You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/automate-incident-handling-with-automation-rules.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,8 +10,6 @@ ms.custom: ignite-fall-2021
10
10
11
11
# Automate threat response in Microsoft Sentinel with automation rules
12
12
13
-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14
-
15
13
This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations, increasing your SOC's effectiveness and saving you time and resources.
16
14
17
15
## What are automation rules?
@@ -33,7 +31,7 @@ Automation rules apply to the following categories of use cases:
33
31
34
32
- Inspect the contents of an incident (alerts, entities, and other properties) and take further action by calling a playbook.
35
33
36
-
- Automation rules can also be [the mechanism by which you run a playbook](whats-new.md#automation-rules-for-alerts) in response to an **alert***not associated with an incident*.
34
+
- Automation rules can also be [the mechanism by which you run a playbook](whats-new.md#automation-rules-for-alerts-preview) in response to an **alert***not associated with an incident*.
Copy file name to clipboardExpand all lines: articles/sentinel/best-practices-data.md
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,15 @@
1
1
---
2
2
title: Best practices for data collection in Microsoft Sentinel
3
3
description: Learn about best practices to employ when connecting data sources to Microsoft Sentinel.
4
-
author: batamig
5
-
ms.author: bagol
4
+
author: limwainstein
5
+
ms.author: lwainstein
6
6
ms.topic: conceptual
7
7
ms.date: 11/09/2021
8
8
ms.custom: ignite-fall-2021
9
9
---
10
10
11
11
# Data collection best practices
12
12
13
-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14
-
15
13
This section reviews best practices for collecting data using Microsoft Sentinel data connectors. For more information, see [Connect data sources](connect-data-sources.md), [Microsoft Sentinel data connectors reference](data-connectors-reference.md), and the [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md).
16
14
17
15
## Prioritize your data connectors
@@ -57,7 +55,7 @@ Standard configuration for data collection may not work well for your organizati
|**Requires log filtering**| Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features are not supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](identify-threats-with-entity-behavior-analytics.md#entity-pages), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, you'll need to make updates in resources such as threat hunting queries and analytics rules |
58
+
|**Requires log filtering**| Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features are not supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, you'll need to make updates in resources such as threat hunting queries and analytics rules |
61
59
|**Agent cannot be installed**|Use Windows Event Forwarding, supported with the [Azure Monitor Agent](connect-windows-security-events.md#connector-options)| Using Windows Event forwarding lowers load-balancing events per second from the Windows Event Collector, from 10,000 events to 500-1000 events.|
62
60
|**Servers do not connect to the internet**| Use the [Log Analytics gateway](../azure-monitor/agents/gateway.md)| Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
63
61
|**Requires tagging and enrichment at ingestion**|Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support RBAC for custom tables <br><br>Microsoft Sentinel doesn’t support row-level RBAC <br><br>**Tip**: You may want to adopt cross workspace design and functionality for Microsoft Sentinel. |
Copy file name to clipboardExpand all lines: articles/sentinel/entities.md
+6-62Lines changed: 6 additions & 62 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,22 @@
1
1
---
2
-
title: Use entities to classify and analyze data in Microsoft Sentinel | Microsoft Docs
2
+
title: Use entities to classify and analyze data in Microsoft Sentinel
3
3
description: Assign entity classifications (users, hostnames, IP addresses) to data items in Microsoft Sentinel, and use them to compare, analyze, and correlate data from multiple sources.
4
4
author: yelevin
5
5
ms.topic: conceptual
6
-
ms.date: 11/09/2021
6
+
ms.date: 07/26/2022
7
7
ms.author: yelevin
8
8
ms.custom: ignite-fall-2021
9
9
---
10
10
11
11
# Classify and analyze data using entities in Microsoft Sentinel
12
12
13
-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14
-
15
-
## What are entities?
16
-
17
13
When alerts are sent to or generated by Microsoft Sentinel, they contain data items that Sentinel can recognize and classify into categories as **entities**. When Microsoft Sentinel understands what kind of entity a particular data item represents, it knows the right questions to ask about it, and it can then compare insights about that item across the full range of data sources, and easily track it and refer to it throughout the entire Sentinel experience - analytics, investigation, remediation, hunting, and so on. Some common examples of entities are users, hosts, files, processes, IP addresses, and URLs.
18
14
19
-
###Entity identifiers
15
+
## Entity identifiers
20
16
21
17
Microsoft Sentinel supports a wide variety of entity types. Each type has its own unique attributes, including some that can be used to identify a particular entity. These attributes are represented as fields in the entity, and are called **identifiers**. See the full list of supported entities and their identifiers below.
