Skip to content

Commit 425a21f

Browse files
committed
SEntinel - rmv conceptual frm create bookmark topic
1 parent 58e779f commit 425a21f

File tree

2 files changed

+15
-33
lines changed

2 files changed

+15
-33
lines changed

articles/sentinel/bookmarks.md

Lines changed: 7 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Use hunting bookmarks for data investigations in Microsoft Sentinel
2+
title: Hunt with bookmarks in Microsoft Sentinel
33
description: This article describes how to use the Microsoft Sentinel hunting bookmarks to keep track of data.
44
ms.author: austinmc
55
author: austinmccollum
66
ms.topic: how-to
7-
ms.date: 03/12/2024
7+
ms.date: 04/23/2024
88
ms.collection: usx-security
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
@@ -13,27 +13,7 @@ appliesto:
1313

1414
# Keep track of data during hunting with Microsoft Sentinel
1515

16-
Threat hunting typically requires reviewing mountains of log data looking for evidence of malicious behavior. During this process, investigators find events that they want to remember, revisit, and analyze as part of validating potential hypotheses and understanding the full story of a compromise.
17-
18-
Hunting bookmarks in Microsoft Sentinel help you by preserving the queries you ran in **Microsoft Sentinel - Logs**, along with the query results that you deem relevant. You can also record your contextual observations and reference your findings by adding notes and tags. Bookmarked data is visible to you and your teammates for easy collaboration.
19-
20-
Now you can identify and address gaps in MITRE ATT&CK technique coverage, across all hunting queries, by mapping your custom hunting queries to MITRE ATT&CK techniques.
21-
22-
Investigate more types of entities while hunting with bookmarks, by mapping the full set of entity types and identifiers supported by Microsoft Sentinel Analytics in your custom queries. Use bookmarks to explore the entities returned in hunting query results using [entity pages](entities.md#entity-pages), [incidents](investigate-cases.md) and the [investigation graph](investigate-cases.md#use-the-investigation-graph-to-deep-dive). If a bookmark captures results from a hunting query, it automatically inherits the query's MITRE ATT&CK technique and entity mappings.
23-
24-
If you find something that urgently needs to be addressed while hunting in your logs, you can easily create a bookmark and either promote it to an incident or add it to an existing incident. For more information about incidents, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md).
25-
26-
If you found something worth bookmarking, but that isn't immediately urgent, you can create a bookmark and then revisit your bookmarked data at any time on the **Bookmarks** tab of the **Hunting** pane. You can use filtering and search options to quickly find specific data for your current investigation.
27-
28-
You can visualize your bookmarked data by selecting **Investigate** from the bookmark details. This launches the investigation experience in which you can view, investigate, and visually communicate your findings using an interactive entity-graph diagram and timeline.
29-
30-
Alternatively, you can view your bookmarked data directly in the **HuntingBookmark** table in your Log Analytics workspace. For example:
31-
32-
:::image type="content" source="media/bookmarks/bookmark-table.png" alt-text="Screenshot of viewing hunting bookmarks table." lightbox="media/bookmarks/bookmark-table.png":::
33-
34-
Viewing bookmarks from the table enables you to filter, summarize, and join bookmarked data with other data sources, making it easy to look for corroborating evidence.
35-
36-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
16+
Hunting bookmarks in Microsoft Sentinel helps you preserve the queries and query results that you deem relevant. You can also record your contextual observations and reference your findings by adding notes and tags. Bookmarked data is visible to you and your teammates for easy collaboration. For more information, see [Bookmarks](hunting.md#bookmarks).
3717

3818
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
3919

@@ -42,7 +22,7 @@ Viewing bookmarks from the table enables you to filter, summarize, and join book
4222
Create a bookmark to preserve the queries, results, your observations, and findings.
4323

4424
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management** select **Hunting**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Hunting**.
45-
25+
1. From the **Hunting** tab, select a hunt.
4626
1. Select one of the hunting queries.
4727
1. In the hunting query details, select **Run Query**.
4828

@@ -115,22 +95,18 @@ Add bookmarks to an incident from the bookmarks tab on the **Hunting** page.
11595
- For a new incident: Optionally update the details for the incident, and then select **Create**.
11696
- For adding a bookmark to an existing incident: Select one incident, and then select **Add**.
11797

