|
1 | 1 | ---
|
2 |
| -title: Useful resources when working with Microsoft Sentinel |
3 |
| -description: This document provides you with a list of useful resources when working with Microsoft Sentinel. |
4 |
| -author: yelevin |
| 2 | +title: Compare playbooks, workbooks, and notebooks | Microsoft Sentinel |
| 3 | +description: Learn about the differences between playbooks, workbooks, and notebooks in Microsoft Sentinel. |
| 4 | +author: batamig |
5 | 5 | ms.topic: conceptual
|
6 |
| -ms.date: 11/09/2021 |
7 |
| -ms.author: yelevin |
| 6 | +ms.date: 02/26/2024 |
| 7 | +ms.author: bagol |
8 | 8 | ---
|
9 | 9 |
|
10 |
| -# Useful resources for working with Microsoft Sentinel |
| 10 | +# Compare playbooks, workbooks, and notebooks |
11 | 11 |
|
12 |
| -This article lists resources that can help you get more information about working with Microsoft Sentinel. |
| 12 | +This article describes the differences between playbooks, workbooks, and notebooks in Microsoft Sentinel. |
13 | 13 |
|
14 |
| -## Learn more about creating queries |
| 14 | +## Compare by persona |
15 | 15 |
|
16 |
| -Microsoft Sentinel uses Azure Monitor Log Analytics's Kusto Query Language (KQL) to build queries. For more information, see: |
| 16 | +The following table compares Microsoft Sentinel playbooks, workbooks, and notebooks by the user persona: |
17 | 17 |
|
18 |
| -- [Kusto Query Language in Microsoft Sentinel](kusto-overview.md) |
19 |
| -- [Useful resources for working with Kusto Query Language in Microsoft Sentinel](kusto-resources.md) |
| 18 | +|Resource |Description | |
| 19 | +|---------|---------| |
| 20 | +|**Playbooks** | <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> | |
| 21 | +|**Workbooks** | <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> | |
| 22 | +|**Notebooks** | <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> | |
20 | 23 |
|
21 |
| -## Microsoft Sentinel templates for data to monitor |
| 24 | +## Compare by use |
22 | 25 |
|
23 |
| -The [Microsoft Entra Security Operations Guide](../active-directory/fundamentals/security-operations-introduction.md) includes specific guidance and knowledge about data that's important to monitor for security purposes, for several operational areas. |
| 26 | +The following table compares Microsoft Sentinel playbooks, workbooks, and notebooks by use case: |
24 | 27 |
|
25 |
| -In each article, check for sections named [Things to monitor](../active-directory/fundamentals/security-operations-privileged-accounts.md#things-to-monitor) for lists of events that we recommend alerting on and investigating, as well as analytics rule templates to deploy directly to Microsoft Sentinel. |
| 28 | +|Resource |Description | |
| 29 | +|---------|---------| |
| 30 | +|**Playbooks** | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> | |
| 31 | +|**Workbooks** | <ul><li>Visualization</li></ul> | |
| 32 | +|**Notebooks** | <ul><li>Querying Microsoft Sentinel data and external data </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> | |
26 | 33 |
|
27 |
| -## Learn more about creating automation |
28 | 34 |
|
29 |
| -Create automation in Microsoft Sentinel using Azure Logic Apps, with a growing gallery of built-in playbooks. |
| 35 | +## Compare by advantages and challenges |
30 | 36 |
|
31 |
| -For more information, see [Azure Logic Apps connectors](/connectors/). |
| 37 | +The following table compares the advantages and disadvantages of playbooks, workbooks, and notebooks in Microsoft Sentinel: |
32 | 38 |
|
33 |
| -## Compare playbooks, workbooks, and notebooks |
| 39 | +|Resource |Advantages | Challenges | |
| 40 | +|---------|---------|---------| |
| 41 | +|**Playbooks** | <ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> | |
| 42 | +|**Workbooks** | <ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Can't integrate with external data </li></ul> | |
| 43 | +|**Notebooks** | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> | |
34 | 44 |
|
35 |
| -The following table describes the differences between playbooks, workbooks, and notebooks in Microsoft Sentinel: |
| 45 | +## Related content |
36 | 46 |
|
37 |
| -| Category |Playbooks |Workbooks |Notebooks | |
38 |
| -|---------|---------|---------|---------| |
39 |
| -|**Personas** | <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> | |
40 |
| -|**Uses** | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> | <ul><li>Visualization</li></ul> | <ul><li>Querying Microsoft Sentinel data and external data </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> | |
41 |
| -|**Advantages** |<ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> |<ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | |
42 |
| -|**Challenges** | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> | <ul><li>Cannot integrate with external data </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> | |
43 |
| -| **More information** | [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md) | [Visualize collected data](get-visibility.md) | [Use Jupyter notebooks to hunt for security threats](notebooks.md) | |
| 47 | +For more information, see: |
44 | 48 |
|
45 |
| - |
46 |
| -## Comment on our blogs and forums |
47 |
| - |
48 |
| -We love hearing from our users. |
49 |
| - |
50 |
| -In the TechCommunity space for Microsoft Sentinel: |
51 |
| - |
52 |
| -- [View and comment on recent blog posts](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/bg-p/MicrosoftSentinelBlog) |
53 |
| -- [Post your own questions about Microsoft Sentinel](https://techcommunity.microsoft.com/t5/microsoft-sentinel/bd-p/MicrosoftSentinel) |
54 |
| - |
55 |
| -You can also send suggestions for improvements via our [User Voice](https://feedback.azure.com/d365community/forum/37638d17-0625-ec11-b6e6-000d3a4f07b8) program. |
56 |
| - |
57 |
| -## Join the Microsoft Sentinel GitHub community |
58 |
| - |
59 |
| -The [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel) is a powerful resource for threat detection and automation. |
60 |
| - |
61 |
| -Our Microsoft security analysts constantly create and add new workbooks, playbooks, hunting queries, and more, posting them to the community for you to use in your environment. |
62 |
| - |
63 |
| -Download sample content from the private community GitHub repository to create custom workbooks, hunting queries, notebooks, and playbooks for Microsoft Sentinel. |
64 |
| - |
65 |
| -## Next steps |
66 |
| - |
67 |
| -> [!div class="nextstepaction"] |
68 |
| -> [Get certified!](/training/paths/security-ops-sentinel/) |
69 |
| -
|
70 |
| -> [!div class="nextstepaction"] |
71 |
| -> [Read customer use case stories](https://customers.microsoft.com/en-us/search?sq=%22Azure%20Sentinel%20%22&ff=&p=0&so=story_publish_date%20desc) |
| 49 | +- [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md) |
| 50 | +- [Visualize collected data with workbooks](get-visibility.md) |
| 51 | +- [Use Jupyter notebooks to hunt for security threats](notebooks.md) |
0 commit comments