Skip to content

Commit 47f5656

Browse files
Merge pull request #206027 from yelevin/yelevin/entity-pages
Azure resource entity page
2 parents 3038001 + 757c06a commit 47f5656

11 files changed

+153
-155
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,8 @@
129129
items:
130130
- name: Investigate large datasets
131131
href: investigate-large-datasets.md
132+
- name: Investigate entities with entity pages
133+
href: entity-pages.md
132134
- name: Automate responses
133135
items:
134136
- name: Orchestration, automation, and response

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ ms.custom: ignite-fall-2021
1010

1111
# Automate threat response in Microsoft Sentinel with automation rules
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1513
This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations, increasing your SOC's effectiveness and saving you time and resources.
1614

1715
## What are automation rules?
@@ -33,7 +31,7 @@ Automation rules apply to the following categories of use cases:
3331

3432
- Inspect the contents of an incident (alerts, entities, and other properties) and take further action by calling a playbook.
3533

36-
- Automation rules can also be [the mechanism by which you run a playbook](whats-new.md#automation-rules-for-alerts) in response to an **alert** *not associated with an incident*.
34+
- Automation rules can also be [the mechanism by which you run a playbook](whats-new.md#automation-rules-for-alerts-preview) in response to an **alert** *not associated with an incident*.
3735

3836
> [!IMPORTANT]
3937
>

articles/sentinel/best-practices-data.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,15 @@
11
---
22
title: Best practices for data collection in Microsoft Sentinel
33
description: Learn about best practices to employ when connecting data sources to Microsoft Sentinel.
4-
author: batamig
5-
ms.author: bagol
4+
author: limwainstein
5+
ms.author: lwainstein
66
ms.topic: conceptual
77
ms.date: 11/09/2021
88
ms.custom: ignite-fall-2021
99
---
1010

1111
# Data collection best practices
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1513
This section reviews best practices for collecting data using Microsoft Sentinel data connectors. For more information, see [Connect data sources](connect-data-sources.md), [Microsoft Sentinel data connectors reference](data-connectors-reference.md), and the [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md).
1614

1715
## Prioritize your data connectors
@@ -57,7 +55,7 @@ Standard configuration for data collection may not work well for your organizati
5755

5856
|Challenge / Requirement |Possible solutions |Considerations |
5957
|---------|---------|---------|
60-
|**Requires log filtering** | Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features are not supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](identify-threats-with-entity-behavior-analytics.md#entity-pages), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, you'll need to make updates in resources such as threat hunting queries and analytics rules |
58+
|**Requires log filtering** | Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features are not supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, you'll need to make updates in resources such as threat hunting queries and analytics rules |
6159
|**Agent cannot be installed** |Use Windows Event Forwarding, supported with the [Azure Monitor Agent](connect-windows-security-events.md#connector-options) | Using Windows Event forwarding lowers load-balancing events per second from the Windows Event Collector, from 10,000 events to 500-1000 events.|
6260
|**Servers do not connect to the internet** | Use the [Log Analytics gateway](../azure-monitor/agents/gateway.md) | Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
6361
|**Requires tagging and enrichment at ingestion** |Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support RBAC for custom tables <br><br>Microsoft Sentinel doesn’t support row-level RBAC <br><br>**Tip**: You may want to adopt cross workspace design and functionality for Microsoft Sentinel. |

articles/sentinel/entities.md

Lines changed: 6 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,22 @@
11
---
2-
title: Use entities to classify and analyze data in Microsoft Sentinel | Microsoft Docs
2+
title: Use entities to classify and analyze data in Microsoft Sentinel
33
description: Assign entity classifications (users, hostnames, IP addresses) to data items in Microsoft Sentinel, and use them to compare, analyze, and correlate data from multiple sources.
44
author: yelevin
55
ms.topic: conceptual
6-
ms.date: 11/09/2021
6+
ms.date: 07/26/2022
77
ms.author: yelevin
88
ms.custom: ignite-fall-2021
99
---
1010

1111
# Classify and analyze data using entities in Microsoft Sentinel
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
15-
## What are entities?
16-
1713
When alerts are sent to or generated by Microsoft Sentinel, they contain data items that Sentinel can recognize and classify into categories as **entities**. When Microsoft Sentinel understands what kind of entity a particular data item represents, it knows the right questions to ask about it, and it can then compare insights about that item across the full range of data sources, and easily track it and refer to it throughout the entire Sentinel experience - analytics, investigation, remediation, hunting, and so on. Some common examples of entities are users, hosts, files, processes, IP addresses, and URLs.
1814

19-
### Entity identifiers
15+
## Entity identifiers
2016

2117
Microsoft Sentinel supports a wide variety of entity types. Each type has its own unique attributes, including some that can be used to identify a particular entity. These attributes are represented as fields in the entity, and are called **identifiers**. See the full list of supported entities and their identifiers below.
2218

