Skip to content

Commit 4345f2e

Browse files
authored
Merge pull request #270475 from batamig/sanity-batami
USX Sentinel appliesto and sanity
2 parents a382313 + 7d2da97 commit 4345f2e

File tree

67 files changed

+270
-99
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+270
-99
lines changed

articles/sentinel/add-advanced-conditions-to-automation-rules.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ ms.topic: how-to
55
author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
8-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
911
ms.collection: usx-security
1012

1113
---
@@ -52,13 +54,13 @@ Let's create a rule that will change the severity of an incoming incident from w
5254

5355
1. Select the trigger **When incident is created**.
5456

55-
1. Under **Conditions**, if you see the **Incident provider** and **Analytics rule name** conditions, leave them as they are. These conditions aren't available if your workspace is onboarded to the unified SOC platform. In either case, we'll add more conditions later in this process.
57+
1. Under **Conditions**, if you see the **Incident provider** and **Analytics rule name** conditions, leave them as they are. These conditions aren't available if your workspace is onboarded to the unified security operations platform. In either case, we'll add more conditions later in this process.
5658

5759
1. Under **Actions**, select **Change severity** from the drop-down list.
5860

5961
1. Select **High** from the drop-down list that appears below **Change severity**.
6062

61-
For example, the following tabs show samples from a workspace that's onboarded to the unified SOC platform, in either the Azure or Defender portals, and a workspace that isn't:
63+
For example, the following tabs show samples from a workspace that's onboarded to the unified security operations platform, in either the Azure or Defender portals, and a workspace that isn't:
6264

6365
### [Onboarded workspaces](#tab/after-onboarding)
6466

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ author: yelevin
66
ms.author: yelevin
77
ms.topic: how-to
88
ms.date: 3/14/2024
9-
appliesto: Microsoft Sentinel in the Azure portal
9+
appliesto:
10+
- Microsoft Sentinel in the Azure portal
1011
ms.collection: usx-security
1112
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
1213
---

articles/sentinel/authenticate-playbooks-to-sentinel.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ ms.topic: how-to
55
author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
8-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
911
ms.collection: usx-security
1012

1113
---

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ ms.topic: conceptual
55
author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
8-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
911
ms.collection: usx-security
1012

1113
---
@@ -103,9 +105,9 @@ The **current state** in this context refers to the moment the condition is eval
103105

104106
The conditions evaluated in rules defined using the trigger **When an incident is updated** include all of those listed for the incident creation trigger. But the update trigger includes more properties that can be evaluated.
105107

106-
One of these properties is **Updated by**. This property lets you track the type of source that made the change in the incident. You can create a condition evaluating whether the incident was updated by one of the following values, depending on whether you've onboarded your workspace to the unified SOC platform:
108+
One of these properties is **Updated by**. This property lets you track the type of source that made the change in the incident. You can create a condition evaluating whether the incident was updated by one of the following values, depending on whether you've onboarded your workspace to the unified security operations platform:
107109

108-
##### [Onboarded to the unified SOC platform](#tab/onboarded)
110+
##### [Onboarded workspaces](#tab/onboarded)
109111

110112
- An application, including applications in both the Azure and Defender portals.
111113
- A user, including changes made by users in both the Azure and Defender portals.
@@ -115,7 +117,7 @@ One of these properties is **Updated by**. This property lets you track the type
115117
- An automation rule
116118
- Other, if none of the above values apply
117119

118-
##### [Not onboarded to the unified SOC platform](#tab/not-onboarded)
120+
##### [Workspaces not onboarded](#tab/not-onboarded)
119121

120122
- An application
121123
- A Microsoft Sentinel user
@@ -142,7 +144,7 @@ Also, if an incident is updated by an automation rule that ran on the incident's
142144
If an incident triggers both create-trigger and update-trigger automation rules, the create-trigger rules will run first, according to their **[Order](#order)** numbers, and then the update-trigger rules will run, according to *their* **Order** numbers.
143145

144146
> [!NOTE]
145-
> After onboarding to the unified SOC platform, if multiple changes are made to the same incident in a five to ten minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.
147+
> After onboarding to the unified security operations platform, if multiple changes are made to the same incident in a five to ten minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.
146148
147149
#### Alert create trigger
148150

@@ -302,7 +304,7 @@ In the specific case of a Managed Security Service Provider (MSSP), where a serv
302304

303305
## Creating and managing automation rules
304306

305-
You can [create and manage automation rules](create-manage-use-automation-rules.md) from different areas in Microsoft Sentinel or the unified SOC platform, depending on your particular need and use case.
307+
You can [create and manage automation rules](create-manage-use-automation-rules.md) from different areas in Microsoft Sentinel or the unified security operations platform, depending on your particular need and use case.
306308

