complex statistical operations on their target data, revealing baselines and outliers in groups of events. If the number of results captured by the query passes the threshold configured in the rule, the rule produces an alert.
Microsoft makes a vast array of analytics rule templates available to you through the many solutions provided in the Content hub, and strongly encourages you to use them to create your rules. The queries in scheduled rule templates are written by security and data science experts, either from Microsoft or from the vendor of the solution providing the template.
This article shows you how to create a scheduled analytics rule using a template.
Важно
Microsoft Sentinel is generally available within Microsoft's unified security operations platform in the Microsoft Defender portal. For preview, Microsoft Sentinel is available in the Defender portal without Microsoft Defender XDR or an E5 license. For more information, see Microsoft Sentinel in the Microsoft Defender portal.
View existing analytics rules
To view the installed analytics rules in Microsoft Sentinel, go to the Analytics page. The Rule templates tab displays all the installed rule templates. To find more rule templates, go to the Content hub in Microsoft Sentinel to install the related product solutions or standalone content.
From the Configuration section of the Microsoft Sentinel navigation menu, select Analytics.
From the Microsoft Defender navigation menu, expand Microsoft Sentinel, then Configuration. Select Analytics.
On the Analytics screen, select the Rule templates tab.
Select a template name, and then select the Create rule button on the details pane to create a new active rule based on that template.
Each template has a list of required data sources. When you open the template, the data sources are automatically checked for availability. If a data source isn't enabled, the Create rule button may be disabled, or you might see a message to that effect.
The rule creation wizard opens. All the details are autofilled.
Cycle through the tabs of the wizard, customizing the logic and other rule settings where possible to better suit your specific needs. For more information, see:
Make sure that you enable all rules associated with your connected data sources in order to ensure full security coverage for your environment. The most efficient way to enable analytics rules is directly from the data connector page, which lists any related rules. For more information, see Connect data sources.
You can also push rules to Microsoft Sentinel via API and PowerShell, although doing so requires additional effort.
When using API or PowerShell, you must first export the rules to JSON before enabling the rules. API or PowerShell may be helpful when enabling rules in multiple instances of Microsoft Sentinel with identical settings in each instance.
Next steps
In this document, you learned how to create scheduled analytics rules from templates in Microsoft Sentinel.
Understand how threat detection works in Microsoft Sentinel. Learn about different types of analytics rules and templates, and the generation of alerts and incidents.
Learn how to manage the relationship between your scheduled analytics rule templates and the rules created from those templates. Merge updates to the templates into your rules, and revert changes in your rules back to the original template.
In this tutorial, learn how to use analytics rules in Microsoft Sentinel to detect exploits of the Apache Log4j vulnerability in any of your susceptible systems. Take advantage of the alert enrichment capabilities to surface as much information as possible for your investigation.