Skip to content

Commit 5f2faec

Browse files
authored
Merge pull request #267226 from batamig/resources-redux
Sentinel resources redux
2 parents 52fc564 + 2825b38 commit 5f2faec

File tree

2 files changed

+35
-55
lines changed

2 files changed

+35
-55
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1158,6 +1158,8 @@
11581158
items:
11591159
- name: Service limits
11601160
href: sentinel-service-limits.md
1161+
- name: Compare playbooks, workbooks, and notebooks
1162+
href: resources.md
11611163
- name: Microsoft Sentinel REST-API
11621164
href: /rest/api/securityinsights/
11631165
- name: Management references
@@ -1264,8 +1266,6 @@
12641266
href: sentinel-soar-content.md
12651267
- name: Resources
12661268
items:
1267-
- name: Useful resources
1268-
href: resources.md
12691269
- name: Sample workspace architecture
12701270
href: sample-workspace-designs.md
12711271
- name: Microsoft Sentinel blog

articles/sentinel/resources.md

Lines changed: 33 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -1,71 +1,51 @@
11
---
2-
title: Useful resources when working with Microsoft Sentinel
3-
description: This document provides you with a list of useful resources when working with Microsoft Sentinel.
4-
author: yelevin
2+
title: Compare playbooks, workbooks, and notebooks | Microsoft Sentinel
3+
description: Learn about the differences between playbooks, workbooks, and notebooks in Microsoft Sentinel.
4+
author: batamig
55
ms.topic: conceptual
6-
ms.date: 11/09/2021
7-
ms.author: yelevin
6+
ms.date: 02/26/2024
7+
ms.author: bagol
88
---
99

10-
# Useful resources for working with Microsoft Sentinel
10+
# Compare playbooks, workbooks, and notebooks
1111

12-
This article lists resources that can help you get more information about working with Microsoft Sentinel.
12+
This article describes the differences between playbooks, workbooks, and notebooks in Microsoft Sentinel.
1313

14-
## Learn more about creating queries
14+
## Compare by persona
1515

16-
Microsoft Sentinel uses Azure Monitor Log Analytics's Kusto Query Language (KQL) to build queries. For more information, see:
16+
The following table compares Microsoft Sentinel playbooks, workbooks, and notebooks by the user persona:
1717

18-
- [Kusto Query Language in Microsoft Sentinel](kusto-overview.md)
19-
- [Useful resources for working with Kusto Query Language in Microsoft Sentinel](kusto-resources.md)
18+
|Resource |Description |
19+
|---------|---------|
20+
|**Playbooks** | <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> |
21+
|**Workbooks** | <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> |
22+
|**Notebooks** | <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> |
2023

21-
## Microsoft Sentinel templates for data to monitor
24+
## Compare by use
2225

23-
The [Microsoft Entra Security Operations Guide](../active-directory/fundamentals/security-operations-introduction.md) includes specific guidance and knowledge about data that's important to monitor for security purposes, for several operational areas.
26+
The following table compares Microsoft Sentinel playbooks, workbooks, and notebooks by use case:
2427

25-
In each article, check for sections named [Things to monitor](../active-directory/fundamentals/security-operations-privileged-accounts.md#things-to-monitor) for lists of events that we recommend alerting on and investigating, as well as analytics rule templates to deploy directly to Microsoft Sentinel.
28+
|Resource |Description |
29+
|---------|---------|
30+
|**Playbooks** | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> |
31+
|**Workbooks** | <ul><li>Visualization</li></ul> |
32+
|**Notebooks** | <ul><li>Querying Microsoft Sentinel data and external data </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> |
2633

27-
## Learn more about creating automation
2834

29-
Create automation in Microsoft Sentinel using Azure Logic Apps, with a growing gallery of built-in playbooks.
35+
## Compare by advantages and challenges
3036

31-
For more information, see [Azure Logic Apps connectors](/connectors/).
37+
The following table compares the advantages and disadvantages of playbooks, workbooks, and notebooks in Microsoft Sentinel:
3238

33-
## Compare playbooks, workbooks, and notebooks
39+
|Resource |Advantages | Challenges |
40+
|---------|---------|---------|
41+
|**Playbooks** | <ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> |
42+
|**Workbooks** | <ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Can't integrate with external data </li></ul> |
43+
|**Notebooks** | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> |
3444

35-
The following table describes the differences between playbooks, workbooks, and notebooks in Microsoft Sentinel:
45+
## Related content
3646

37-
| Category |Playbooks |Workbooks |Notebooks |
38-
|---------|---------|---------|---------|
39-
|**Personas** | <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> |
40-
|**Uses** | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> | <ul><li>Visualization</li></ul> | <ul><li>Querying Microsoft Sentinel data and external data </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> |
41-
|**Advantages** |<ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> |<ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> |
42-
|**Challenges** | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> | <ul><li>Cannot integrate with external data </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> |
43-
| **More information** | [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md) | [Visualize collected data](get-visibility.md) | [Use Jupyter notebooks to hunt for security threats](notebooks.md) |
47+
For more information, see:
4448

45-
46-
## Comment on our blogs and forums
47-
48-
We love hearing from our users.
49-
50-
In the TechCommunity space for Microsoft Sentinel:
51-
52-
- [View and comment on recent blog posts](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/bg-p/MicrosoftSentinelBlog)
53-
- [Post your own questions about Microsoft Sentinel](https://techcommunity.microsoft.com/t5/microsoft-sentinel/bd-p/MicrosoftSentinel)
54-
55-
You can also send suggestions for improvements via our [User Voice](https://feedback.azure.com/d365community/forum/37638d17-0625-ec11-b6e6-000d3a4f07b8) program.
56-
57-
## Join the Microsoft Sentinel GitHub community
58-
59-
The [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel) is a powerful resource for threat detection and automation.
60-
61-
Our Microsoft security analysts constantly create and add new workbooks, playbooks, hunting queries, and more, posting them to the community for you to use in your environment.
62-
63-
Download sample content from the private community GitHub repository to create custom workbooks, hunting queries, notebooks, and playbooks for Microsoft Sentinel.
64-
65-
## Next steps
66-
67-
> [!div class="nextstepaction"]
68-
> [Get certified!](/training/paths/security-ops-sentinel/)
69-
70-
> [!div class="nextstepaction"]
71-
> [Read customer use case stories](https://customers.microsoft.com/en-us/search?sq=%22Azure%20Sentinel%20%22&ff=&p=0&so=story_publish_date%20desc)
49+
- [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md)
50+
- [Visualize collected data with workbooks](get-visibility.md)
51+
- [Use Jupyter notebooks to hunt for security threats](notebooks.md)

0 commit comments

Comments
 (0)