mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-30 22:27:23 +00:00
Added query as example
Added query in the document as an example. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4904
This commit is contained in:
parent
7ce8990fbc
commit
c9871554bb
@ -36,6 +36,13 @@ In Microsoft Defender Security Center, go to **Advanced hunting** and select an
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>To use a query for a custom detection rule, the query must return the `EventTime`, `MachineId`, and `ReportId` columns in the results. Queries that don’t use the `project` operator to customize results usually return these common columns.
|
>To use a query for a custom detection rule, the query must return the `EventTime`, `MachineId`, and `ReportId` columns in the results. Queries that don’t use the `project` operator to customize results usually return these common columns.
|
||||||
|
|
||||||
|
>[Example]
|
||||||
|
>MiscEvents
|
||||||
|
| where EventTime > ago(7d)
|
||||||
|
| where ActionType == "AntivirusDetection"
|
||||||
|
| summarize (EventTime, ReportId)=arg_max(EventTime, ReportId), count() by MachineId
|
||||||
|
This will fetch latest EventTime and ReportId of the latest event among multiple events returned by the query and adds the count by MachineId.
|
||||||
|
|
||||||
### 2. Create new rule and provide alert details.
|
### 2. Create new rule and provide alert details.
|
||||||
|
|
||||||
With the query in the query editor, select **Create detection rule** and specify the following alert details:
|
With the query in the query editor, select **Create detection rule** and specify the following alert details:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user