Skip to content

Commit 06f34f0

Browse files
author
Jill Grant
authored
Merge pull request #278606 from cwatson-cat/6-17-24-ops-guide
Ops guide - move content into new article
2 parents 98b6351 + 5c9dab3 commit 06f34f0

File tree

4 files changed

+65
-46
lines changed

4 files changed

+65
-46
lines changed

articles/sentinel/TOC.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1223,8 +1223,6 @@
12231223
items:
12241224
- name: Service limits
12251225
href: sentinel-service-limits.md
1226-
- name: Compare playbooks, workbooks, and notebooks
1227-
href: resources.md
12281226
- name: Microsoft Sentinel REST-API
12291227
href: /rest/api/securityinsights/
12301228
- name: Management references
@@ -1281,6 +1279,10 @@
12811279
href: normalization-schema-web.md
12821280
- name: Legacy network normalization schema
12831281
href: normalization-schema-v1.md
1282+
- name: Automation and response references
1283+
items:
1284+
- name: SOAR content catalog
1285+
href: sentinel-soar-content.md
12841286
- name: Data collection references
12851287
items:
12861288
- name: Data source schema reference
@@ -1325,12 +1327,10 @@
13251327
href: data-connector-ui-definitions-reference.md
13261328
- name: Data connectors API reference
13271329
href: data-connector-connection-rules-reference.md
1328-
- name: Defender for Cloud Apps alerts not onboarded to Microsoft 365 Defender
1329-
href: ./microsoft-365-defender-sentinel-integration.md#microsoft-defender-xdr-incidents-and-microsoft-incident-creation-rules
1330-
- name: Automation and response references
1331-
items:
1332-
- name: SOAR content catalog
1333-
href: sentinel-soar-content.md
1330+
- name: Compare playbooks, workbooks, and notebooks
1331+
href: resources.md
1332+
- name: Operations guide
1333+
href: ops-guide.md
13341334
- name: Resources
13351335
items:
13361336
- name: Sample workspace architecture

articles/sentinel/best-practices.md

Lines changed: 2 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about best practices to employ when managing your Microsoft S
44
author: cwatson-cat
55
ms.author: cwatson
66
ms.topic: conceptual
7-
ms.date: 05/16/2024
7+
ms.date: 06/28/2024
88
---
99

1010
# Best practices for Microsoft Sentinel
@@ -59,43 +59,9 @@ The following table provides high-level descriptions for how to use Microsoft Se
5959
|Entity behavior | Entity behavior in Microsoft Sentinel allows users to review and investigate actions and alerts for specific entities, such as investigating accounts and host names. For more information, see:<br><br>- [Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](enable-entity-behavior-analytics.md)<br>- [Investigate incidents with UEBA data](investigate-with-ueba.md)<br>- [Microsoft Sentinel UEBA enrichments reference](ueba-reference.md) |
6060
|Watchlists | Use a watchlist that combines data from ingested data and external sources, such as enrichment data. For example, create lists of IP address ranges used by your organization or recently terminated employees. Use watchlists with playbooks to gather enrichment data, such as adding malicious IP addresses to watchlists to use during detection, threat hunting, and investigations. <br><br>During an incident, use watchlists to contain investigation data, and then delete them when your investigation is done to ensure that sensitive data doesn't remain in view. <br><br> For more information, see [Watchlists in Microsoft Sentinel](watchlists.md). |
6161

62-
## Regular SOC activities to perform
63-
64-
Schedule the following Microsoft Sentinel activities regularly to ensure continued security best practices:
65-
66-
### Daily tasks
67-
68-
- **Triage and investigate incidents**. Review the Microsoft Sentinel **Incidents** page to check for new incidents generated by the currently configured analytics rules, and start investigating any new incidents. For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md).
69-
70-
- **Explore hunting queries and bookmarks**. Explore results for all built-in queries, and update existing hunting queries and bookmarks. Manually generate new incidents or update old incidents if applicable. For more information, see:
71-
72-
- [Automatically create incidents from Microsoft security alerts](create-incidents-from-alerts.md)
73-
- [Hunt for threats with Microsoft Sentinel](hunting.md)
74-
- [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md)
75-
76-
- **Analytic rules**. Review and enable new analytics rules as applicable, including both newly released or newly available rules from recently connected data connectors.
77-
78-
- **Data connectors**. Review the status, date, and time of the last log received from each data connector to ensure that data is flowing. Check for new connectors, and review ingestion to ensure set limits aren't exceeded. For more information, see [Data collection best practices](best-practices-data.md) and [Connect data sources](connect-data-sources.md).
79-
80-
- **Log Analytics Agent**. Verify that servers and workstations are actively connected to the workspace, and troubleshoot and remediate any failed connections. For more information, see [Log Analytics Agent overview](../azure-monitor/agents/log-analytics-agent.md).
81-
82-
- **Playbook failures**. Verify playbook run statuses and troubleshoot any failures. For more information, see [Tutorial: Respond to threats by using playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
83-
84-
### Weekly tasks
85-
86-
- **Content review of solutions or standalone content**. Get any content updates for your installed solutions or standalone content from the [Content hub](sentinel-solutions-deploy.md). Review new solutions or standalone content that might be of value for your environment, such as analytics rules, workbooks, hunting queries, or playbooks.
87-
88-
- **Microsoft Sentinel auditing**. Review Microsoft Sentinel activity to see who updated or deleted resources, such as analytics rules, bookmarks, and so on. For more information, see [Audit Microsoft Sentinel queries and activities](audit-sentinel-data.md).
89-
90-
### Monthly tasks
91-
92-
- **Review user access**. Review permissions for your users and check for inactive users. For more information, see [Permissions in Microsoft Sentinel](roles.md).
93-
94-
- **Log Analytics workspace review**. Review that the Log Analytics workspace data retention policy still aligns with your organization's policy. For more information, see [Data retention policy](/workplace-analytics/privacy/license-expiration) and [Integrate Azure Data Explorer for long-term log retention](store-logs-in-azure-data-explorer.md).
95-
96-
9762
## Related content
9863

