You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/investigate-cases.md
+39-38Lines changed: 39 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,71 +1,71 @@
1
1
---
2
-
title: Investigate incidents with Microsoft Sentinel| Microsoft Docs
3
-
description: In this article, learn how to use Microsoft Sentinel to create advanced alert rules that generate incidents you can assign and investigate.
2
+
title: Investigate incidents with Microsoft Sentinel (legacy)| Microsoft Docs
3
+
description: In this article, learn how to use the legacy incident investigation experience in Microsoft Sentinel to create advanced alert rules that generate incidents you can assign and investigate.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 03/30/2022
6
+
ms.date: 11/19/2024
7
7
ms.author: yelevin
8
+
appliesto:
9
+
- Microsoft Sentinel in the Azure portal
8
10
9
11
10
-
#Customer intent: As a security analyst, I want to investigate and manage security incidents using advanced analytics and visualization tools so that I can effectively identify, understand, and respond to potential threats.
12
+
#Customer intent: As a security analyst, I want to investigate and manage security incidents using Microsoft Sentinel's legacy set of analytics and visualization tools so that I can effectively identify, understand, and respond to potential threats.
11
13
12
14
---
13
15
14
-
# Investigate incidents with Microsoft Sentinel
16
+
# Investigate incidents with Microsoft Sentinel (legacy)
15
17
16
-
> [!IMPORTANT]
17
-
> Noted features are currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
-
>
18
+
This article hels you use Microsoft Sentinel's legacy incident investigation experience. If you're using the newer version of the interface, use the newer set of instructions to match. For more information, see [Navigate and investigate incidents in Microsoft Sentinel](investigate-incidents.md).
19
19
20
-
This article helps you investigate incidents with Microsoft Sentinel. After you connected your data sources to Microsoft Sentinel, you want to be notified when something suspicious happens. To enable you to do this, Microsoft Sentinel lets you create advanced analytics rules that generate incidents that you can assign and investigate.
21
-
22
-
This article covers:
23
-
> [!div class="checklist"]
24
-
> * Investigate incidents
25
-
> * Use the investigation graph
26
-
> * Respond to threats
20
+
After connecting your data sources to Microsoft Sentinel, you want to be notified when something suspicious happens. To enable you to do this, Microsoft Sentinel lets you create advanced analytics rules that generate incidents that you can assign and investigate.
27
21
28
22
An incident can include multiple alerts. It's an aggregation of all the relevant evidence for a specific investigation. An incident is created based on analytics rules that you created in the **Analytics** page. The properties related to the alerts, such as severity and status, are set at the incident level. After you let Microsoft Sentinel know what kinds of threats you're looking for and how to find them, you can monitor detected threats by investigating incidents.
29
23
24
+
> [!IMPORTANT]
25
+
> Noted features are currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
26
+
>
27
+
30
28
## Prerequisites
31
29
32
30
- You'll only be able to investigate the incident if you used the entity mapping fields when you set up your analytics rule. The investigation graph requires that your original incident includes entities.
33
31
34
-
- If you have a guest user that needs to assign incidents, the user must be assigned the [Directory Reader](../active-directory/roles/permissions-reference.md#directory-readers) role in your Microsoft Entra tenant. Regular (non-guest) users have this role assigned by default.
32
+
- If you have a guest user that needs to assign incidents, the user must be assigned the [Directory Reader](../active-directory/roles/permissions-reference.md#directory-readers) role in your Microsoft Entra tenant. Regular (nonguest) users have this role assigned by default.
35
33
36
34
## How to investigate incidents
37
35
38
-
1. Select **Incidents**. The **Incidents** page lets you know how many incidents you have and whether they are new, **Active**, or closed. For each incident, you can see the time it occurred and the status of the incident. Look at the severity to decide which incidents to handle first.
36
+
1. Select **Incidents**. The **Incidents** page lets you know how many incidents you have and whether they're new, **Active**, or closed. For each incident, you can see the time it occurred and the status of the incident. Look at the severity to decide which incidents to handle first.
39
37
40
38
:::image type="content" source="media/investigate-cases/incident-severity.png" alt-text="Screenshot of view of incident severity." lightbox="media/investigate-cases/incident-severity.png":::
41
39
42
40
1. You can filter the incidents as needed, for example by status or severity. For more information, see [Search for incidents](#search-for-incidents).
43
41
44
42
1. To begin an investigation, select a specific incident. On the right, you can see detailed information for the incident including its severity, summary of the number of entities involved, the raw events that triggered this incident, the incident’s unique ID, and any mapped MITRE ATT&CK tactics or techniques.
45
43
46
-
1. To view more details about the alerts and entities in the incident, select **View full details** in the incident page and review the relevant tabs that summarize the incident information.
44
+
1. To view more details about the alerts and entities in the incident, select **View full details** in the incident page and review the relevant tabs that summarize the incident information.
47
45
48
46
:::image type="content" source="media/investigate-cases/incident-timeline.png" alt-text="Screenshot of view of alert details." lightbox="media/investigate-cases/incident-timeline.png":::
49
47
48
+
- If you're currently using the new experience, toggle it off at the top right of the incident details page to use the legacy experience instead.