118-
As an alternative to the **Incident actions** option on the command bar, you can use the context menu (**...**) for one or more bookmarks to select options to **Create new incident**, **Add to existing incident**, and **Remove from incident**.
119-
120-
To view the bookmark within the incident: Navigate to **Microsoft Sentinel** > **Threat management** > **Incidents** and select the incident with your bookmark. Select **View full details**, and then select the **Bookmarks** tab.
121-
12298
## View bookmarked data in logs
12399

124100
View bookmarked queries, results, or their history.
125101

126-
1. Select the bookmark from the **Hunting** > **Bookmarks** tab.
127-
1. Select the links provided in the details pane:
102+
1. From the **Hunting** > **Bookmarks** tab, select the bookmark.
103+
1. From the details pane, select the following links:
128104

129105
- **View source query** to view the source query in the **Logs** pane.
130106

131107
- **View bookmark logs** to see all bookmark metadata, which includes who made the update, the updated values, and the time the update occurred.
132108

133-
1. View the raw bookmark data for all bookmarks by selecting **Bookmark Logs** from the command bar on the **Hunting** > **Bookmarks** tab:
109+
1. From the command bar on the **Hunting** > **Bookmarks** tab, select **Bookmark Logs** to view the raw bookmark data for all bookmarks.
134110

135111
:::image type="content" source="media/bookmarks/bookmark-logs.png" alt-text="Screenshot of bookmark logs command.":::
136112

articles/sentinel/hunting.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,9 @@ In the example above, start with the table name SecurityEvent and add piped elem
126126
We recommend that your query uses an [Advanced Security Information Model (ASIM) parser](normalization-about-parsers.md) and not a built-in table. This ensures that the query will support any current or future relevant data source rather than a single data source.
127127

128128

129-
## Create bookmarks
129+
## Bookmarks
130+
131+
Threat hunting typically requires reviewing mountains of log data looking for evidence of malicious behavior. During this process, investigators find events that they want to remember, revisit, and analyze as part of validating potential hypotheses and understanding the full story of a compromise.
130132

131133
During the hunting and investigation process, you might come across query results that look unusual or suspicious. Bookmark these items to refer back to them in the future, such as when creating or enriching an incident for investigation. Events such as potential root causes, indicators of compromise, or other notable events should be raised as a bookmark. If a key event you bookmarked is severe enough to warrant an investigation, escalate it to an incident.
132134

@@ -137,10 +139,14 @@ During the hunting and investigation process, you might come across query result
137139

138140
- View all the bookmarked findings by clicking on the **Bookmarks** tab in the main **Hunting** page. Add tags to bookmarks to classify them for filtering. For example, if you're investigating an attack campaign, you can create a tag for the campaign, apply the tag to any relevant bookmarks, and then filter all the bookmarks based on the campaign.
139141

140-
- Investigate a single bookmarked finding by selecting the bookmark and then clicking **Investigate** in the details pane to open the investigation experience. You can also directly select a listed entity to view that entity’s corresponding entity page.
142+
- Investigate a single bookmarked finding by selecting the bookmark and then clicking **Investigate** in the details pane to open the investigation experience. View, investigate, and visually communicate your findings by using an interactive entity-graph diagram and timeline. You can also directly select a listed entity to view that entity’s corresponding entity page.
141143

142144
You can also create an incident from one or more bookmarks, or add one or more bookmarks to an existing incident. Select a checkbox to the left of any bookmarks you want to use, and then select **Incident actions** > **Create new incident** or **Add to existing incident**. Triage and investigate the incident like any other.
145+
- Alternatively, view your bookmarked data directly in the **HuntingBookmark** table in your Log Analytics workspace. For example:
146+
147+
:::image type="content" source="media/bookmarks/bookmark-table.png" alt-text="Screenshot of the hunting bookmarks table in the Log Analytics workspace." lightbox="media/bookmarks/bookmark-table.png":::
143148

149+
Viewing bookmarks from the table enables you to filter, summarize, and join bookmarked data with other data sources, making it easy to look for corroborating evidence.
144150
For more information, see [Use bookmarks in hunting](bookmarks.md).
145151

146152
## Use notebooks to power investigations

0 commit comments

Comments
 (0)