22
18
23
-
####Strong and weak identifiers
19
+
### Strong and weak identifiers
24
20
25
21
As noted just above, for each type of entity there are fields, or sets of fields, that can identify it. These fields or sets of fields can be referred to as **strong identifiers** if they can uniquely identify an entity without any ambiguity, or as **weak identifiers** if they can identify an entity under some circumstances, but are not guaranteed to uniquely identify an entity in all cases. In many cases, though, a selection of weak identifiers can be combined to produce a strong identifier.
26
22
@@ -30,7 +26,7 @@ If, however, one of your resource providers creates an alert in which an entity
30
26
31
27
In order to minimize the risk of this happening, you should verify that all of your alert providers properly identify the entities in the alerts they produce. Additionally, synchronizing user account entities with Azure Active Directory may create a unifying directory, which will be able to merge user account entities.
32
28
33
-
####Supported entities
29
+
### Supported entities
34
30
35
31
The following types of entities are currently identified in Microsoft Sentinel:
When you encounter a user or host entity (IP address entities are in preview) in an entity search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you will find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
76
-
77
-
Entity pages consist of three parts:
78
-
79
-
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Microsoft Defender for Cloud, CEF/Syslog, and Microsoft 365 Defender.
80
-
81
-
- The center panel shows a graphical and textual timeline of notable events related to the entity, such as alerts, bookmarks, [anomalies](soc-ml-anomalies.md), and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
82
-
83
-
- The right-side panel presents behavioral insights on the entity. These insights help to quickly identify [anomalies](soc-ml-anomalies.md) and security threats. The insights are developed by Microsoft security research teams, and are based on anomaly detection models.
84
-
85
-
> [!NOTE]
86
-
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
The timeline is a major part of the entity page's contribution to behavior analytics in Microsoft Sentinel. It presents a story about entity-related events, helping you understand the entity's activity within a specific time frame.
93
-
94
-
You can choose the **time range** from among several preset options (such as *last 24 hours*), or set it to any custom-defined time frame. Additionally, you can set filters that limit the information in the timeline to specific types of events or alerts.
95
-
96
-
The following types of items are included in the timeline:
97
-
98
-
- Alerts - any alerts in which the entity is defined as a **mapped entity**. Note that if your organization has created [custom alerts using analytics rules](./detect-threats-custom.md), you should make sure that the rules' entity mapping is done properly.
99
-
100
-
- Bookmarks - any bookmarks that include the specific entity shown on the page.
101
-
102
-
- Anomalies - UEBA detections based on dynamic baselines created for each entity across various data inputs and against its own historical activities, those of its peers, and those of the organization as a whole.
103
-
104
-
- Activities - aggregation of notable events relating to the entity. A wide range of activities are collected automatically, and you can now [customize this section by adding activities](customize-entity-activities.md) of your own choosing.
105
-
106
-
### Entity Insights
107
-
108
-
Entity insights are queries defined by Microsoft security researchers to help your analysts investigate more efficiently and effectively. The insights are presented as part of the entity page, and provide valuable security information on hosts and users, in the form of tabular data and charts. Having the information here means you don't have to detour to Log Analytics. The insights include data regarding sign-ins, group additions, anomalous events and more, and include advanced ML algorithms to detect anomalous behavior.
109
-
110
-
The insights are based on the following data sources:
111
-
112
-
- Syslog (Linux)
113
-
- SecurityEvent (Windows)
114
-
- AuditLogs (Azure AD)
115
-
- SigninLogs (Azure AD)
116
-
- OfficeActivity (Office 365)
117
-
- BehaviorAnalytics (Microsoft Sentinel UEBA)
118
-
- Heartbeat (Azure Monitor Agent)
119
-
- CommonSecurityLog (Microsoft Sentinel)
120
-
121
-
### How to use entity pages
122
-
123
-
Entity pages are designed to be part of multiple usage scenarios, and can be accessed from incident management, the investigation graph, bookmarks, or directly from the entity search page under **Entity behavior analytics** in the Microsoft Sentinel main menu.
124
-
125
-
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-use-cases.png" alt-text="Entity page use cases":::
126
-
127
-
Entity page information is stored in the **BehaviorAnalytics** table, described in detail in the [Microsoft Sentinel UEBA reference](ueba-reference.md).
71
+
Information about entity pages can now be found at [Investigate entities with entity pages in Microsoft Sentinel](entity-pages.md).
title: Investigate entities with entity pages in Microsoft Sentinel
3
+
description: Use entity pages to get information about entities that you come across in your incident investigations. Gain insights into entity activities and assess risk.
4
+
author: yelevin
5
+
ms.author: yelevin
6
+
ms.topic: conceptual
7
+
ms.date: 07/26/2022
8
+
---
9
+
10
+
# Investigate entities with entity pages in Microsoft Sentinel
11
+
12
+
When you come across a user account, a hostname / IP address, or an Azure resource in an incident investigation, you may decide you want to know more about it. For example, you might want to know its activity history, whether it's appeared in other alerts or incidents, whether it's done anything unexpected or out of character, and so on. In short, you want information that can help you determine what sort of threat these entities represent and guide your investigation accordingly.
