May 18 2022 12:25 AM
Hello,
There is a problem with an analytic rule i have created to correlate between ThreatIntelligenceIndicator & DeviceNetworkEvents, when i run the KQL query of the analytic in Log Hunting there are events in the result as shown in the photo.
But, when i tried to simulate the results from Analytic rule configuration, no data appear.
Also, when i clicked on view query results no result data appeared also, but as shown the time range is changed to custom by default.
When i changed the time range to Set in query, result data appeared.
Is there any changes i should do to make the event simulated as an incident in the analytic rule?
Thank you.
May 18 2022 02:50 AM
May 18 2022 04:41 AM
May 18 2022 05:14 AM
SolutionMay 18 2022 08:22 AM
May 22 2022 10:59 PM
May 23 2022 01:35 AM
May 23 2022 01:48 AM
May 23 2022 02:04 AM
May 18 2022 05:14 AM
Solution