Skip to content

Commit 3d90849

Browse files
authored
Merge pull request #276000 from batamig/dashboard-widgets
Sentinel overview / workbook cleanup
2 parents 351054f + 3039337 commit 3d90849

File tree

6 files changed

+138
-112
lines changed

6 files changed

+138
-112
lines changed

articles/sentinel/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -916,10 +916,10 @@
916916
items:
917917
- name: Monitor and visualize data
918918
items:
919-
- name: Visualize collected data
919+
- name: View collected data on the Overview dashboard
920920
href: get-visibility.md
921-
- name: Use Azure Monitor workbooks
922-
href: ./monitor-your-data.md
921+
- name: View customized views with workbooks
922+
href: monitor-your-data.md
923923
- name: Create a Power BI report
924924
href: powerbi.md
925925
- name: Tutorial - Detect threats using analytics rules

articles/sentinel/get-visibility.md

Lines changed: 56 additions & 104 deletions
Original file line numberDiff line numberDiff line change
@@ -1,48 +1,62 @@
11
---
2-
title: Visualize collected data
2+
title: View aggregated data from the Overview | Microsoft Sentinel
33
description: Learn how to quickly view and monitor what's happening across your environment by using Microsoft Sentinel.
4-
author: yelevin
4+
author: batamig
55
ms.topic: how-to
6-
ms.date: 05/19/2024
7-
ms.author: yelevin
6+
ms.date: 05/21/2024
7+
ms.author: bagol
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
11+
ms.collection: usx-security
12+
#customerIntent: As a security analyst, I want to learn how to get an initial view into Microsoft Sentinel data generated for my environment.
813
---
914

10-
# Visualize collected data
15+
# Visualize collected data on the Overview page
1116

12-
In this article, you will learn how to quickly be able to view and monitor what's happening across your environment using Microsoft Sentinel.
17+
After connecting your data sources to Microsoft Sentinel, use the **Overview** page to view, monitor, and analyze activities across your environment. This article describes the widgets and graphs available on Microsoft Sentinel's **Overview** dashboard.
1318

14-
After you connected your data sources to Microsoft Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Microsoft Sentinel gives you workbooks that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use workbook templates or create a new workbook easily, from scratch or based on an existing workbook.
19+
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
1520

16-
## Get visualization
21+
## Prerequisites
1722

18-
To visualize and get analysis of what's happening on your environment, first, take a look at the overview dashboard to get an idea of the security posture of your organization. To help you reduce noise and minimize the number of alerts you have to review and investigate, Microsoft Sentinel uses a fusion technique to correlate alerts into incidents. **Incidents** are groups of related alerts that together create an actionable incident that you can investigate and resolve.
23+
- Make sure that you have reader access to Microsoft Sentinel resources. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
1924

20-
In the Azure portal, select Microsoft Sentinel and then select the workspace you want to monitor.
25+
## Access the Overview page
2126

22-
:::image type="content" source="./media/qs-get-visibility/overview.png" alt-text="Screenshot of the Microsoft Sentinel overview page." lightbox="./media/qs-get-visibility/overview.png":::
27+
If your workspace is onboarded to the unified security operations platform, select **General > Overview**. Otherwise, select **Overview** directly. For example:
2328

24-
If you want to refresh the data for all sections of the dashboard, select **Refresh** at the top of the dashboard. To improve performance, the data for each section of the dashboard is pre-calculated, and you can see the refresh time at the top of each section.
29+
:::image type="content" source="media/get-visibility/dashboard.png" alt-text="Screenshot of the Microsoft Sentinel Overview dashboard.":::
2530

26-
### View incident data
31+
Data for each section of the dashboard is precalculated, and the last refresh time is shown at the top of each section. Select **Refresh** at the top of the page to refresh the entire page.
2732

28-
You see different types of incident data under **Incidents**.
33+
## View incident data
34+
35+
To help reduce noise and minimize the number of alerts you need to review and investigate, Microsoft Sentinel uses a fusion technique to correlate alerts into *incidents*. Incidents are actionable groups of related alerts for you to investigate and resolve.
36+
37+
The following image shows an example of the **Incidents** section on the **Overview** dashboard:
2938

