Skip to content

Commit 3a49e61

Browse files
committed
trying to get incidents frmo alerts article to update
1 parent f6d0cd7 commit 3a49e61

File tree

5 files changed

+63
-16
lines changed

5 files changed

+63
-16
lines changed

articles/sentinel/create-incidents-from-alerts.md

Lines changed: 46 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,56 @@ ms.date: 09/10/2019
1818
ms.author: rkarlin
1919

2020
---
21-
# Connect incidents from alerts
21+
# Automatically create incidents from Microsoft security alerts
2222

23+
Alerts triggered in Microsoft security solutions that are connected to Azure Sentinel, such as Microsoft Cloud App Security and Azure Advanced Threat Protection, do not
24+
automatically create incidents in Azure Sentinel. By default, when you connect a Microsoft solution to Azure Sentinel, any alert generated in that service will
25+
be stored as raw data in Azure Sentinel, in the Security Alert table in your Azure Sentinel workspace. You can then use that data like any other raw data you
26+
connect into Sentinel.
2327

24-
Alerts triggered in Azure Sentinel that stem from Microsoft solutions, such as Microsoft Cloud App Security and Azure Advanced Threat Protection, are handled differently from other alerts in Azure Sentinel. This article explains the differences.
25-
## Connection to Microsoft security services
26-
During connection to these data sources, you can select whether you want the alerts from these security solutions to automatically stream as raw data into Azure Sentinel and generate alerts.
27-
To work with Microsoft Security solution alerts, under **Analytic rules** select **Microsoft security** rules and choose the alert provider, give a name or description - for example you can call one Cloud App Security alerts. This creates incidents from the raw data that is streamed into Sentinel.
28+
You can easily configure Azure Sentinel to automatically create incidents every time an alert is triggered in a connected Microsoft security solution, by following the
29+
instructions in this article.
2830

29-
When you connect the connector for one of these services, you will be asked in the connection phase if you want to create incidents from alerts and there's a checkbox and you say yes it'll generate this rule automatically and take all the alerts and create incidents from them. Because you can set an alert severity filter, you can create multiple **Microsoft Security** analytic rules. For example, you could create a rule to be considered high severity and set a specific playbook to run for the high severity alerts, while other alerts could trigger merely an informational alert.
31+
## Prerequisites
32+
You must [connect Microsoft security solutions](connect-data-sources.md#data-connection-methods) to enable incident creation from security service alerts.
3033

34+
## Using Microsoft Security incident creation analytic rules
35+
36+
Use the built-in rules available in Azure Sentinel to choose which connected Microsoft security solutions should create Azure Sentinel incidents automatically in real time. You can also edit the rules to define more specific options for filtering which of the alerts generated by the Microsoft security solution should create incidents in Azure Sentinel. For example, you can choose to create Azure Sentinel incidents automatically only from high-severity Azure Security Center alerts.
37+
38+
1. In the Azure portal under Azure Sentinel, select **Analytics**.
39+
40+
1. Select the **Rule templates** tab to see all of the built-in analytic rules.
41+
42+
![Rule templates](media/incidents-from-alerts/rule-templates.png)
43+
44+
1. Choose the **Microsoft security** analytics rule template that you want to use, and click on **Create rule**.
45+
46+
![Security analytics rule](media/incidents-from-alerts/security-analytics-rule.png)
47+
48+
1. You can modify the rule details, and choose to filter the alerts that will create incidents by alert severity or by text contained in the alert’s name.
49+
50+
For example, if you choose **Azure Security Center** in the **Microsoft security service** field and choose **High** in the **Filter by severity** field,
51+
only high severity Azure Security Center alerts will automatically create incidents in Azure Sentinel.
52+
53+
![Create rule wizard](media/incidents-from-alerts/create-rule-wizard.png)
54+
55+
1. You can also create a new **Microsoft security** rule that filters alerts from different Microsoft security services by clicking on **+Create** and
56+
selecting **Microsoft incident creation rule**.
57+
58+
![Incident creation rule](media/incidents-from-alerts/incident-creation-rule.png)
59+
60+
You can create more than one **Microsoft Security** analytic rule per **Microsoft security service** type. This does not create duplicate incidents, since each rule
61+
is used as a filter. Even if an alert matches more than one **Microsoft Security** analytic rule, it creates just one Azure Sentinel incident.
62+
63+
## Enable incident generation automatically during connection
64+
When you connect a Microsoft security solution, you can select whether you want the alerts from the security solution to automatically generate incidents in Azure Sentinel automatically.
65+
66+
1. Connect a Microsoft security solution data source.
67+
68+
![Generate security incidents](media/incidents-from-alerts/generate-security-incidents.png)
69+
70+
1. Under **Create incidents** select **Enable** to enable the default analytic rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under **Analytics** and then **Active rules**.
3171

3272
## Next steps
3373

articles/sentinel/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ After you [connected your data sources](quickstart-onboard.md) to Azure Sentin
5757

