Skip to content

Commit a824b28

Browse files
authored
Merge pull request #89438 from MicrosoftDocs/release-ga-sentinel
Release ga sentinel
2 parents b511c0a + 3040e82 commit a824b28

File tree

87 files changed

+1365
-581
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+1365
-581
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26039,11 +26039,21 @@
2603926039
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-autoscale-powershell",
2604026040
"redirect_document_id": false
2604126041
},
26042+
{
26043+
"source_path": "articles/sentinel/tutorial-detect-threats.md",
26044+
"redirect_url": "/azure/sentinel/tutorial-detect-threats-built-in",
26045+
"redirect_document_id": false
26046+
},
2604226047
{
2604326048
"source_path": "articles/sentinel/user-analytics.md",
2604426049
"redirect_url": "/azure/sentinel/overview",
2604526050
"redirect_document_id": false
2604626051
},
26052+
{
26053+
"source_path": "articles/sentinel/connect-fusion.md",
26054+
"redirect_url": "/azure/sentinel/fusion",
26055+
"redirect_document_id": false
26056+
},
2604726057
{
2604826058
"source_path": "articles/security-center/security-center-ata-integration.md",
2604926059
"redirect_url": "/azure/security-center/security-center-partner-integration",

articles/sentinel/TOC.yml

Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
- name: Azure Sentinel Preview Documentation
1+
- name: Azure Sentinel Documentation
22
href: index.yml
33
- name: Overview
44
href: overview.md
@@ -9,22 +9,29 @@
99
href: quickstart-onboard.md
1010
- name: Get visibility into alerts
1111
href: quickstart-get-visibility.md
12-
1312
- name: Tutorials
1413
items:
15-
- name: Detect suspicious threats
16-
href: tutorial-detect-threats.md
14+
- name: Use built-in analytics to detect threats
15+
href: tutorial-detect-threats-built-in.md
16+
- name: Create custom rules to detect threats
17+
href: tutorial-detect-threats-custom.md
18+
- name: Monitor your data
19+
href: tutorial-monitor-your-data.md
1720
- name: Investigate incidents
1821
href: tutorial-investigate-cases.md
1922
- name: Respond to threats
20-
href: tutorial-respond-threats-playbook.md
21-
23+
href: tutorial-respond-threats-playbook.md
24+
- name: Concepts
25+
items:
26+
- name: Assign permissions using roles
27+
href: roles.md
28+
- name: Advanced multistage attack detection
29+
href: fusion.md
2230
- name: How-to guides
2331
items:
2432
- name: Connect data sources
2533
href: connect-data-sources.md
2634
items:
27-
2835
- name: Connect Microsoft services
2936
items:
3037
- name: Connect Azure AD
@@ -51,7 +58,6 @@
5158
href: connect-windows-firewall.md
5259
- name: Connect Windows security events
5360
href: connect-windows-security-events.md
54-
5561
- name: Connect external solutions
5662
items:
5763
- name: Connect generic CEF
@@ -78,16 +84,19 @@
7884
href: connect-threat-intelligence.md
7985
- name: Connect Azure Stack VMs
8086
href: connect-azure-stack.md
87+
- name: Multiple tenants (MSSP)
88+
href: multiple-tenants-service-providers.md
89+
- name: Create incidents from alerts
90+
href: create-incidents-from-alerts.md
8191
- name: Hunting
8292
href: hunting.md
8393
items:
8494
- name: Use notebooks to hunt
8595
href: notebooks.md
8696
- name: Use bookmarks to hunt
8797
href: bookmarks.md
88-
- name: Enable fusion
89-
href: connect-fusion.md
90-
98+
- name: Remove Azure Sentinel
99+
href: offboard.md
91100
- name: Resources
92101
items:
93102
- name: Useful resources

articles/sentinel/bookmarks.md

Lines changed: 92 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Keep track of data while hunting in Azure Sentinel Preview using hunting bookmarks | Microsoft Docs
2+
title: Keep track of data while hunting in Azure Sentinel using hunting bookmarks | Microsoft Docs
33
description: This article describes how to use the Azure Sentinel hunting bookmarks to keep track of data.
44
services: sentinel
55
documentationcenter: na
@@ -15,80 +15,130 @@ ms.topic: conceptual
1515
ms.custom: mvc
1616
ms.tgt_pltfrm: na
1717
ms.workload: na
18-
ms.date: 2/28/2019
18+
ms.date: 09/24/2019
1919
ms.author: rkarlin
2020
---
2121

22-
# Keep track of data during hunting
22+
# Keep track of data during hunting with Azure Sentinel
2323

24-
> [!IMPORTANT]
25-
> Azure Sentinel is currently in public preview.
26-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
27-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
28-
2924
Threat hunting typically requires reviewing mountains of log data looking for evidence of malicious behavior. During this process, investigators find events that they want to remember, revisit, and analyze as part of validating potential hypotheses and understanding the full story of a compromise.
30-
Hunting bookmarks help you do this, by preserving the queries you ran in Log Analytics, along with the query results that you deem relevant. You can also record your contextual observations and reference your findings by adding notes and tags. Bookmarked data is visible to you and your teammates for easy collaboration.
3125

32-
You can revisit your bookmarked data at any time on the **Bookmark** tab of the **Hunting** page. You can use filtering and search options to quickly find specific data for your current investigation. Alternatively, you can view your bookmarked data directly in the **HuntingBookmark** table in Log Analytics. This enables you to filter, summarize, and join bookmarked data with other data sources, making it easy to look for corroborating evidence.
26+
Hunting bookmarks in Azure Sentinel help you do this, by preserving the queries you ran in Log Analytics, along with the query results that you deem relevant. You can also record your contextual observations and reference your findings by adding notes and tags. Bookmarked data is visible to you and your teammates for easy collaboration.
27+
28+
You can revisit your bookmarked data at any time on the **Bookmark** tab of the **Hunting** pane. You can use filtering and search options to quickly find specific data for your current investigation. Alternatively, you can view your bookmarked data directly in the **HuntingBookmark** table in Azure Monitor. This enables you to filter, summarize, and join bookmarked data with other data sources, making it easy to look for corroborating evidence.
3329