3039
:::image type="content" source="./media/qs-get-visibility/incidents.png" alt-text="Screenshot of the Incidents section in the Microsoft Sentinel Overview page." lightbox="./media/qs-get-visibility/incidents.png":::
31-
32-
- On the top left, you see the number of new, active, and closed incidents over the last 24 hours.
33-
- On the top right, you see incidents organized by severity, and closed incidents by closing classification.
34-
- On the bottom left, a graph breaks up the incident status by creation time, in four hour intervals.
35-
- On the bottom right, you can see the mean time to acknowledge an incident and mean time to close, with a link to the SOC efficiency workbook.
3640

37-
### View automation data
41+
The **Incidents** section lists the following data:
42+
43+
- The number of new, active, and closed incidents over the last 24 hours.
44+
- The total number of incidents of each severity.
45+
- The number of closed incidents of each type of closing classification.
46+
- Incident statuses by creation time, in four hour intervals.
47+
- The mean time to acknowledge an incident and the mean time to close an incident, with a link to the SOC efficiency workbook.
48+
49+
Select **Manage incidents** to jump to the Microsoft Sentinel **Incidents** page for more details.
3850

39-
You see different types of automation data under **Automation**.
51+
## View automation data
52+
53+
After deploying automation with Microsoft Sentinel, monitor your workspace's automation in the **Automation** section of the **Overview** dashboard.
4054

4155
:::image type="content" source="./media/qs-get-visibility/automation.png" alt-text="Screenshot of the Automation section in the Microsoft Sentinel Overview page." lightbox="./media/qs-get-visibility/automation.png":::
4256

43-
- At the top, you see a summary of the automation rules activity: Incidents closed by automation, the time the automation saved, and related playbooks health.
57+
- Start with a summary of the automation rules activity: Incidents closed by automation, the time the automation saved, and related playbooks health.
4458

45-
Microsoft Sentinel calculates the time saved by automation by finding the average time that a single automation saved, multiplied by the number of incidents that were resolved by automation. The formula is as follows:
59+
Microsoft Sentinel calculates the time saved by automation by finding the average time that a single automation saved, multiplied by the number of incidents resolved by automation. The formula is as follows:
4660

4761
`(avgWithout - avgWith) * resolvedByAutomation`
4862

@@ -52,104 +66,42 @@ You see different types of automation data under **Automation**.
5266
- **avgWith** is the average time it takes for an incident to be resolved by automation.
5367
- **resolvedByAutomation** is the number of incidents that are resolved by automation.
5468

69+
- Below the summary, a graph summarizes the numbers of actions performed by automation, by type of action.
5570

56-
- Below the summary, a graph summarizes the numbers of actions performed by automation, by type of action.
57-
58-
- At the bottom, you can find a count of the active automation rules with a link to the automation blade.
71+
- At the bottom of the section, find a count of the active automation rules with a link to the **Automation** page.
5972

73+
Select the **configure automation rules** link to the jump the **Automation** page, where you can configure more automation.
6074

61-
### View status of data records, data collectors, and threat intelligence
75+
## View status of data records, data collectors, and threat intelligence
6276

63-
You see different types of data on data records, data collectors, and threat intelligence under **Data**.
77+
In the **Data** section of the **Overview** dashboard, track information on data records, data collectors, and threat intelligence.
6478

6579
:::image type="content" source="./media/qs-get-visibility/data.png" alt-text="Screenshot of the Data section in the Microsoft Sentinel Overview page." lightbox="./media/qs-get-visibility/data.png":::
6680

