Skip to content

Commit 33b6ceb

Browse files
committed
Ops guide - add file
1 parent 99c56d8 commit 33b6ceb

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Operational guide - Microsoft Sentinel
3+
description: Learn about the operational recommendations to help security operations teams to plan and run security activities.
4+
ms.date: 06/18/2024
5+
ms.topic: reference
6+
ms.author: cwatson
7+
author: cwatson-cat
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
10+
---
11+
12+
# Microsoft Sentinel operational guide
13+
14+
This section of the Microsoft Sentinel documentation helps security operations (SOC) teams and security administrators to plan and run regular security activities with Microsoft Sentinel.
15+
16+
## Daily tasks
17+
18+
Schedule the following activities daily.
19+
20+
|Task|description|
21+
|---|---|
22+
|**Triage and investigate incidents**|Review the Microsoft Sentinel **Incidents** page to check for new incidents generated by the currently configured analytics rules, and start investigating any new incidents. For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md).|
23+
|**Explore hunting queries and bookmarks**|Explore results for all built-in queries, and update existing hunting queries and bookmarks. Manually generate new incidents or update old incidents if applicable. For more information, see:</br></br>- [Automatically create incidents from Microsoft security alerts](create-incidents-from-alerts.md)</br>- [Hunt for threats with Microsoft Sentinel](hunting.md)</br>- [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md)|
24+
|**Analytic rules**|Review and enable new analytics rules as applicable, including both newly released or newly available rules from recently connected data connectors.|
25+
|**Data connectors**| Review the status, date, and time of the last log received from each data connector to ensure that data is flowing. Check for new connectors, and review ingestion to ensure set limits aren't exceeded. For more information, see [Data collection best practices](best-practices-data.md) and [Connect data sources](connect-data-sources.md).|
26+
|**Log Analytics Agent**| Verify that servers and workstations are actively connected to the workspace, and troubleshoot and remediate any failed connections. For more information, see [Log Analytics Agent overview](../azure-monitor/agents/log-analytics-agent.md).|
27+
|**Playbook failures**| Verify playbook run statuses and troubleshoot any failures. For more information, see [Tutorial: Respond to threats by using playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md).|
28+
29+
## Weekly tasks
30+
31+
Schedule the following activities weekly.
32+
33+
|Task|description|
34+
|---|---|
35+
|**Content review of solutions or standalone content**| Get any content updates for your installed solutions or standalone content from the [Content hub](sentinel-solutions-deploy.md). Review new solutions or standalone content that might be of value for your environment, such as analytics rules, workbooks, hunting queries, or playbooks.|
36+
|**Microsoft Sentinel auditing**| Review Microsoft Sentinel activity to see who updated or deleted resources, such as analytics rules, bookmarks, and so on. For more information, see [Audit Microsoft Sentinel queries and activities](audit-sentinel-data.md).|
37+
38+
## Monthly tasks
39+
40+
Schedule the following activities monthly.
41+
42+
|Task|description|
43+
|---|---|
44+
|**Review user access**| Review permissions for your users and check for inactive users. For more information, see [Permissions in Microsoft Sentinel](roles.md).|
45+
|**Log Analytics workspace review**| Review that the Log Analytics workspace data retention policy still aligns with your organization's policy. For more information, see [Data retention policy](/workplace-analytics/privacy/license-expiration) and [Integrate Azure Data Explorer for long-term log retention](store-logs-in-azure-data-explorer.md).|
46+
47+
48+
## Related content
49+
50+
- [Deployment guide for Microsoft Sentinel](../deploy-overview.md)

0 commit comments

Comments
 (0)