Skip to content

Commit 2ae12e6

Browse files
committed
workbooks page
1 parent e6b8ae4 commit 2ae12e6

File tree

3 files changed

+85
-30
lines changed

3 files changed

+85
-30
lines changed
800 Bytes
Loading
1.07 KB
Loading

articles/sentinel/workbooks.md

Lines changed: 85 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -14,59 +14,115 @@ ms.collection: usx-security
1414

1515
# Visualize log and query data with Microsoft Sentinel workbooks
1616

17-
Microsoft Sentinel workbooks add to the
17+
Microsoft Sentinel workbooks are based on Azure Monitor workbooks, and add tables and charts with analytics for your logs and queries to the tools already available in Azure. Create your own workbooks from scratch, based on existing workbooks, or using workbook templates to customize the data you want to see.
1818

19-
Microsoft Sentinel gives you workbooks that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use workbook templates or create a new workbook easily, from scratch or based on an existing workbook.
19+
Workbook templates help you dive deep into the data ingested from your connected data sources, such as:
2020

21-
Workbook templates provide integrated data from your connected data sources to let you deep dive into the events generated in those services. Workbook templates include Microsoft Entra ID, Azure activity events, and on-premises, which can be data from Windows Events from servers, from first party alerts, from any third-party including firewall traffic logs, Office 365, and insecure protocols based on Windows events. The workbooks are based on Azure Monitor Workbooks to provide you with enhanced customizability and flexibility in designing your own workbook. For more information, see [Workbooks](../azure-monitor/visualize/workbooks-overview.md).
21+
- Microsoft Entra ID
22+
- Azure activity events
23+
- On-premises sources, such as Windows Events from servers, first party alerts, or third party alerts, such as firewall traffic logs, Office 365, or insecure protocols based on Windows events
2224

23-
1. Under **Settings**, select **Workbooks**. Under **My workbooks**, you can see all your saved workbook. Under **Templates**, you can see the workbooks templates that are installed. To find more workbook templates, go to the **Content hub** in Microsoft Sentinel to install product solutions or standalone content.
24-
2. Search for a specific workbook to see the whole list and description of what each offers.
25-
3. Assuming you use Microsoft Entra ID, to get up and running with Microsoft Sentinel, we recommend that you install the Microsoft Entra solution for Microsoft Sentinel and use the following workbooks:
26-
- **Microsoft Entra ID**: Use either or both of the following:
27-
- **Microsoft Entra sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbook provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
28-
- **Microsoft Entra audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
25+
Each workbook is an Azure resource like any other, and you can assign it roles (Azure RBAC) to define and limit who can access.
2926

30-
- Install the appropriate solution to add a workbook for your firewall. For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlight suspicious events across entities. Workbooks provide you with information about trends in your traffic and let you drill down into and filter results.
27+
For more information, see [Azure Monitor workbooks](/azure/azure-monitor/visualize/workbooks-overview).
3128

32-
![Palo Alto dashboard](./media/qs-get-visibility/palo-alto-week-query.png)
29+
## Prerequisites
3330

31+
For role requirements to view and create workbooks, see [Roles and permissions in Microsoft Sentinel](roles.md).
3432

35-
You can customize the workbooks either by editing the main query ![query edit button](./media/qs-get-visibility/edit-query-button.png). You can click the button ![Log Analytics button](./media/qs-get-visibility/go-to-la-button.png) to go to [Log Analytics to edit the query there](../azure-monitor/logs/log-analytics-tutorial.md), and you can select the ellipsis (...) and select **Customize tile data**, which enables you to edit the main time filter, or remove the specific tiles from the workbook.
33+
## Access worbkooks
3634

37-
For more information on working with queries, see [Tutorial: Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md)
35+
In Microsoft Sentinel, select **Threat management > Workbooks**.
36+
37+
- View currently saved workbooks on the **My workbooks** tab.
38+
- View installed workbook templates on the **Templates** tab.
3839

39-
### Add a new tile
40+
To find more workbook templates, go to the Microsoft Sentinel **Content hub** to install full solutions or standalone content. For more information, see [About Microsoft Sentinel content and solutions](sentinel-solutions.md).
4041

41-
If you want to add a new tile, you can add it to an existing workbook, either one that you create or a Microsoft Sentinel built-in workbook.
42-
1. In Log Analytics, create a tile using the instructions found in [Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md).
43-
2. After the tile is created, under **Pin**, select the workbook in which you want the tile to appear.
42+
Select a workbook to see a description of what the workbook offers.
4443