67-
- On the left, a graph shows the number of records that Microsoft Sentinel collected in the last 24 hours, compared to the previous 24 hours, and anomalies detected in that time period.
68-
- On the top right, you see a summary of the data connector status, divided by unhealthy and active connectors. **Unhealthy connectors** indicate how many connectors have errors. **Active connectors** are connectors with data streaming into Microsoft Sentinel, as measured by a query included in the connector.
69-
- On the bottom right, you can see threat intelligence records in Microsoft Sentinel, by indicator of compromise.
70-
71-
### View analytics data
72-
73-
You see data for analytics rules under **Analytics**.
74-
75-
:::image type="content" source="./media/qs-get-visibility/analytics.png" alt-text="Screenshot of the Analytics section in the Microsoft Sentinel Overview page.":::
76-
77-
You see the number of analytics rules in Microsoft Sentinel, by enabled, disabled, or auto-disabled status.
78-
79-
## Use workbooks templates<a name="dashboards"></a>
80-
81-
Workbook templates provide integrated data from your connected data sources to let you deep dive into the events generated in those services. Workbook templates include Microsoft Entra ID, Azure activity events, and on-premises, which can be data from Windows Events from servers, from first party alerts, from any third-party including firewall traffic logs, Office 365, and insecure protocols based on Windows events. The workbooks are based on Azure Monitor Workbooks to provide you with enhanced customizability and flexibility in designing your own workbook. For more information, see [Workbooks](../azure-monitor/visualize/workbooks-overview.md).
82-
83-
1. Under **Settings**, select **Workbooks**. Under **My workbooks**, you can see all your saved workbook. Under **Templates**, you can see the workbooks templates that are installed. To find more workbook templates, go to the **Content hub** in Microsoft Sentinel to install product solutions or standalone content.
84-
2. Search for a specific workbook to see the whole list and description of what each offers.
85-
3. Assuming you use Microsoft Entra ID, to get up and running with Microsoft Sentinel, we recommend that you install the Microsoft Entra solution for Microsoft Sentinel and use the following workbooks:
86-
- **Microsoft Entra ID**: Use either or both of the following:
87-
- **Microsoft Entra sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbook provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
88-
- **Microsoft Entra audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
89-
90-
- Install the appropriate solution to add a workbook for your firewall. For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlight suspicious events across entities. Workbooks provide you with information about trends in your traffic and let you drill down into and filter results.
81+
View the following details:
9182

92-
![Palo Alto dashboard](./media/qs-get-visibility/palo-alto-week-query.png)
83+
- The number of records that Microsoft Sentinel collected in the last 24 hours, compared to the previous 24 hours, and anomalies detected in that time period.
9384

85+
- A summary of your data connector status, divided by unhealthy and active connectors. **Unhealthy connectors** indicate how many connectors have errors. **Active connectors** are connectors with data streaming into Microsoft Sentinel, as measured by a query included in the connector.
9486

95-
You can customize the workbooks either by editing the main query ![query edit button](./media/qs-get-visibility/edit-query-button.png). You can click the button ![Log Analytics button](./media/qs-get-visibility/go-to-la-button.png) to go to [Log Analytics to edit the query there](../azure-monitor/logs/log-analytics-tutorial.md), and you can select the ellipsis (...) and select **Customize tile data**, which enables you to edit the main time filter, or remove the specific tiles from the workbook.
87+
- Threat intelligence records in Microsoft Sentinel, by indicator of compromise.
9688

97-
For more information on working with queries, see [Tutorial: Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md)
89+
Select **Manage connectors** to jump to the **Data connectors** page, where you can view and manage your data connectors.
9890

99-
### Add a new tile
91+
## View analytics data
10092

101-
If you want to add a new tile, you can add it to an existing workbook, either one that you create or a Microsoft Sentinel built-in workbook.
102-
1. In Log Analytics, create a tile using the instructions found in [Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md).
103-
2. After the tile is created, under **Pin**, select the workbook in which you want the tile to appear.
93+
Track data for your analytics rules in the **Analytics** section of the **Overview** dashboard.
10494

