Skip to content

Commit 538d3c4

Browse files
committed
Essential solutions - new article
1 parent ec60f68 commit 538d3c4

File tree

2 files changed

+87
-3
lines changed

2 files changed

+87
-3
lines changed
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
---
2+
title: Consolidate solution content by deploying Microsoft essential solutions for Microsoft Sentinel
3+
description: Learn about the Microsoft essential solutions for Microsoft Sentinel that span across different ASIM schemas like networks, DNS, and web sessions.
4+
author: cwatson-cat
5+
ms.topic: conceptual
6+
ms.date: 03/08/2023
7+
ms.author: cwatson
8+
#Customer intent: As a security engineer, I want to minimize the amount of solution content I have to deploy and manage by using Microsoft essential solutions for Microsoft Sentinel.
9+
---
10+
11+
## Consolidate solution content by deploying Microsoft essential solutions for Microsoft Sentinel
12+
13+
Microsoft essential solutions are a collection of solutions that....provide centralized content for specific domain categories...? Essential solutions use the normalization technique Advanced Security Information Model (ASIM) to normalize the data at query time or ingestion time. The ingestion time normalization results can be ingested into following normalized table:
14+
15+
- [ASimDnsActivityLogs](/azure/azure-monitor/reference/tables/asimdnsactivitylogs) for the DNS schema.
16+
- [ASimNetworkSessionLogs](/azure/azure-monitor/reference/tables/asimnetworksessionlogs) for the Network Session schema
17+
18+
For more information, see [Ingest time normalization](/azure/sentinel/normalization-ingest-time).
19+
20+
## Why Microsoft essential solutions
21+
22+
Today, we have over 280 product solutions in the content hub. There are multiple product solutions for different domain categories like Security - Network. For example, Azure Firewall, Palo Alto Firewall, and Corelight have product solutions for the Security-Network domain category. These solutions have differing data ingest components by design. But there’s a certain pattern to the analytics, hunting, workbooks, and other content within the same domain category.
23+
24+
For example, most of the major network products have a common basic set of firewall alerts that includes malicious threats coming from unusual IP addresses. The analytic rule template is, in general, duplicated for each of the Security - Network category of product solutions. If you're running multiple network products, you need to check and configure multiple analytic rules individually, which is inefficient. You'd also get alerts for each rule configured and might end up with alert fatigue.
25+
26+
If you have duplicative hunting queries, you might have less performant hunting experiences with the run-all mode of hunting. These duplicative hunting queries also introduce inefficiencies for threat hunters to select-run similar queries.
27+
28+
Microsoft essential solution reduces the amount of content you need to manage or provides efficiencies in....
29+
30+
## ASIM schemas supported
31+
32+
The essentials solutions are currently spanned across the following different ASIM schemas that Sentinel supports:
33+
34+
- Audit event
35+
- Authentication event
36+
- DNS activity
37+
- File activity
38+
- Network session
39+
- Process event
40+
- Web session
41+
42+
For more information, see [Advanced Security Information Model (ASIM) schemas](/azure/sentinel/normalization-about-schemas).
43+
44+
## Connectors not included
45+
46+
The essential solutions don't have a connector of their own. They depend on the source specific connectors to pull in the logs. Then the solutions use the ASIM parsers in their built in analytic rules, hunting queries, and workbooks to identify anomalies. The ASIM parsers provide a consolidated report or dashboard view for all the source specific solutions that were part of prerequisite lists.
47+
48+
## Network session essentials
49+
50+
One of the first solutions available in the essentials series is the network session essential solution. This solution doesn't have a connector of its own. Instead, it uses the ASIM parsers for query time parsing. This solution comes with 7 analytic rules, 4 hunting queries, 1 workbook, 1 playbook, and watchlists.
51+
52+
Analytics rules included:
53+
54+
- Network session traffic anomaly
55+
- Anomaly in port usage
56+
- More than defined port usage
57+
- Excessive number of failed connections from a Single source
58+
- Detect possible flooding
59+
- Possible external to internal port sweep
60+
- Possible port scan
61+
- Potential Beaconing activity
62+
- TI map IP entity to Network Session Events
63+
64+
Hunting queries included:
65+
66+
- Detect Anomaly in port usage
67+
- Detect More than defined port usage
68+
- Detect multiple users with same MAC address
69+
- Destination App and associated standard port mismatch
70+
71+
Workbook:
72+
The workbook covers details for the following listed events.
73+
74+
- Traffic visibility
75+
- Security visibility
76+
- Policy rule
77+
- Network security event viewer
78+
79+
Playbook: Summarization playbook
80+
81+
The playbook summarizes end point security events and stores them in a pre-defined table. This playbook is helpful where you have a high number of end points security events. For example, you might have a high number of events in a large organization where network traffic is being monitoring by multiple source specific network solutions.
82+
83+
By default, this playbook is available as a template. If you have a high number of end point security events on your network and you notice a performance issue when loading the workbook, then enable the playbook template.
84+

