You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/resources.md
+18-27Lines changed: 18 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,41 +13,32 @@ ms.author: bagol
13
13
14
14
# Compare workbooks, playbooks, and notebooks
15
15
16
-
Workbooks, playbooks, and notebooks are key resources in Microsoft Sentinel that help you automate responses, visualize data, and analyze data, respectively. Sometimes it can be challenging to track which type of resource is right for your task.
16
+
Workbooks, playbooks, and notebooks are key resources in Microsoft Sentinel that help you automate responses, visualize data, and analyze data, respectively. Sometimes it can be challenging to track which type of resource is right for your task. This article helps to differentiate between workbooks, playbooks, and notebooks in Microsoft Sentinel.
17
17
18
-
This article helps to differentiate between workbooks, playbooks, and notebooks in Microsoft Sentinel:
18
+
## Basic differences
19
19
20
-
- After you connect your data sources to Microsoft Sentinel, visualize and monitor the data using [workbooks in Microsoft Sentinel](monitor-your-data.md). Microsoft Sentinel workbooks are based on [Azure Monitor workbooks](/azure/azure-monitor/visualize/workbooks-overview), and add tables and charts with analytics for your logs and queries to the tools already available in Azure.
21
-
-[Jupyter notebooks in Microsoft Sentinel](notebooks.md) are a powerful tool for security investigations and hunting, providing full programmability with a huge collection of libraries for machine learning, visualization, and data analysis. While many common tasks can be carried out in the portal, Jupyter extends the scope of what you can do with this data.
22
-
- Use [Microsoft Sentinel playbooks](automate-responses-with-playbooks.md) to run preconfigured sets of remediation actions to help automate and orchestrate your threat response.
23
-
24
-
## Compare by persona
20
+
Basic guidance for when to use each resource includes:
25
21
26
-
The following table compares Microsoft Sentinel playbooks, workbooks, and notebooks by the user persona:
22
+
- After you connect your data sources to Microsoft Sentinel, visualize and monitor the data using [workbooks in Microsoft Sentinel](monitor-your-data.md). Microsoft Sentinel workbooks are based on [Azure Monitor workbooks](/azure/azure-monitor/visualize/workbooks-overview), and add tables and charts with analytics for your logs and queries to the tools already available in Azure.
27
23
28
-
|Resource |Description |
29
-
|---------|---------|
30
-
|**[Workbooks](monitor-your-data.md)**| <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> |
31
-
|**[Notebooks](notebooks.md)**| <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> |
32
-
|**[Playbooks](automate-responses-with-playbooks.md)**| <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> |
24
+
-[Jupyter notebooks in Microsoft Sentinel](notebooks.md) are a powerful tool for security investigations and hunting, providing full programmability with a huge collection of libraries for machine learning, visualization, and data analysis. While many common tasks can be carried out in the portal, Jupyter extends the scope of what you can do with this data.
33
25
34
-
## Compare by use
26
+
- Use [Microsoft Sentinel playbooks](automate-responses-with-playbooks.md) to run preconfigured sets of remediation actions to help automate and orchestrate your threat response.
35
27
36
-
The following table compares Microsoft Sentinel playbooks, workbooks, and notebooks by use case:
28
+
## Compare by persona, use, advantages, and challenges
37
29
38
-
|Resource |Description |
39
-
|---------|---------|
40
-
|**[Playbooks](automate-responses-with-playbooks.md)**| Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> |
41
-
|**[Notebooks](notebooks.md)**| <ul><li>Querying Microsoft Sentinel data and external data </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> |
|**[Workbooks](monitor-your-data.md)**| <ul><li> SOC engineers</li><li>Analysts of all tiers</li></ul> | <ul><li>Visualize and monitor data. For example, creating interactive reports and dashboards to analyze security data, such as to display trends and patterns in security alerts.</li></ul> | <ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Can't integrate with external data </li></ul> |
35
+
|**[Notebooks](notebooks.md)**| <ul><li>Threat hunters and Tier-2/Tier-3 analysts</li><li>Incident investigators</li><li>Data scientists</li><li>Security researchers</li></ul> |<ul><li>Perform advanced data analysis and investigations. </li><li>Data enrichment with TI, GeoIP lookups, and WhoIs lookups, and more </li><li> Investigation </li><li> Visualization </li><li> Hunting </li><li>Machine learning and big data analytics </li></ul> For example, analyzing large datasets to identify anomalies or potential threats. | <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> |
36
+
|**[Playbooks](automate-responses-with-playbooks.md)**| <ul><li>SOC engineers</li><li>Analysts of all tiers</li></ul> | Automation of simple, repeatable tasks:<ul><li>Ingesting external data </li><li>Data enrichment with TI, GeoIP lookups, and more </li><li> Investigation </li><li>Remediation </li></ul> For example, running preconfigured remediation actions to automatically isolate a compromised device. | <ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> |
44
37
45
-
## Compare by advantages and challenges
38
+
## Related content
46
39
47
-
The following table compares the advantages and disadvantages of playbooks, workbooks, and notebooks in Microsoft Sentinel:
40
+
For more information, see:
48
41
49
-
|Resource |Advantages | Challenges |
50
-
|---------|---------|---------|
51
-
|**[Playbooks](automate-responses-with-playbooks.md)**| <ul><li> Best for single, repeatable tasks </li><li>No coding knowledge required </li></ul> | <ul><li>Not suitable for ad-hoc and complex chains of tasks </li><li>Not ideal for documenting and sharing evidence</li></ul> |
52
-
|**[Notebooks](notebooks.md)**| <ul><li>Best for complex chains of repeatable tasks </li><li>Ad-hoc, more procedural control</li><li>Easier to pivot with interactive functionality </li><li>Rich Python libraries for data manipulation and visualization </li><li>Machine learning and custom analysis </li><li>Easy to document and share analysis evidence </li></ul> | <ul><li> High learning curve and requires coding knowledge </li></ul> |
53
-
|**[Workbooks](monitor-your-data.md)**| <ul><li>Best for a high-level view of Microsoft Sentinel data </li><li>No coding knowledge required</li></ul> | <ul><li>Can't integrate with external data </li></ul> |
42
+
-[Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md)
43
+
-[Jupyter notebooks with Microsoft Sentinel hunting capabilities](notebooks.md)
44
+
-[Automate threat response with playbooks in Microsoft Sentinel](automation/automate-responses-with-playbooks.md)
0 commit comments