23-
#### Strong and weak identifiers
19+
### Strong and weak identifiers
2420

2521
As noted just above, for each type of entity there are fields, or sets of fields, that can identify it. These fields or sets of fields can be referred to as **strong identifiers** if they can uniquely identify an entity without any ambiguity, or as **weak identifiers** if they can identify an entity under some circumstances, but are not guaranteed to uniquely identify an entity in all cases. In many cases, though, a selection of weak identifiers can be combined to produce a strong identifier.
2622

@@ -30,7 +26,7 @@ If, however, one of your resource providers creates an alert in which an entity
3026

3127
In order to minimize the risk of this happening, you should verify that all of your alert providers properly identify the entities in the alerts they produce. Additionally, synchronizing user account entities with Azure Active Directory may create a unifying directory, which will be able to merge user account entities.
3228

33-
#### Supported entities
29+
### Supported entities
3430

3531
The following types of entities are currently identified in Microsoft Sentinel:
3632

@@ -72,59 +68,7 @@ Learn [which identifiers strongly identify an entity](entities-reference.md).
7268

7369
## Entity pages
7470

75-
When you encounter a user or host entity (IP address entities are in preview) in an entity search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you will find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
76-
77-
Entity pages consist of three parts:
78-
79-
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Microsoft Defender for Cloud, CEF/Syslog, and Microsoft 365 Defender.
80-
81-
- The center panel shows a graphical and textual timeline of notable events related to the entity, such as alerts, bookmarks, [anomalies](soc-ml-anomalies.md), and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
82-
83-
- The right-side panel presents behavioral insights on the entity. These insights help to quickly identify [anomalies](soc-ml-anomalies.md) and security threats. The insights are developed by Microsoft security research teams, and are based on anomaly detection models.
84-
85-
> [!NOTE]
86-
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
87-
88-
### The timeline
89-
90-
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-timeline.png" alt-text="Entity pages timeline":::
91-
92-
The timeline is a major part of the entity page's contribution to behavior analytics in Microsoft Sentinel. It presents a story about entity-related events, helping you understand the entity's activity within a specific time frame.
93-
94-
You can choose the **time range** from among several preset options (such as *last 24 hours*), or set it to any custom-defined time frame. Additionally, you can set filters that limit the information in the timeline to specific types of events or alerts.
95-
96-
The following types of items are included in the timeline:
97-
98-
- Alerts - any alerts in which the entity is defined as a **mapped entity**. Note that if your organization has created [custom alerts using analytics rules](./detect-threats-custom.md), you should make sure that the rules' entity mapping is done properly.
99-
100-
- Bookmarks - any bookmarks that include the specific entity shown on the page.
101-
102-
- Anomalies - UEBA detections based on dynamic baselines created for each entity across various data inputs and against its own historical activities, those of its peers, and those of the organization as a whole.
103-
104-
- Activities - aggregation of notable events relating to the entity. A wide range of activities are collected automatically, and you can now [customize this section by adding activities](customize-entity-activities.md) of your own choosing.
105-
106-
### Entity Insights
107-
108-
Entity insights are queries defined by Microsoft security researchers to help your analysts investigate more efficiently and effectively. The insights are presented as part of the entity page, and provide valuable security information on hosts and users, in the form of tabular data and charts. Having the information here means you don't have to detour to Log Analytics. The insights include data regarding sign-ins, group additions, anomalous events and more, and include advanced ML algorithms to detect anomalous behavior.
109-
110-
The insights are based on the following data sources:
111-
112-
- Syslog (Linux)
113-
- SecurityEvent (Windows)
114-
- AuditLogs (Azure AD)
115-
- SigninLogs (Azure AD)
116-
- OfficeActivity (Office 365)
117-
- BehaviorAnalytics (Microsoft Sentinel UEBA)
118-
- Heartbeat (Azure Monitor Agent)
119-
- CommonSecurityLog (Microsoft Sentinel)
120-
121-
### How to use entity pages
122-
123-
Entity pages are designed to be part of multiple usage scenarios, and can be accessed from incident management, the investigation graph, bookmarks, or directly from the entity search page under **Entity behavior analytics** in the Microsoft Sentinel main menu.
124-
125-
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-use-cases.png" alt-text="Entity page use cases":::
126-
127-
Entity page information is stored in the **BehaviorAnalytics** table, described in detail in the [Microsoft Sentinel UEBA reference](ueba-reference.md).
71+
Information about entity pages can now be found at [Investigate entities with entity pages in Microsoft Sentinel](entity-pages.md).
12872

