
Microsoft Sentinel in Action
By :

Microsoft Sentinel Analytics is where you set up rules to find potential issues with your environment. You can create various types of rules, each with their own configuration steps and unique options for the types of abnormalities you are trying to detect.
There are currently five types of rules: scheduled, Microsoft Security, machine learning, Fusion, and anomaly. Each type of rule fills a specific niche. Let's explore each of these in turn.
As the name suggests, these rules run on a set schedule to detect suspicious events. For instance, you can have a rule run every few minutes, every hour, every day, or at another interval. The queries for these rules will use KQL to define what they are trying to find. These rules will make up a large proportion of your analytic rules and, if you have used other Security Information and Event Management (SIEM) systems, these are probably the ones...
Change the font size
Change margin width
Change background colour