Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Task 3.6: Configure an Azure Analytics rule for Linux

In this task, you’ll use Sentinel to create a new high priority Scheduled Query Rule for Linux.

The following documents may help you complete this task.


  1. On the Microsoft Sentinel Analytics page, select + Create > Scheduled query rule.

    E2-T1-S3-Create-Scheduled-query-rule.png

  2. On the Analytics rule wizard - Create a new scheduled rule, on the General tab, under Analytics rule details complete the form using the values in the table below:

    Field Value
    Name **Linux Custom Rule**
    Severity High
    Status Enabled

    analytics-rule-wizard-general.png

  3. Select Next: Set rule logic.

  4. On the Set rule logic tab, in the Rule query box, enter the following query.

     Syslog  | where Facility contains "syslog" |where ProcessID == "65536" | project HostName, HostIP, Computer, TimeGenerated, SourceSystem
    

    This query searches for the event code that triggers an incident in Sentinel.

  5. Under Query scheduling, set Run query every to 5 minutes.

    E2-T1-S8-Query-Sched-Minutes.png

  6. To configure the Incident settings select Next : Incident settings >.

  7. On the Incident settings tab, under Incident settings, verify that Create incidents from alerts triggered by this analytics rule is set to Enabled.

    E2-T1-S10-Incident-settings.png

  8. Under Alert grouping, verify that Group related alerts, triggered by this analytics rule, into incidents, is set to Disabled and then select Next: Automated response >.

    E2-T1-S11-Alert-grouping.png

  9. On the Automated response tab select Next: Review + create.

  10. On the Review and create tab, after validation completes, review the settings, then select Save.

    Upon review, if any of the settings are incorrect, select Previous to return to the appropriate tab.

    E2-T1-S13-Review-create-Previous.png

  11. Once complete, the Microsoft Sentinel Analytics page will display.