articles/sentinel/sentinel-solutions-catalog.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Microsoft Sentinel content hub catalog | Microsoft Docs
33
description: This article lists the solutions currently available in the content hub for Microsoft Sentinel and where to find the full list of solutions.
44
author: cwatson-cat
55
ms.topic: reference
6-
ms.date: 09/29/2022
6+
ms.date: 03/08/2023
77
ms.author: cwatson
8-
ms.custom: ignite-fall-2021
98
---
109

1110
# Microsoft Sentinel content hub catalog
@@ -26,11 +25,12 @@ When you deploy a solution, the security content included with the solution, suc
2625
|---------|---------|---------|---------|
2726
|**[Apache Log4j Vulnerability Detection](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-apachelog4jvulnerability?tab=Overview)** | Analytics rules, hunting queries, workbooks, playbooks, watchlist | Application, Security - Threat Protection, Security - Vulnerability Management | Microsoft|
2827
|**[Cybersecurity Maturity Model Certification (CMMC)](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-cmmcv2?tab=Overview)** | [Analytics rules, workbook, playbook](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-cybersecurity-maturity-model-certification-cmmc/ba-p/2111184) | Compliance | Microsoft|
28+
| **[Deception Honey Tokens](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinelhoneytokens.azuresentinelhoneytokens?tab=Overview)** | [Workbooks, analytics rules, playbooks](monitor-key-vault-honeytokens.md) | Security - Threat Protection |Microsoft |
2929
|**[Dev-0537 Detection and Hunting](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-dev0537detectionandhunting?tab=Overview)**||Security - Threat Protection|Microsoft|
3030
| **[Microsoft Defender for IoT](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview)** | [Analytics rules, playbooks, workbook](iot-advanced-threat-monitoring.md) | Internet of Things (IoT), Security - Threat Protection | Microsoft |
3131
|**[Maturity Model for Event Log Management M2131](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-maturitymodelforeventlogma?tab=Overview)** | [Analytics rules, hunting queries, playbooks, workbook](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/modernize-log-management-with-the-maturity-model-for-event-log/ba-p/3072842) | Compliance | Microsoft|
3232
|**[Microsoft 365 Insider Risk Management](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-insiderriskmanagement?tab=Overview)** (IRM) |[Data connector](data-connectors/microsoft-365-insider-risk-management.md), [workbook, analytics rules, hunting queries, playbook](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/announcing-the-microsoft-sentinel-microsoft-insider-risk/ba-p/2955786) |Security - Insider threat | Microsoft|
33-
| **[Deception Honey Tokens](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinelhoneytokens.azuresentinelhoneytokens?tab=Overview)** | [Workbooks, analytics rules, playbooks](monitor-key-vault-honeytokens.md) | Security - Threat Protection |Microsoft |
33+
|**Network Session Essential Solutions**|[Analytics rules, hunting queries, playbooks, workbook](essential-solutions.md)|Security - Network | Microsoft|
3434
|**[NIST SP 800-53](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-nistsp80053?tab=Overview)**|[Workbooks, analytic rules, playbooks](https://techcommunity.microsoft.com/t5/public-sector-blog/microsoft-sentinel-nist-sp-800-53-solution/ba-p/3401307)|Security - Threat Protection|Microsoft|
3535
|**[Security Threat Essentials](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-securitythreatessentialsol?tab=Overview)**|Analytic rules, Hunting queries|Security - Others|Microsoft|
3636
|**[Zero Trust (TIC 3.0)](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-zerotrust?tab=Overview)** |[Analytics rules, playbook, workbooks](/security/zero-trust/integrate/sentinel-solution) |Compliance, Identity, Security - Others |Microsoft |

0 commit comments

Comments
 (0)