49
+
50
50
- In the **Timeline** tab, review the timeline of alerts and bookmarks in the incident, which can help you reconstruct the timeline of attacker activity.
51
51
52
-
- In the **Similar incidents (Preview)** tab, you'll see a collection of up to 20 other incidents that most closely resemble the current incident. This allows you to view the incident in a larger context and helps direct your investigation. [Learn more about similar incidents below](#similar-incidents-preview).
52
+
- In the **Similar incidents (Preview)** tab, you see a collection of up to 20 other incidents that most closely resemble the current incident. This allows you to view the incident in a larger context and helps direct your investigation. [Learn more about similar incidents below](#similar-incidents-preview).
53
53
54
-
- In the **Alerts** tab, review the alerts included in this incident. You'll see all relevant information about the alerts – the analytics rules that produced them, the number of results returned per alert, and the ability to run playbooks on the alerts. To drill down even further into the incident, select the number of **Events**. This opens the query that generated the results and the events that triggered the alert in Log Analytics.
54
+
- In the **Alerts** tab, review the alerts included in this incident. You see all relevant information about the alerts – the analytics rules that produced them, the number of results returned per alert, and the ability to run playbooks on the alerts. To drill down even further into the incident, select the number of **Events**. This opens the query that generated the results and the events that triggered the alert in Log Analytics.
55
55
56
-
- In the **Bookmarks** tab, you'll see any bookmarks you or other investigators have linked to this incident. [Learn more about bookmarks](./bookmarks.md).
56
+
- In the **Bookmarks** tab, you see any bookmarks you or other investigators have linked to this incident. [Learn more about bookmarks](./bookmarks.md).
57
57
58
58
- In the **Entities** tab, you can see all the [entities](entities.md) that you [mapped](./map-data-fields-to-entities.md) as part of the alert rule definition. These are the objects that played a role in the incident, whether they be users, devices, addresses, files, or [any other types](./entities-reference.md).
59
59
60
60
- Finally, in the **Comments** tab, you can add your comments on the investigation and view any comments made by other analysts and investigators. [Learn more about comments](#comment-on-incidents).
61
61
62
62
1. If you're actively investigating an incident, it's a good idea to set the incident's status to **Active** until you close it.
63
63
64
-
1. Incidents can be assigned to a specific user or to a group. For each incident you can assign an owner, by setting the **Owner** field. All incidents start as unassigned. You can also add comments so that other analysts will be able to understand what you investigated and what your concerns are around the incident.
64
+
1. Incidents can be assigned to a specific user or to a group. For each incident you can assign an owner, by setting the **Owner** field. All incidents start as unassigned. You can also add comments so that other analysts are able to understand what you investigated and what your concerns are around the incident.
65
65
66
66
:::image type="content" source="media/investigate-cases/assign-incident-to-user.png" alt-text="Screenshot of assigning incident to user.":::
67
67
68
-
Recently selected users and groups will appear at the top of the pictured drop-down list.
68
+
Recently selected users and groups appear at the top of the pictured drop-down list.
69
69
70
70
1. Select **Investigate** to view the investigation map.
71
71
@@ -80,7 +80,7 @@ The investigation graph provides you with:
80
80
81
81
-**Full investigation scope discovery**: Expand your investigation scope using built-in exploration queries to surface the full scope of a breach.
82
82
83
-
-**Built-in investigation steps**: Use predefined exploration options to make sure you are asking the right questions in the face of a threat.
83
+
-**Built-in investigation steps**: Use predefined exploration options to make sure you're asking the right questions in the face of a threat.
84
84
85
85
To use the investigation graph:
86
86
@@ -125,9 +125,9 @@ Learn how you can broaden or narrow the scope of your investigation by either [a
125
125
126
126
## Similar incidents (preview)
127
127
128
-
As a security operations analyst, when investigating an incident you'll want to pay attention to its larger context. For example, you'll want to see if other incidents like this have happened before or are happening now.
128
+
As a security operations analyst, when investigating an incident you want to pay attention to its larger context. For example, you'll want to see if other incidents like this have happened before or are happening now.
129
129
130
-
- You might want to identify concurrent incidents that may be part of the same larger attack strategy.
130
+
- You might want to identify concurrent incidents that might be part of the same larger attack strategy.
131
131
132
132
- You might want to identify similar incidents in the past, to use them as reference points for your current investigation.
133
133
@@ -141,7 +141,7 @@ The **similar incidents** tab in the incident details page, now in preview, pres
141
141
142
142
There are three criteria by which similarity is determined:
143
143
144
-
-**Similar entities:** An incident is considered similar to another incident if they both include the same [entities](entities.md). The more entities two incidents have in common, the more similar they are considered to be.
144
+
-**Similar entities:** An incident is considered similar to another incident if they both include the same [entities](entities.md). The more entities two incidents have in common, the more similar they're considered to be.
145
145
146
146
-**Similar rule:** An incident is considered similar to another incident if they were both created by the same [analytics rule](detect-threats-built-in.md).
