
Summary
This detection rule generates alerts for events logged in Microsoft Sentinel that are stored in the specified index pattern. It is designed to work with Microsoft Sentinel by capturing security data and promoting it to detection alerts in the Elastic platform, allowing for real-time investigation of potential threats. The rule captures alerts generated by Microsoft Sentinel, and offers a structured approach for investigation, including examining event timelines, cross-referencing related alerts, and consulting the Microsoft Sentinel investigation guide. It also outlines strategies for handling false positives and provides steps for responding to genuine threats, such as isolating affected systems and conducting thorough analyses. The rule, which can be configured to trigger at one-minute intervals, allows up to 1000 signals for detection. This enables security analysts to efficiently identify and act upon potential security incidents.
Categories
- Cloud
- Infrastructure
- Endpoint
- Network
Data Sources
- Cloud Service
- Application Log
- Network Traffic
Created: 2025-07-31