Creating Analytic Rules
Analytic rule generates a unique alert for each event returned by the query and create incidents. This is useful if you want events to be displayed individually, or if you want to group them by certain parameters—by user, hostname, or something else. You can define these parameters in the query.
Below are the steps to create Analytic Rule
To create an analytic rule, go to Microsoft Sentinel -> <Your Workspace> and go to the Analytics.
Click on Create -> Scheduled query rule.
Enter Rule Name, Description, Severity and tactics.
Enter a query on which you want to create incidents, and add Entity Mapping. In Entity mapping, provide mapping of any Indicator. Example of IP is mentioned below.
Add the name of the Incident here.
Select “Trigger an alert for each event” to generate a new incident for each event.
Click on next and finally save to create the Analytic Rule.
Here is a sample analytic rule you can import in Sentinel