5858
To help you reduce noise and minimize the number of alerts you have to review and investigate, Azure Sentinel uses [analytics to correlate alerts into incidents](tutorial-detect-threats-built-in.md). **Incidents** are groups of related alerts that together create an actionable possible-threat that you can investigate and resolve. Use the built-in correlation rules as-is, or use them as a starting point to build your own. Azure Sentinel also provides machine learning rules to map your network behavior and then look for anomalies across your resources. These analytics connect the dots, by combining low fidelity alerts about different entities into potential high-fidelity security incidents.
5959

60-
![Incidents](./media/overview/cases.png)
60+
![Incidents](./media/tutorial-investigate-cases/incident-severity.png)
6161

6262

6363
## Security automation & orchestration
@@ -70,11 +70,11 @@ For example, if you use the ServiceNow ticketing system, you can use the tools p
7070

7171

7272

73-
## Investigation
73+
## Investigation (preview)
7474

7575
Azure Sentinel [deep investigation](tutorial-investigate-cases.md) tools help you to understand the scope and find the root cause, of a potential security threat. You can choose an entity on the interactive graph to ask interesting questions for a specific entity, and drill down into that entity and its connections to get to the root cause of the threat.
7676

77-
![Investigation](./media/overview/investigation.png)
77+
![Investigation](./media/tutorial-investigate-cases/map-timeline.png)
7878

7979

8080
## Hunting

articles/sentinel/quickstart-onboard.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,9 @@ After you connect your data sources, choose from a gallery of expertly created d
3636
- Log Analytics workspace. Learn how to [create a Log Analytics workspace](../log-analytics/log-analytics-quick-create-workspace.md)
3737

3838
- To enable Azure Sentinel, you need contributor permissions to the subscription in which the Azure Sentinel workspace resides.
39-
- To use Azure Sentinel, you need either contributor or reader permissions on the resource group that the workspace belongs to
40-
- Additional permissions may be needed to connect specific data sources
39+
- To use Azure Sentinel, you need either contributor or reader permissions on the resource group that the workspace belongs to.
40+
- Additional permissions may be needed to connect specific data sources.
41+
- Azure Sentinel is a paid service. For pricing information see
4142

4243
## Enable Azure Sentinel <a name="enable"></a>
4344

articles/sentinel/tutorial-detect-threats-custom.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,12 +44,12 @@ You can create custom analytic rules to help you search for the types of threats
4444

4545
![Create query in Azure Sentinel](media/tutorial-detect-threats-custom/settings-tab.png)
4646

47-
Here's a sample query that would alert you when an anomalous number of resources is created in Azure Activity.
47+
Here's a sample query that would alert you when an anomalous number of resources is created in Azure Activity.
4848

49-
AzureActivity
49+
`AzureActivity
5050
\| where OperationName == "Create or Update Virtual Machine" or OperationName =="Create Deployment"
5151
\| where ActivityStatus == "Succeeded"
52-
\| make-series dcount(ResourceId)  default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller
52+
\| make-series dcount(ResourceId)  default=0 on EventSubmissionTimestamp in range(ago(7d), now(), 1d) by Caller`
5353

5454
> [!NOTE]
5555
> The query length should be between 1 and 1,0000 characters and cannot contain “search \*” or “union \*”.
@@ -64,7 +64,7 @@ You can create custom analytic rules to help you search for the types of threats
6464

6565
1. Define alert trigger conditions under **Alert trigger**. Under **Entity mapping**, you can map the columns in your query to entity fields recognized by Azure Sentinel. For each field, map the relevant column in the query you created in Log Analytics to the appropriate entity field. Each entity includes multiple fields, for example SID and GUID. You can map the entity according to any fields, not just the upper level entity.
6666

67-
1. In the **Response automation** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](tutorial-respond-threats-playbook.md).
67+
1. In the **Automate responses** tab, select any playbooks you want to run automatically when an alert is generated by the custom rule. For more information on creating and automating playbooks, see [Respond to threats](tutorial-respond-threats-playbook.md).
6868

6969
![Automate response to threats in Azure Sentinel](media/tutorial-detect-threats-custom/response-automation-custom.png)
7070

articles/sentinel/tutorial-investigate-cases.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,12 @@ ms.author: rkarlin
1919
---
2020
# Tutorial: Investigate incidents with Azure Sentinel
2121

22+
> [!IMPORTANT]
23+
> The investigation graph is currently in public preview.
24+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
25+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26+
27+
2228
This tutorial helps you investigate incidents with Azure Sentinel. After you connected your data sources to Azure Sentinel, you want to be notified when something suspicious happens. To enable you to do this, Azure Sentinel lets you create advanced alert rules, that generate incidents that you can assign and investigate.
2329

2430
This article covers:
@@ -54,7 +60,7 @@ You'll only be able to investigate the incident if you used the entity mapping f
5460

5561
1. Select **Investigate** to view the investigation map.
5662

57-
## Use the investigation graph to deep dive
63+
## Use the investigation graph to deep dive (preview)
5864

5965
The investigation graph enables analysts to ask the right questions for each investigation. The investigation graph helps you understand the scope, and identify the root cause, of a potential security threat by correlating relevant data with any involved entity. You can dive deeper and investigate any entity presented in the graph by selecting it and choosing between different expansion options.
6066

0 commit comments

Comments
 (0)