4544
## Create new workbooks
4645

47-
You can create a new workbook from scratch or use a workbook template as the basis for your new workbook.
46+
Create new workbooks from scratch or use workbook templates, installed from the **Content hub**, as a basis for your new workbook.
47+
48+
To create a workbook from scratch:
49+
50+
1. In Microsoft Sentinel, select **Threat management > Workbooks > Add workbook**. The workbook opens with a basic analytics query to get started.
51+
52+
1. Select :::image type="icon" source="media/workbooks/save-as.png" border="false"::: **Save as** to save your workbook.
53+
54+
1. In the **Save as** pane on the side, enter a meaningful title for your workbook, and select your subscription, resource group, and location.
55+
56+
If relevant, select to save the workbook to an Azure Storage Account, and enter the storage account details.
57+
58+
1. To have your workbook appear in the list of available workbooks for pinning visualizations, make sure to share your workbook. Select :::image type="icon" source="media/workbooks/share-workbook.png" border="false"::: and select whether you want to grant read-only or write access.
59+
60+
For more information, see [Share Azure workbooks by using Azure RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
61+
62+
## Customize workbooks for your needs
63+
64+
To customize a workbook for your own organization's needs, one that you've created from scratch or installed from a workbook template:
65+
66+
1. Select the workbook you want to customize and select **View saved workbook**.
67+
68+
1. On the workbook page, select **Edit** to open the workbook for editing.
69+
70+
- Select the **TimeRange** filter to view data for a different time range than the current selection.
71+
72+
- For each workbook area, either select **Edit** or select the ellipsis (**...**) to add elements, or move, clone, or remove the area.
73+
74+
For more information on working with queries, see [Tutorial: Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md)
75+
76+
## Create new tiles for your workbooks
77+
78+
To add a custom tile to a Microsoft Sentinel workbook, first create the tile in Log Analytics. For more infomration, see [Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md).
79+
80+
Once the tile's created, select **Pin** and then select the workbook where you want the tile to appear.
81+
82+
## Workbook recommendations
83+
84+
This section reviews basic recommendations we have for using Microsoft Sentinel workbooks.
85+
86+
### Add Microsoft Entra ID workbooks
87+
88+
If you use Microsoft Entra ID with Microsoft Sentinel, we recommend that you install the Microsoft Entra solution for Microsoft Sentinel and use the following workbooks:
89+
90+
- **Microsoft Entra sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbook provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
91+
- **Microsoft Entra audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
92+
93+
### Add firewall workbooks
4894

49-
1. To create a new workbook from scratch, select **Workbooks** and then **+New workbook**.
50-
1. Select the subscription the workbook is created in and give it a descriptive name. Each workbook is an Azure resource like any other, and you can assign it roles (Azure RBAC) to define and limit who can access.
51-
1. To enable it to show up in your workbooks to pin visualizations to, you have to share it. Click **Share** and then **Manage users**.
52-
1. Use the **Check access** and **Role assignments** as you would for any other Azure resource. For more information, see [Share Azure workbooks by using Azure RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
95+
We recommend that you install the appropriate solution from the **Content hub** to add a workbook for your firewall.
5396

97+
For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlight suspicious events across entities.
5498

55-
## New workbook examples
99+
![Screenshot of the Palo Alto workbook](./media/qs-get-visibility/palo-alto-week-query.png)
56100

57-
The following sample query enables you to compare trends of traffic across weeks. You can easily switch which device vendor and data source you run the query on. This example uses SecurityEvent from Windows, you can switch it to run on AzureActivity or CommonSecurityLog on any other firewall.
101+
### Create different workbooks for different uses
58102

59-
```console
103+
We recommend creating different visualizations for each type of persona that uses workbooks, based on the persona's role and what they're looking for. For example, create a workbook for your network admin that includes the firewall data.
104+
105+
Alternately, create workbooks based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour. For example, you might want to look at your Microsoft Entra sign-ins every hour to search for anomalies.
106+
107+
### Sample query for comparing traffic trends across weeks
108+
109+
Use the following query to create a visualization that compares traffic trends across weeks. Switch the device vendor and data source you run the query on, depending on your environment.
110+
111+
The following sample query uses the **SecurityEvent** table from Windows. you might want to switch it to run on the **AzureActivity** or **CommonSecurityLog** table, on any other firewall.
112+
113+
```kusto
60114
// week over week query
61115
SecurityEvent
62116
| where TimeGenerated > ago(14d)
63117
| summarize count() by bin(TimeGenerated, 1d)
64118
| extend Week = iff(TimeGenerated>ago(7d), "This Week", "Last Week"), TimeGenerated = iff(TimeGenerated>ago(7d), TimeGenerated, TimeGenerated + 7d)
65119
```
66120

67-
You might want to create a query that incorporates data from multiples sources. You can create a query that looks at Microsoft Entra audit logs for new users that were just created, and then checks your Azure logs to see if the user started making role assignment changes within 24 hours of creation. That suspicious activity would show up on this dashboard:
121+
### Sample query with data from multiple sources
122+
123+
You might want to create a query that incorporates data from multiples sources. For example, create a query that looks at Microsoft Entra audit logs for new users that were just created, and then checks your Azure logs to see if the user started making role assignment changes within 24 hours of creation. That suspicious activity would show up in a visualization with the following query:
68124

69-
```console
125+
```kusto
70126
AuditLogs
71127
| where OperationName == "Add user"
72128
| project AddedTime = TimeGenerated, user = tostring(TargetResources[0].userPrincipalName)
@@ -76,8 +132,7 @@ AuditLogs
76132
| project-away user1
77133
```
78134

79-
You can create different workbooks based on role of person looking at the data and what they're looking for. For example, you can create a workbook for your network admin that includes the firewall data. You can also create workbooks based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour, for example, you might want to look at your Microsoft Entra sign-ins every hour to search for anomalies.
80-
135+
<!--unclear what this section is doing here. doesn't seem to have any connection to workbooks?
81136
## Create new detections
82137
83138
Generate detections on the [data sources that you connected to Microsoft Sentinel](connect-data-sources.md) to investigate threats in your organization.
@@ -89,7 +144,7 @@ To view the installed out-of-the-box detections, go to **Analytics** and then **
89144
![Use built-in detections to find threats with Microsoft Sentinel](media/tutorial-detect-built-in/view-oob-detections.png)
90145
91146
For more information about getting out-of-the-box detections, see [Get built-in-analytics](detect-threats-built-in.md).
92-
147+
-->
93148

94149
## Next steps
95150

0 commit comments

Comments
 (0)