Quick threat detection with near-real-time (NRT) analytics rules in Microsoft Sentinel
When you're faced with security threats, time and speed are of the essence. You need to be aware of threats as they materialize so you can analyze and respond quickly to contain them. Microsoft Sentinel's near-real-time (NRT) analytics rules offer you faster threat detection—closer to that of an on-premises SIEM—and the ability to shorten response times in specific scenarios.
Microsoft Sentinel’s near-real-time analytics rules provide up-to-the-minute threat detection out-of-the-box. This type of rule was designed to be highly responsive by running its query at intervals just one minute apart.
How NRT rules work
NRT rules are hard-coded to run once every minute and capture events ingested in the preceding minute, to supply you with information as up-to-the-minute as possible.
Unlike regular scheduled rules that run on a built-in five-minute delay to account for ingestion time lag, NRT rules run on just a two-minute delay, solving the ingestion delay problem by querying on events' ingestion time instead of their generation time at the source (the TimeGenerated field). This results in improvements of both frequency and accuracy in your detections. (To understand this issue more completely, see Query scheduling and alert threshold and Handle ingestion delay in scheduled analytics rules.)
NRT rules have many of the same features and capabilities as scheduled analytics rules. The full set of alert enrichment capabilities is available—you can map entities and surface custom details, and you can configure dynamic content for alert details. You can choose how alerts are grouped into incidents, you can temporarily suppress the running of a query after it generates a result, and you can define automation rules and playbooks to run in response to alerts and incidents generated from the rule.
For the time being, these templates have limited application as outlined below, but the technology is rapidly evolving and growing.
Considerations
The following limitations currently govern the use of NRT rules:
No more than 50 rules can be defined per customer at this time.
By design, NRT rules will only work properly on log sources with an ingestion delay of less than 12 hours.
(Since the NRT rule type is supposed to approximate real-time data ingestion, it doesn't afford you any advantage to use NRT rules on log sources with significant ingestion delay, even if it's far less than 12 hours.)
The syntax for this type of rule is gradually evolving. At this time the following limitations remain in effect:
Because this rule type is in near real time, we have reduced the built-in delay to a minimum (two minutes).
Since NRT rules use the ingestion time rather than the event generation time (represented by the TimeGenerated field), you can safely ignore the data source delay and the ingestion time latency (see above).
Queries can run only within a single workspace. There is no cross-workspace capability.
Event grouping is now configurable to a limited degree. NRT rules can produce up to 30 single-event alerts. A rule with a query that results in more than 30 events will produce alerts for the first 29, then a 30th alert that summarizes all the applicable events.
Queries defined in an NRT rule can now reference more than one table.
Next steps
In this document, you learned how near-real-time (NRT) analytics rules work in Microsoft Sentinel.
- Learn how to create NRT rules.
- Learn about other types of analytics rules.