147
147
@@ -155,27 +155,27 @@ The reasons an incident appears in the similar incidents list are displayed in t
155
155
156
156
Incident similarity is calculated based on data from the 14 days prior to the last activity in the incident, that being the end time of the most recent alert in the incident.
157
157
158
-
Incident similarity is recalculated every time you enter the incident details page, so the results may vary between sessions if new incidents were created or updated.
158
+
Incident similarity is recalculated every time you enter the incident details page, so the results might vary between sessions if new incidents were created or updated.
159
159
160
160
## Comment on incidents
161
161
162
-
As a security operations analyst, when investigating an incident you will want to thoroughly document the steps you take, both to ensure accurate reporting to management and to enable seamless cooperation and collaboration amongst coworkers. Microsoft Sentinel gives you a rich commenting environment to help you accomplish this.
162
+
As a security operations analyst, when investigating an incident you'll want to thoroughly document the steps you take, both to ensure accurate reporting to management and to enable seamless cooperation and collaboration among coworkers. Microsoft Sentinel gives you a rich commenting environment to help you accomplish this.
163
163
164
164
Another important thing that you can do with comments is enrich your incidents automatically. When you run a playbook on an incident that fetches relevant information from external sources (say, checking a file for malware at VirusTotal), you can have the playbook place the external source's response - along with any other information you define - in the incident's comments.
165
165
166
166
Comments are simple to use. You access them through the **Comments** tab on the incident details page.
167
167
168
168
:::image type="content" source="media/investigate-cases/comments-screen.png" alt-text="Screenshot of viewing and entering comments.":::
169
169
170
-
### Frequently asked questions
170
+
### Frequently asked questions about incident comments
171
171
172
172
There are several considerations to take into account when using incident comments. The following list of questions points to these considerations.
173
173
174
174
#### What kinds of input are supported?
175
175
176
176
-**Text:** Comments in Microsoft Sentinel support text inputs in plain text, basic HTML, and Markdown. You can also paste copied text, HTML, and Markdown into the comment window.
177
177
178
-
-**Images:** You can insert links to images in comments and the images will be displayed inline, but the images must already be hosted in a publicly accessible location such as Dropbox, OneDrive, Google Drive and the like. Images can't be uploaded directly to comments.
178
+
-**Images:** You can insert links to images in comments and the images are displayed inline, but the images must already be hosted in a publicly accessible location such as Dropbox, OneDrive, Google Drive and the like. Images can't be uploaded directly to comments.
179
179
180
180
#### Is there a size limit on comments?
181
181
@@ -196,9 +196,9 @@ There are several considerations to take into account when using incident commen
196
196
197
197
198
198
199
-
## Closing an incident
199
+
## Close an incident
200
200
201
-
Once you have resolved a particular incident (for example, when your investigation has reached its conclusion), you should set the incident’s status to **Closed**. When you do so, you will be asked to classify the incident by specifying the reason you are closing it. This step is mandatory. Click**Select classification** and choose one of the following from the drop-down list:
201
+
Once you resolve a particular incident (for example, when your investigation has reached its conclusion), you should set the incident’s status to **Closed**. When you do so, you'll be asked to classify the incident by specifying the reason you're closing it. This step is mandatory. Select**Select classification** and choose one of the following from the drop-down list:
202
202
203
203
- True Positive - suspicious activity
204
204
- Benign Positive - suspicious but expected
@@ -210,13 +210,13 @@ Once you have resolved a particular incident (for example, when your investigati
210
210
211
211
For more information about false positives and benign positives, see [Handle false positives in Microsoft Sentinel](false-positives.md).
212
212
213
-
After choosing the appropriate classification, add some descriptive text in the **Comment** field. This will be useful in the event you need to refer back to this incident. Click**Apply** when you’re done, and the incident will be closed.
213
+
After choosing the appropriate classification, add some descriptive text in the **Comment** field. This is useful in the event you need to refer back to this incident. Select**Apply** when you’re done, and the incident is closed.
To find a specific incident quickly, enter a search string in the search box above the incidents grid and press **Enter** to modify the list of incidents shown accordingly. If your incident isn't included in the results, you may want to narrow your search by using **Advanced search** options.
219
+
To find a specific incident quickly, enter a search string in the search box above the incidents grid and press **Enter** to modify the list of incidents shown accordingly. If your incident isn't included in the results, you might want to narrow your search by using **Advanced search** options.
220
220
221
221
To modify the search parameters, select the **Search** button and then select the parameters where you want to run your search.
222
222
@@ -239,7 +239,7 @@ Using advanced search options changes the search behavior as follows:
239
239
|**Auto-refresh**| Using advanced search parameters prevents you from selecting to automatically refresh your results. |
240
240
|**Entity parameters**| All entity parameters are supported for advanced searches. When searching in any entity parameter, the search runs in all entity parameters. |
241
241
|**Search strings**| Searching for a string of words includes all of the words in the search query. Search strings are case sensitive. |
242
-
|**Cross workspace support**| Advanced searches are not supported for cross-workspace views. |
0 commit comments