105-
## Create new workbooks
106-
107-
You can create a new workbook from scratch or use a workbook template as the basis for your new workbook.
108-
109-
1. To create a new workbook from scratch, select **Workbooks** and then **+New workbook**.
110-
1. Select the subscription the workbook is created in and give it a descriptive name. Each workbook is an Azure resource like any other, and you can assign it roles (Azure RBAC) to define and limit who can access.
111-
1. To enable it to show up in your workbooks to pin visualizations to, you have to share it. Click **Share** and then **Manage users**.
112-
1. Use the **Check access** and **Role assignments** as you would for any other Azure resource. For more information, see [Share Azure workbooks by using Azure RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
113-
114-
115-
## New workbook examples
116-
117-
The following sample query enables you to compare trends of traffic across weeks. You can easily switch which device vendor and data source you run the query on. This example uses SecurityEvent from Windows, you can switch it to run on AzureActivity or CommonSecurityLog on any other firewall.
118-
119-
```console
120-
// week over week query
121-
SecurityEvent
122-
| where TimeGenerated > ago(14d)
123-
| summarize count() by bin(TimeGenerated, 1d)
124-
| extend Week = iff(TimeGenerated>ago(7d), "This Week", "Last Week"), TimeGenerated = iff(TimeGenerated>ago(7d), TimeGenerated, TimeGenerated + 7d)
125-
```
126-
127-
You might want to create a query that incorporates data from multiples sources. You can create a query that looks at Microsoft Entra audit logs for new users that were just created, and then checks your Azure logs to see if the user started making role assignment changes within 24 hours of creation. That suspicious activity would show up on this dashboard:
128-
129-
```console
130-
AuditLogs
131-
| where OperationName == "Add user"
132-
| project AddedTime = TimeGenerated, user = tostring(TargetResources[0].userPrincipalName)
133-
| join (AzureActivity
134-
| where OperationName == "Create role assignment"
135-
| project OperationName, RoleAssignmentTime = TimeGenerated, user = Caller) on user
136-
| project-away user1
137-
```
138-
139-
You can create different workbooks based on role of person looking at the data and what they're looking for. For example, you can create a workbook for your network admin that includes the firewall data. You can also create workbooks based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour, for example, you might want to look at your Microsoft Entra sign-ins every hour to search for anomalies.
140-
141-
## Create new detections
142-
143-
Generate detections on the [data sources that you connected to Microsoft Sentinel](connect-data-sources.md) to investigate threats in your organization.
95+
:::image type="content" source="./media/qs-get-visibility/analytics.png" alt-text="Screenshot of the Analytics section in the Microsoft Sentinel Overview page.":::
14496

145-
When you create a new detection, leverage the detections crafted by Microsoft security researchers that are tailored to the data sources you connected.
97+
The number of analytics rules in Microsoft Sentinel are shown by status, including enabled, disabled, and autodisabled.
14698

147-
To view the installed out-of-the-box detections, go to **Analytics** and then **Rule templates**. This tab contains all the installed Microsoft Sentinel rule templates. To find more rule templates, go to the **Content hub** in Microsoft Sentinel to install product solutions or standalone content.
99+
Select the **MITRE view** link to jump to the **MITRE ATT&CK**, where you can view how your environment is protected against MITRE ATT&CK tactics and techniques. Select the **manage analytics rules** link to jump to the **Analytics** page, where you can view and manage the rules that configure how alerts are triggered.
148100

149-
![Use built-in detections to find threats with Microsoft Sentinel](media/tutorial-detect-built-in/view-oob-detections.png)
101+
## Next steps
150102

151-
For more information about getting out-of-the-box detections, see [Get built-in-analytics](detect-threats-built-in.md).
103+
- Use workbook templates to dive deeper into events generated across your environment. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md).
152104

153-
## Next steps
105+
- Turn on Log Analytics query logs to get all queries run from your workspace. For more information, see [Audit Microsoft Sentinel queries and activities](audit-sentinel-data.md).
154106

155-
[Detect threats out-of-the-box](detect-threats-built-in.md) and [create custom threat detection rules](detect-threats-custom.md) to automate your responses to threats.
107+
- Learn about the queries used behind the **Overview** dashboard widgets. For more information, see [Deep dive into Microsoft Sentinel’s new Overview dashboard](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/deep-dive-into-microsoft-sentinel-s-new-overview-dashboard/ba-p/3860688).
139 KB
Loading
800 Bytes
Loading
1.07 KB
Loading

0 commit comments

Comments
 (0)