64+
- [Microsoft Sentinel operational guide](ops-guide.md)
9965
- [On-board Microsoft Sentinel](quickstart-onboard.md)
10066
- [Deployment guide for Microsoft Sentinel](deploy-overview.md)
10167
- [Protecting MSSP intellectual property in Microsoft Sentinel](mssp-protect-intellectual-property.md)

articles/sentinel/deploy-overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the steps to deploy Microsoft Sentinel including the ph
44
author: cwatson-cat
55
ms.author: cwatson
66
ms.topic: conceptual
7-
ms.date: 06/18/2024
7+
ms.date: 06/28/2024
88
ms.service: microsoft-sentinel
99
---
1010

@@ -75,4 +75,6 @@ When you're finished with your deployment of Microsoft Sentinel, continue to exp
7575
- [Respond to threats using automation](tutorial-respond-threats-playbook.md)
7676
- [Extract incident entities with non-native action](tutorial-extract-incident-entities.md)
7777
- [Investigate with UEBA](investigate-with-ueba.md)
78-
- [Build and monitor Zero Trust](sentinel-solution.md)
78+
- [Build and monitor Zero Trust](sentinel-solution.md)
79+
80+
Review the [Microsoft Sentinel operational guide](ops-guide.md) for the regular SOC activities we recommend that you perform daily, weekly, and monthly.

articles/sentinel/ops-guide.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
---
2+
title: Operational guide - Microsoft Sentinel
3+
description: Learn about the operational recommendations to help security operations teams to plan and run security activities.
4+
ms.date: 06/28/2024
5+
ms.topic: reference
6+
ms.author: cwatson
7+
author: cwatson-cat
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
10+
#Customer intent: As a security operations (SOC) team member or security administrator, I want to know what operational activities I should plan to do daily, weekly, and monthly with Microsoft Sentinel to help keep my organization's environment secure.
11+
---
12+
13+
# Microsoft Sentinel operational guide
14+
15+
This article lists the operational activities that we recommend security operations (SOC) teams and security administrators plan for and run as part of their regular security activities with Microsoft Sentinel.
16+
17+
## Daily tasks
18+
19+
Schedule the following activities daily.
20+
21+
|Task|description|
22+
|---|---|
23+
|**Triage and investigate incidents**|Review the Microsoft Sentinel **Incidents** page to check for new incidents generated by the currently configured analytics rules, and start investigating any new incidents. For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md).|
24+
|**Explore hunting queries and bookmarks**|Explore results for all built-in queries, and update existing hunting queries and bookmarks. Manually generate new incidents or update old incidents if applicable. For more information, see:</br></br>- [Automatically create incidents from Microsoft security alerts](create-incidents-from-alerts.md)</br>- [Hunt for threats with Microsoft Sentinel](hunting.md)</br>- [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md)|
25+
|**Analytic rules**|Review and enable new analytics rules as applicable, including both newly released or newly available rules from recently connected data connectors.|
26+
|**Data connectors**| Review the status, date, and time of the last log received from each data connector to ensure that data is flowing. Check for new connectors, and review ingestion to ensure set limits aren't exceeded. For more information, see [Data collection best practices](best-practices-data.md) and [Connect data sources](connect-data-sources.md).|
27+
|**Log Analytics Agent**| Verify that servers and workstations are actively connected to the workspace, and troubleshoot and remediate any failed connections. For more information, see [Log Analytics Agent overview](../azure-monitor/agents/log-analytics-agent.md).|
28+
|**Playbook failures**| Verify playbook run statuses and troubleshoot any failures. For more information, see [Tutorial: Respond to threats by using playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md).|
29+
30+
## Weekly tasks
31+
32+
Schedule the following activities weekly.
33+
34+
|Task|description|
35+
|---|---|
36+
|**Content review of solutions or standalone content**| Get any content updates for your installed solutions or standalone content from the [Content hub](sentinel-solutions-deploy.md). Review new solutions or standalone content that might be of value for your environment, such as analytics rules, workbooks, hunting queries, or playbooks.|
37+
|**Microsoft Sentinel auditing**| Review Microsoft Sentinel activity to see who updated or deleted resources, such as analytics rules, bookmarks, and so on. For more information, see [Audit Microsoft Sentinel queries and activities](audit-sentinel-data.md).|
38+
39+
## Monthly tasks
40+
41+
Schedule the following activities monthly.
42+
43+
|Task|description|
44+
|---|---|
45+
|**Review user access**| Review permissions for your users and check for inactive users. For more information, see [Permissions in Microsoft Sentinel](roles.md).|
46+
|**Log Analytics workspace review**| Review that the Log Analytics workspace data retention policy still aligns with your organization's policy. For more information, see [Data retention policy](/workplace-analytics/privacy/license-expiration) and [Integrate Azure Data Explorer for long-term log retention](store-logs-in-azure-data-explorer.md).|
47+
48+
49+
## Related content
50+
51+
- [Deployment guide for Microsoft Sentinel](deploy-overview.md)

0 commit comments

Comments
 (0)