Darktrace AI Analyst

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule creates Microsoft Sentinel Incidents based on Darktrace AI Analyst Incidents, fetched every 5 minutes.

Attribute Value
Type Analytic Rule
Solution Darktrace
ID ffa2977f-3077-4bba-b1bf-f3417699cbb0
Severity High
Kind NRT
Required Connectors DarktraceRESTConnector
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
darktrace_model_alerts_CL 🔶 ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Darktrace