307309
- **Automation page**
308310

articles/sentinel/automate-responses-with-playbooks.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ ms.topic: conceptual
55
author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
8-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
911
ms.collection: usx-security
1012

1113
---
@@ -30,7 +32,7 @@ For example, if an account and machine are compromised, a playbook can isolate t
3032

3133
While the **Active playbooks** tab on the **Automation** page displays all the active playbooks available across any selected subscriptions, by default a playbook can be used only within the subscription to which it belongs, unless you specifically grant Microsoft Sentinel permissions to the playbook's resource group.
3234

33-
After onboarding to the unified SOC platform, the **Active playbooks** tab shows a pre-defined filter with onboarded workspace's subscription. In the Azure portal, add data for other subscriptions using the Azure subscription filter.
35+
After onboarding to the unified security operations platform, the **Active playbooks** tab shows a pre-defined filter with onboarded workspace's subscription. In the Azure portal, add data for other subscriptions using the Azure subscription filter.
3436

3537
### Playbook templates
3638

articles/sentinel/automation.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ ms.topic: conceptual
55
author: batamig
66
ms.author: bagol
77
ms.date: 03/14/2024
8-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
911
ms.collection: usx-security
1012

1113
---
@@ -40,19 +42,19 @@ Playbooks in Microsoft Sentinel are based on workflows built in [Azure Logic App
4042

4143
Learn more with this [complete explanation of playbooks](automate-responses-with-playbooks.md).
4244

43-
## After onboarding to the unified SOC platform
45+
## Automation with the unified security operations platform
4446

45-
After onboarding your Microsoft Sentinel workspace to the unified SOC platform, note the following differences in the way automation functions in your workspace:
47+
After onboarding your Microsoft Sentinel workspace to the unified security operations platform, note the following differences in the way automation functions in your workspace:
4648

4749
|Functionality |Description |
4850
|---------|---------|
49-
|**Automation rules with alert triggers** | In the unified SOC platform, automation rules with alert triggers act only on Microsoft Sentinel alerts. <br><br>For more information, see [Alert create trigger](automate-incident-handling-with-automation-rules.md#alert-create-trigger). |
50-
|**Automation rules with incident triggers** | In both the Azure portal and the unified SOC platform, the **Incident provider** condition property is removed, as all incidents have *Microsoft Defender XDR* as the incident provider. <br><br>At that point, any existing automation rules run on both Microsoft Sentinel and Microsoft Defender XDR incidents, including those where the **Incident provider** condition is set to only *Microsoft Sentinel* or *Microsoft 365 Defender*. <br><br>However, automation rules that specify a specific analytics rule name will run only on the incidents that were created by the specified analytics rule. This means that you can define the **Analytic rule name** condition property to an analytics rule that exists only in Microsoft Sentinel to limit your rule to run on incidents only in Microsoft Sentinel. <br><br>For more information, see [Incident trigger conditions](automate-incident-handling-with-automation-rules.md#conditions). |
51+
|**Automation rules with alert triggers** | In the unified security operations platform, automation rules with alert triggers act only on Microsoft Sentinel alerts. <br><br>For more information, see [Alert create trigger](automate-incident-handling-with-automation-rules.md#alert-create-trigger). |
52+
|**Automation rules with incident triggers** | In both the Azure portal and the unified security operations platform, the **Incident provider** condition property is removed, as all incidents have *Microsoft Defender XDR* as the incident provider. <br><br>At that point, any existing automation rules run on both Microsoft Sentinel and Microsoft Defender XDR incidents, including those where the **Incident provider** condition is set to only *Microsoft Sentinel* or *Microsoft 365 Defender*. <br><br>However, automation rules that specify a specific analytics rule name will run only on the incidents that were created by the specified analytics rule. This means that you can define the **Analytic rule name** condition property to an analytics rule that exists only in Microsoft Sentinel to limit your rule to run on incidents only in Microsoft Sentinel. <br><br>For more information, see [Incident trigger conditions](automate-incident-handling-with-automation-rules.md#conditions). |
5153
|***Updated by* field** | - After onboarding your workspace, the **Updated by** field has a [new set of supported values](automate-incident-handling-with-automation-rules.md#incident-update-trigger), which no longer include *Microsoft 365 Defender*. In existing automation rules, *Microsoft 365 Defender* is replaced by a value of *Other* after onboarding your workspace. <br><br>- If multiple changes are made to the same incident in a 5-10 minute period, a single update is sent to Microsoft Sentinel, with only the most recent change. <br><br>For more information, see [Incident update trigger](automate-incident-handling-with-automation-rules.md#incident-update-trigger). |
5254
|**Automation rules that add incident tasks** | If an automation rule add an incident task, the task is shown only in the Azure portal. |
53-
|**Microsoft incident creation rules** | Microsoft incident creation rules aren't supported in the unified SOC platform. <br><br>For more information, see [Microsoft Defender XDR incidents and Microsoft incident creation rules](microsoft-365-defender-sentinel-integration.md#microsoft-defender-xdr-incidents-and-microsoft-incident-creation-rules). |
54-
|**Active playbooks tab** | After onboarding to the unified SOC platform, by default the **Active playbooks** tab shows a pre-defined filter with onboarded workspace's subscription. Add data for other subscriptions using the subscription filter. <br><br>For more information, see [Create and customize Microsoft Sentinel playbooks from content templates](use-playbook-templates.md). |
55-
|**Running playbooks manually on demand** |The following procedures are not supported in the unified SOC platform: <br><br>- [Run a playbook manually on an alert](tutorial-respond-threats-playbook.md?tabs=LAC%2Cincidents#run-a-playbook-manually-on-an-alert) <br>- [Run a playbook manually on an entity](tutorial-respond-threats-playbook.md?tabs=LAC%2Cincidents#run-a-playbook-manually-on-an-entity-preview) |
55+
|**Microsoft incident creation rules** | Microsoft incident creation rules aren't supported in the unified security operations platform. <br><br>For more information, see [Microsoft Defender XDR incidents and Microsoft incident creation rules](microsoft-365-defender-sentinel-integration.md#microsoft-defender-xdr-incidents-and-microsoft-incident-creation-rules). |
56+
|**Active playbooks tab** | After onboarding to the unified security operations platform, by default the **Active playbooks** tab shows a pre-defined filter with onboarded workspace's subscription. Add data for other subscriptions using the subscription filter. <br><br>For more information, see [Create and customize Microsoft Sentinel playbooks from content templates](use-playbook-templates.md). |
57+
|**Running playbooks manually on demand** |The following procedures are not supported in the unified security operations platform: <br><br>- [Run a playbook manually on an alert](tutorial-respond-threats-playbook.md?tabs=LAC%2Cincidents#run-a-playbook-manually-on-an-alert) <br>- [Run a playbook manually on an entity](tutorial-respond-threats-playbook.md?tabs=LAC%2Cincidents#run-a-playbook-manually-on-an-entity-preview) |
5658