13
+
14
+
## Entity pages
15
+
16
+
In these situations, you can select the entity (it will appear as a clickable link) and be taken to an **entity page**, a datasheet full of useful information about that entity. You can also arrive at an entity page by searching directly for entities on the Microsoft Sentinel **entity behavior** page. The types of information you will find on entity pages include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
17
+
18
+
More specifically, entity pages consist of three parts:
19
+
20
+
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Azure Activity, Azure Resource Manager, Microsoft Defender for Cloud, CEF/Syslog, and Microsoft 365 Defender (with all its components).
21
+
22
+
- The center panel shows a [graphical and textual timeline](#the-timeline) of notable events related to the entity, such as alerts, bookmarks, [anomalies](soc-ml-anomalies.md), and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
23
+
24
+
- The right-side panel presents [behavioral insights](#entity-insights) on the entity. These insights are continuously developed by Microsoft security research teams. They are based on various data sources and provide context for the entity and its observed activities, helping you to quickly identify [anomalous behavior](soc-ml-anomalies.md) and security threats.
25
+
26
+
## The timeline
27
+
28
+
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-timeline.png" alt-text="Screenshot of an example of a timeline on an entity page.":::
29
+
30
+
The timeline is a major part of the entity page's contribution to behavior analytics in Microsoft Sentinel. It presents a story about entity-related events, helping you understand the entity's activity within a specific time frame.
31
+
32
+
You can choose the **time range** from among several preset options (such as *last 24 hours*), or set it to any custom-defined time frame. Additionally, you can set filters that limit the information in the timeline to specific types of events or alerts.
33
+
34
+
The following types of items are included in the timeline:
35
+
36
+
- Alerts - any alerts in which the entity is defined as a **mapped entity**. Note that if your organization has created [custom alerts using analytics rules](./detect-threats-custom.md), you should make sure that the rules' entity mapping is done properly.
37
+
38
+
- Bookmarks - any bookmarks that include the specific entity shown on the page.
39
+
40
+
- Anomalies - UEBA detections based on dynamic baselines created for each entity across various data inputs and against its own historical activities, those of its peers, and those of the organization as a whole.
41
+
42
+
- Activities - aggregation of notable events relating to the entity. A wide range of activities are collected automatically, and you can now [customize this section by adding activities](customize-entity-activities.md) of your own choosing.
43
+
44
+
## Entity insights
45
+
46
+
Entity insights are queries defined by Microsoft security researchers to help your analysts investigate more efficiently and effectively. The insights are presented as part of the entity page, and provide valuable security information on hosts and users, in the form of tabular data and charts. Having the information here means you don't have to detour to Log Analytics. The insights include data regarding sign-ins, group additions, anomalous events and more, and include advanced ML algorithms to detect anomalous behavior.
47
+
48
+
The insights are based on the following data sources:
49
+
50
+
- Syslog (Linux)
51
+
- SecurityEvent (Windows)
52
+
- AuditLogs (Azure AD)
53
+
- SigninLogs (Azure AD)
54
+
- OfficeActivity (Office 365)
55
+
- BehaviorAnalytics (Microsoft Sentinel UEBA)
56
+
- Heartbeat (Azure Monitor Agent)
57
+
- CommonSecurityLog (Microsoft Sentinel)
58
+
59
+
## How to use entity pages
60
+
61
+
Entity pages are designed to be part of multiple usage scenarios, and can be accessed from incident management, the investigation graph, bookmarks, or directly from the entity search page under **Entity behavior** in the Microsoft Sentinel main menu.
62
+
63
+
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-use-cases.png" alt-text="Diagram of areas from which you can access entity pages, corresponding with use cases.":::
64
+
65
+
Entity page information is stored in the **BehaviorAnalytics** table, described in detail in the [Microsoft Sentinel UEBA reference](ueba-reference.md).
66
+
67
+
## Supported entity pages
68
+
69
+
Microsoft Sentinel currently offers the following entity pages:
70
+
71
+
- User account
72
+
- Host
73
+
- IP address (**Preview**)
74
+
75
+
> [!NOTE]
76
+
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
77
+
78
+
- Azure resource (**Preview**)
79
+
80
+
## Next steps
81
+
82
+
In this document, you learned about getting information about entities in Microsoft Sentinel using entity pages. For more information about entities and how you can use them, see the following articles:
83
+
84
+
-[Classify and analyze data using entities in Microsoft Sentinel](entities.md).
85
+
-[Customize activities on entity page timelines](customize-entity-activities.md).
86
+
-[Identify advanced threats with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](identify-threats-with-entity-behavior-analytics.md)
87
+
-[Enable entity behavior analytics](./enable-entity-behavior-analytics.md) in Microsoft Sentinel.
0 commit comments