12973
## Next steps
13074

articles/sentinel/entity-pages.md

Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
---
2+
title: Investigate entities with entity pages in Microsoft Sentinel
3+
description: Use entity pages to get information about entities that you come across in your incident investigations. Gain insights into entity activities and assess risk.
4+
author: yelevin
5+
ms.author: yelevin
6+
ms.topic: conceptual
7+
ms.date: 07/26/2022
8+
---
9+
10+
# Investigate entities with entity pages in Microsoft Sentinel
11+
12+
When you come across a user account, a hostname / IP address, or an Azure resource in an incident investigation, you may decide you want to know more about it. For example, you might want to know its activity history, whether it's appeared in other alerts or incidents, whether it's done anything unexpected or out of character, and so on. In short, you want information that can help you determine what sort of threat these entities represent and guide your investigation accordingly.
13+
14+
## Entity pages
15+
16+
In these situations, you can select the entity (it will appear as a clickable link) and be taken to an **entity page**, a datasheet full of useful information about that entity. You can also arrive at an entity page by searching directly for entities on the Microsoft Sentinel **entity behavior** page. The types of information you will find on entity pages include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
17+
18+
More specifically, entity pages consist of three parts:
19+
20+
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Azure Activity, Azure Resource Manager, Microsoft Defender for Cloud, CEF/Syslog, and Microsoft 365 Defender (with all its components).
21+
22+
- The center panel shows a [graphical and textual timeline](#the-timeline) of notable events related to the entity, such as alerts, bookmarks, [anomalies](soc-ml-anomalies.md), and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
23+
24+
- The right-side panel presents [behavioral insights](#entity-insights) on the entity. These insights are continuously developed by Microsoft security research teams. They are based on various data sources and provide context for the entity and its observed activities, helping you to quickly identify [anomalous behavior](soc-ml-anomalies.md) and security threats.
25+
26+
## The timeline
27+
28+
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-timeline.png" alt-text="Screenshot of an example of a timeline on an entity page.":::
29+
30+
The timeline is a major part of the entity page's contribution to behavior analytics in Microsoft Sentinel. It presents a story about entity-related events, helping you understand the entity's activity within a specific time frame.
31+
32+
You can choose the **time range** from among several preset options (such as *last 24 hours*), or set it to any custom-defined time frame. Additionally, you can set filters that limit the information in the timeline to specific types of events or alerts.
33+
34+
The following types of items are included in the timeline:
35+
36+
- Alerts - any alerts in which the entity is defined as a **mapped entity**. Note that if your organization has created [custom alerts using analytics rules](./detect-threats-custom.md), you should make sure that the rules' entity mapping is done properly.
37+
38+
- Bookmarks - any bookmarks that include the specific entity shown on the page.
39+
40+
- Anomalies - UEBA detections based on dynamic baselines created for each entity across various data inputs and against its own historical activities, those of its peers, and those of the organization as a whole.
41+
42+
- Activities - aggregation of notable events relating to the entity. A wide range of activities are collected automatically, and you can now [customize this section by adding activities](customize-entity-activities.md) of your own choosing.
43+
44+
## Entity insights
45+
46+
Entity insights are queries defined by Microsoft security researchers to help your analysts investigate more efficiently and effectively. The insights are presented as part of the entity page, and provide valuable security information on hosts and users, in the form of tabular data and charts. Having the information here means you don't have to detour to Log Analytics. The insights include data regarding sign-ins, group additions, anomalous events and more, and include advanced ML algorithms to detect anomalous behavior.
47+
48+
The insights are based on the following data sources:
49+
50+
- Syslog (Linux)
51+
- SecurityEvent (Windows)
52+
- AuditLogs (Azure AD)
53+
- SigninLogs (Azure AD)
54+
- OfficeActivity (Office 365)
55+
- BehaviorAnalytics (Microsoft Sentinel UEBA)
56+
- Heartbeat (Azure Monitor Agent)
57+
- CommonSecurityLog (Microsoft Sentinel)
58+
59+
## How to use entity pages
60+
61+
Entity pages are designed to be part of multiple usage scenarios, and can be accessed from incident management, the investigation graph, bookmarks, or directly from the entity search page under **Entity behavior** in the Microsoft Sentinel main menu.
62+
63+
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-use-cases.png" alt-text="Diagram of areas from which you can access entity pages, corresponding with use cases.":::
64+
65+
Entity page information is stored in the **BehaviorAnalytics** table, described in detail in the [Microsoft Sentinel UEBA reference](ueba-reference.md).
66+
67+
## Supported entity pages
68+
69+
Microsoft Sentinel currently offers the following entity pages:
70+
71+
- User account
72+
- Host
73+
- IP address (**Preview**)
74+
75+
> [!NOTE]
76+
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
77+
78+
- Azure resource (**Preview**)
79+
80+
## Next steps
81+
82+
In this document, you learned about getting information about entities in Microsoft Sentinel using entity pages. For more information about entities and how you can use them, see the following articles:
83+
84+
- [Classify and analyze data using entities in Microsoft Sentinel](entities.md).
85+
- [Customize activities on entity page timelines](customize-entity-activities.md).
86+
- [Identify advanced threats with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](identify-threats-with-entity-behavior-analytics.md)
87+
- [Enable entity behavior analytics](./enable-entity-behavior-analytics.md) in Microsoft Sentinel.
88+
- [Hunt for security threats](./hunting.md).

0 commit comments

Comments
 (0)