You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/create-incidents-from-alerts.md
+46-6Lines changed: 46 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,16 +18,56 @@ ms.date: 09/10/2019
18
18
ms.author: rkarlin
19
19
20
20
---
21
-
# Connect incidents from alerts
21
+
# Automatically create incidents from Microsoft security alerts
22
22
23
+
Alerts triggered in Microsoft security solutions that are connected to Azure Sentinel, such as Microsoft Cloud App Security and Azure Advanced Threat Protection, do not
24
+
automatically create incidents in Azure Sentinel. By default, when you connect a Microsoft solution to Azure Sentinel, any alert generated in that service will
25
+
be stored as raw data in Azure Sentinel, in the Security Alert table in your Azure Sentinel workspace. You can then use that data like any other raw data you
26
+
connect into Sentinel.
23
27
24
-
Alerts triggered in Azure Sentinel that stem from Microsoft solutions, such as Microsoft Cloud App Security and Azure Advanced Threat Protection, are handled differently from other alerts in Azure Sentinel. This article explains the differences.
25
-
## Connection to Microsoft security services
26
-
During connection to these data sources, you can select whether you want the alerts from these security solutions to automatically stream as raw data into Azure Sentinel and generate alerts.
27
-
To work with Microsoft Security solution alerts, under **Analytic rules** select **Microsoft security** rules and choose the alert provider, give a name or description - for example you can call one Cloud App Security alerts. This creates incidents from the raw data that is streamed into Sentinel.
28
+
You can easily configure Azure Sentinel to automatically create incidents every time an alert is triggered in a connected Microsoft security solution, by following the
29
+
instructions in this article.
28
30
29
-
When you connect the connector for one of these services, you will be asked in the connection phase if you want to create incidents from alerts and there's a checkbox and you say yes it'll generate this rule automatically and take all the alerts and create incidents from them. Because you can set an alert severity filter, you can create multiple **Microsoft Security** analytic rules. For example, you could create a rule to be considered high severity and set a specific playbook to run for the high severity alerts, while other alerts could trigger merely an informational alert.
31
+
## Prerequisites
32
+
You must [connect Microsoft security solutions](connect-data-sources.md#data-connection-methods) to enable incident creation from security service alerts.
30
33
34
+
## Using Microsoft Security incident creation analytic rules
35
+
36
+
Use the built-in rules available in Azure Sentinel to choose which connected Microsoft security solutions should create Azure Sentinel incidents automatically in real time. You can also edit the rules to define more specific options for filtering which of the alerts generated by the Microsoft security solution should create incidents in Azure Sentinel. For example, you can choose to create Azure Sentinel incidents automatically only from high-severity Azure Security Center alerts.
37
+
38
+
1. In the Azure portal under Azure Sentinel, select **Analytics**.
39
+
40
+
1. Select the **Rule templates** tab to see all of the built-in analytic rules.
1. You can modify the rule details, and choose to filter the alerts that will create incidents by alert severity or by text contained in the alert’s name.
49
+
50
+
For example, if you choose **Azure Security Center** in the **Microsoft security service** field and choose **High** in the **Filter by severity** field,
51
+
only high severity Azure Security Center alerts will automatically create incidents in Azure Sentinel.
You can create more than one **Microsoft Security** analytic rule per **Microsoft security service** type. This does not create duplicate incidents, since each rule
61
+
is used as a filter. Even if an alert matches more than one **Microsoft Security** analytic rule, it creates just one Azure Sentinel incident.
62
+
63
+
## Enable incident generation automatically during connection
64
+
When you connect a Microsoft security solution, you can select whether you want the alerts from the security solution to automatically generate incidents in Azure Sentinel automatically.
65
+
66
+
1. Connect a Microsoft security solution data source.
1. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
Copy file name to clipboardExpand all lines: articles/sentinel/overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ After you [connected your data sources](quickstart-onboard.md) to Azure Sentin
57
57
58
58
To help you reduce noise and minimize the number of alerts you have to review and investigate, Azure Sentinel uses [analytics to correlate alerts into incidents](tutorial-detect-threats-built-in.md). **Incidents** are groups of related alerts that together create an actionable possible-threat that you can investigate and resolve. Use the built-in correlation rules as-is, or use them as a starting point to build your own. Azure Sentinel also provides machine learning rules to map your network behavior and then look for anomalies across your resources. These analytics connect the dots, by combining low fidelity alerts about different entities into potential high-fidelity security incidents.
@@ -70,11 +70,11 @@ For example, if you use the ServiceNow ticketing system, you can use the tools p
70
70
71
71
72
72
73
-
## Investigation
73
+
## Investigation (preview)
74
74
75
75
Azure Sentinel [deep investigation](tutorial-investigate-cases.md) tools help you to understand the scope and find the root cause, of a potential security threat. You can choose an entity on the interactive graph to ask interesting questions for a specific entity, and drill down into that entity and its connections to get to the root cause of the threat.
Copy file name to clipboardExpand all lines: articles/sentinel/tutorial-detect-threats-custom.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,12 +44,12 @@ You can create custom analytic rules to help you search for the types of threats
44
44
45
45

46
46
47
-
Here's a sample query that would alert you when an anomalous number of resources is created in Azure Activity.
47
+
Here's a sample query that would alert you when an anomalous number of resources is created in Azure Activity.
48
48
49
-
AzureActivity
49
+
`AzureActivity
50
50
\| where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment"
51
51
\| where ActivityStatus == "Succeeded"
52
-
\| make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller
52
+
\| make-series dcount(ResourceId) default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller`
53
53
54
54
> [!NOTE]
55
55
> The query length should be between 1 and 1,0000 characters and cannot contain “search \*” or “union \*”.
@@ -64,7 +64,7 @@ You can create custom analytic rules to help you search for the types of threats
64
64
65
65
1. Define alert trigger conditions under **Alert trigger**. Under **Entity mapping**, you can map the columns in your query to entity fields recognized by Azure Sentinel. For each field, map the relevant column in the query you created in Log Analytics to the appropriate entity field. Each entity includes multiple fields, for example SID and GUID. You can map the entity according to any fields, not just the upper level entity.
66
66
67
-
1. In the **Response automation** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](tutorial-respond-threats-playbook.md).
67
+
1. In the **Automate responses** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](tutorial-respond-threats-playbook.md).
68
68
69
69

Copy file name to clipboardExpand all lines: articles/sentinel/tutorial-investigate-cases.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,12 @@ ms.author: rkarlin
19
19
---
20
20
# Tutorial: Investigate incidents with Azure Sentinel
21
21
22
+
> [!IMPORTANT]
23
+
> The investigation graph is currently in public preview.
24
+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
25
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26
+
27
+
22
28
This tutorial helps you investigate incidents with Azure Sentinel. After you connected your data sources to Azure Sentinel, you want to be notified when something suspicious happens. To enable you to do this, Azure Sentinel lets you create advanced alert rules, that generate incidents that you can assign and investigate.
23
29
24
30
This article covers:
@@ -54,7 +60,7 @@ You'll only be able to investigate the incident if you used the entity mapping f
54
60
55
61
1. Select **Investigate** to view the investigation map.
56
62
57
-
## Use the investigation graph to deep dive
63
+
## Use the investigation graph to deep dive (preview)
58
64
59
65
The investigation graph enables analysts to ask the right questions for each investigation. The investigation graph helps you understand the scope, and identify the root cause, of a potential security threat by correlating relevant data with any involved entity. You can dive deeper and investigate any entity presented in the graph by selecting it and choosing between different expansion options.
0 commit comments