5759

5860
## Next steps

articles/sentinel/billing-monitor-costs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,9 @@ ms.custom: subject-cost-optimization
77
ms.topic: conceptual
88
ms.date: 03/07/2024
99
ms.collection: usx-security
10-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
10+
appliesto:
11+
- Microsoft Sentinel in the Azure portal
12+
- Microsoft Sentinel in the Microsoft Defender portal
1113
---
1214

1315
# Manage and monitor costs for Microsoft Sentinel

articles/sentinel/billing-reduce-costs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,9 @@ ms.author: cwatson
66
ms.custom: subject-cost-optimization
77
ms.topic: conceptual
88
ms.date: 03/07/2024
9-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
9+
appliesto:
10+
- Microsoft Sentinel in the Azure portal
11+
- Microsoft Sentinel in the Microsoft Defender portal
1012
ms.collection: usx-security
1113
---
1214

articles/sentinel/billing.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,9 @@ ms.custom: subject-cost-optimization
77
ms.topic: conceptual
88
ms.date: 03/07/2024
99
ms.collection: usx-security
10-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
10+
appliesto:
11+
- Microsoft Sentinel in the Azure portal
12+
- Microsoft Sentinel in the Microsoft Defender portal
1113
#Customer intent: As a SOC manager, plan Microsoft Sentinel costs so I can understand and optimize the costs of my SIEM.
1214
---
1315

articles/sentinel/bookmarks.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,9 @@ author: austinmccollum
66
ms.topic: how-to
77
ms.date: 03/12/2024
88
ms.collection: usx-security
9-
appliesto: Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
9+
appliesto:
10+
- Microsoft Sentinel in the Azure portal
11+
- Microsoft Sentinel in the Microsoft Defender portal
1012
---
1113

1214
# Keep track of data during hunting with Microsoft Sentinel
@@ -33,6 +35,8 @@ Viewing bookmarks from the table enables you to filter, summarize, and join book
3335

3436
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
3537

38+
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
39+
3640
## Add a bookmark
3741

3842
Create a bookmark to preserve the queries, results, your observations, and findings.

0 commit comments

Comments
 (0)