Before You Begin
Prerequisites
Ensure you have the following before starting:Microsoft Sentinel Module
Required Permissions
Sentinel Access
Active Data Connectors
Required Roles
| ContraForce Role | Can Deploy Rules | Can Enable Auto-Update | Can Remove Rules |
|---|---|---|---|
| Organization Admin | ✓ | ✓ | ✓ |
| Content Admin | ✓ | ✓ | ✓ |
| Data Source Admin | ✓ | ✓ | ✓ |
| Incident Responder | — | — | — |
| Incident Analyst | — | — | — |
User Roles Reference
Step 1: Access the Content Management System
Navigate to CMS
Select Workspace
View Dashboard

Step 2: Understand the CMS Interface
Dashboard Overview
The CMS interface is organized by data source, with each section showing:| Element | Description |
|---|---|
| Data Source Name | The telemetry source (e.g., Azure AD, Microsoft 365) |
| Available Rules | Total number of detection rules available for this source |
| Deployed Rules | How many rules are currently active in your workspace |
| Updates Available | Rules with newer versions ready to deploy |
Rule List View
Clicking into a data source shows all available rules:
| Column | Description |
|---|---|
| Toggle | Enable/disable switch for the rule |
| Rule Name | Detection rule display name |
| Severity | Low, Medium, or High |
| MITRE Tactics | ATT&CK framework mapping |
| Version | Current rule version (CalVer format) |
| Status | Deployed, Not Deployed, or Update Available |
| Auto-Update | Whether automatic updates are enabled |
Rule Details
Click any rule to view complete details:- Full description of what the rule detects
- MITRE ATT&CK tactics and techniques
- Query frequency and time period
- The actual KQL query (for transparency)
- Version history and changelog
Step 3: Review Your Data Connectors
Before deploying rules, verify which data sources are active in your Sentinel workspace.Check Data Connector Status
Navigate to Data Connectors
Review Connected Sources
Match to CMS Categories
Common Data Source Mappings
| Connector | CMS Data Source Category |
|---|---|
| Azure Active Directory | Azure AD / Entra ID |
| Microsoft 365 | Microsoft 365 |
| Microsoft Defender for Endpoint | Windows Security Events |
| Azure Activity | Azure Activity |
| Azure Security Center | Azure Security Center |
| Syslog | Linux Syslog |
Step 4: Deploy Your First Detection Rules
Start with a focused deployment to familiarize yourself with the process.Recommended Starting Point
We recommend starting with Azure AD / Entra ID rules if you have that connector active. These rules detect:- Suspicious sign-in activity
- Privilege escalation attempts
- Conditional access policy changes
- Service principal abuse
- And more identity-based threats
Deploying Rules
Select Data Source
Review Available Rules
Check Rule Details
Enable Rules
Monitor Deployment

Deployment Status Indicators
| Status | Meaning |
|---|---|
| Not Deployed | Rule is available but not active |
| Deploying | Rule deployment in progress |
| Deployed | Rule is active in your Sentinel workspace |
| Failed | Deployment encountered an error (click for details) |
| Update Available | Newer version exists for a deployed rule |
Step 5: Bulk Deployment (Optional)
Once comfortable with individual deployments, you can enable multiple rules at once.Enable All Rules for a Data Source
Select Data Source
Use Bulk Actions
Confirm Deployment
Monitor Progress
Bulk Deployment Considerations
Start with high-confidence rules
Start with high-confidence rules
Deploy in phases
Deploy in phases
Monitor for false positives
Monitor for false positives
Step 6: Configure Automatic Updates
Keep your detection rules current by enabling automatic updates.Understanding Auto-Update
When enabled, CMS automatically deploys new rule versions when they’re released:- Security improvements — Updated logic to catch new attack variants
- False positive reduction — Refined queries to reduce noise
- Performance optimization — More efficient queries that run faster
Enabling Auto-Update
- Per-Rule
- Bulk Enable
- Workspace Default
Open Rule Details
Toggle Auto-Update
Confirm
Step 7: Deploy to Additional Workspaces
For MSSPs managing multiple customers, replicate your detection coverage across workspaces.Multi-Workspace Deployment
Return to Dashboard
Select Different Workspace
Repeat Deployment
Deployment Templates (Coming Soon)
Step 8: Verify Deployment in Sentinel
Confirm your rules are active in Microsoft Sentinel.Verification Steps
Open Azure Portal
Go to Analytics
View Active Rules
Find CMS Rules
What to Look For
| Verification Point | Expected Result |
|---|---|
| Rule exists in Analytics | Rule appears in Active rules list |
| Rule is enabled | Status shows “Enabled” |
| Rule is running | ”Last run” shows recent timestamp |
| Rule configuration | Query, frequency, and period match CMS settings |
Post-Deployment Checklist
After completing your initial CMS deployment:Document Deployed Rules
Set Up Notifications
Monitor Incident Volume
Review After 7 Days
Tune as Needed
Expand Coverage
Troubleshooting
Common Issues
| Issue | Possible Cause | Solution |
|---|---|---|
| Deployment fails | Permission issue | Verify Sentinel API permissions are granted |
| Deployment fails | Azure API unavailable | Wait and retry—temporary outages happen |
| Rule never fires | No matching data | Verify data connector is active and sending logs |
| Rule never fires | Query period too short | Check if relevant events occurred in the query window |
| Too many incidents | Rule too broad | Consider disabling or requesting rule tuning |
| Can’t see CMS option | Wrong module | Verify XDR + SIEM module is deployed |
| Can’t deploy rules | Insufficient role | Request Data Source Admin or higher role |
Getting Help
If you encounter issues:- Check the error message — CMS provides detailed error information
- Verify permissions — Ensure your role allows rule deployment
- Check Sentinel access — Confirm the ContraForce service principal has API access
- Contact support — Email [email protected] with workspace details
Recommended Deployment Strategy
Phase 1: Foundation (Week 1)
Focus on identity and access:- ✅ Azure AD / Entra ID rules (all severities)
- ✅ Enable auto-update for these rules
- ✅ Monitor for 5-7 days
Phase 2: Expand (Week 2)
Add Microsoft 365 and Azure infrastructure:- ✅ Microsoft 365 rules
- ✅ Azure Activity rules
- ✅ Azure Security Center rules
Phase 3: Complete (Week 3+)
Enable remaining data sources:- ✅ Windows Security Events
- ✅ Linux Syslog
- ✅ Network Security Groups
- ✅ DNS Analytics
- ✅ Any additional connected sources
Phase 4: Optimize (Ongoing)
Continuous improvement:- Review incident quality weekly
- Disable low-value rules
- Enable new rules as they’re released
- Ensure auto-update is enabled for standard rules