34-
You can also visualize your bookmarked data, by clicking **Investigate**. This launches the investigation experience in which you can view, investigate, and visually communicate your findings using an interactive entity-graph diagram and timeline.
30+
Currently in preview, if you find something that urgently needs to be addressed while hunting in your logs, in a couple of clicks, you can create a bookmark and promote it to an incident, or add the bookmark to an existing incident. For more information about incidents, see [Tutorial: Investigate incidents with Azure Sentinel](tutorial-investigate-cases.md).
3531

32+
Also in preview, you can visualize your bookmarked data, by clicking **Investigate** from the bookmark details. This launches the investigation experience in which you can view, investigate, and visually communicate your findings using an interactive entity-graph diagram and timeline.
3633

37-
## Run a Log Analytics query from Azure Sentinel
34+
## Add a bookmark
3835

39-
1. In the Azure Sentinel portal, click **Hunting** to run queries for suspicious and anomalous behavior.
36+
1. In the Azure portal, navigate to **Sentinel** > **Threat management** > **Hunting** to run queries for suspicious and anomalous behavior.
4037

41-
1. To run a hunting campaign, select one of the hunting queries and on the left, review the results.
38+
2. Select one of the hunting queries and on the right, in the hunting query details, select **Run Query**.
4239

43-
1. Click **View query results** in the hunting query **Details** page to view the query results in Log Analytics. Here's an example of what you see if you ran a custom SSH bruteforce attack query.
44-
45-
![show results](./media/bookmarks/ssh-bruteforce-example.png)
40+
3. Select **View query results**. For example:
41+
42+
> [!div class="mx-imgBorder"]
43+
> ![view query results from Azure Sentinel hunting](./media/bookmarks/new-processes-observed-example.png)
44+
45+
This action opens the query results in the **Logs** pane.
4646

47-
## Add a bookmark
47+
4. From the log query results list, expand the row that contains the information you find interesting.
4848

49-
1. In the Log Analytics query results list, expand the row containing the information that you find interesting.
49+
5. Select the ellipsis (...) on the left, and then select **Add hunting bookmark**:
50+
51+
> [!div class="mx-imgBorder"]
52+
> ![Add hunting bookmark to query](./media/bookmarks/add-hunting-bookmark.png)
5053
51-
4. Select the ellipsis (...) at the end of the row, and select **Add hunting bookmarks**.
52-
5. On the right, in the **Details** page, update the name, and add tags, and notes to help you identify what was interesting about the item.
53-
6. Click **Save** to commit your changes. All bookmarked data is shared with other investigators, and is a first step toward a collaborative investigation experience.
54+
6. On the right, in the **Add hunting bookmark** pane, optionally, update the bookmark name, add tags, and notes to help you identify what was interesting about the item.
5455

55-
![show results](./media/bookmarks/add-bookmark-la.png)
56+
7. In the **Query Information** section, use the drop down boxes to extract information from the query results for the **Account**, **Host**, and **IP address** entity types. This action maps the selected entity type to a specific column from the query result. For example:
57+
58+
> [!div class="mx-imgBorder"]
59+
> ![Map entity types for hunting bookmark](./media/bookmarks/map-entity-types-bookmark.png)
60+
61+
To view the bookmark in the investigation graph (currently in preview), you must map at least one entity type that is either **Account**, **Host**, or **IP address**.
62+
63+
5. Click **Add** to commit your changes and add the bookmark. All bookmarked data is shared with other investigators, and is a first step toward a collaborative investigation experience.
5664

5765

5866
> [!NOTE]
59-
> You can also use bookmarks with arbitrary Log Analytics queries launched from the Azure Sentinel Log Analytics Logs page, or queries created on the fly from the Log Analytics page and opened from the Hunting page. You will not be able to add a bookmark if you launch Log Analytics from outside of Azure Sentinel.
67+
> The log query results support bookmarks whenever this pane is opened from Azure Sentinel. For example, you select **General** > **Logs** from the navigation bar, select event links in the investigations graph, or select an alert ID from the full details of an incident (currently in preview). You can't create bookmarks when the **Logs** pane is opened from other locations, such as directly from Azure Monitor.
6068
6169
## View and update bookmarks
6270

63-
1. In the Azure Sentinel portal, click **Hunting**.
64-
2. Click the **Bookmarks** tab in the middle of the page to view the list of bookmarks.
65-
3. Use the search box or filter options to find a specific bookmark.
66-
4. Select individual bookmarks in the grid below to view the bookmark details in the right hand details pane.
67-
5. To update tags and notes, click on the editable text boxes and click **Save** to preserve your changes.
71+
1. In the Azure portal, navigate to **Sentinel** > **Threat management** > **Hunting**.
72+
73+
2. Select the **Bookmarks** tab to view the list of bookmarks.
74+
75+
3. To help you find a specific bookmark, use the search box or filter options.
76+
77+
4. Select individual bookmarks and view the bookmark details in the right-hand details pane.
78+
79+
5. Make your changes as needed, which are automatically saved.
80+
81+
## Exploring bookmarks in the investigation graph
82+
83+
> [!IMPORTANT]
84+
> Exploring bookmarks in the investigation graph and the investigation graph itself are currently in public preview.
85+
> These features are provided without a service level agreement, and not recommended for production workloads.
86+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
87+
88+
1. In the Azure portal, navigate to **Sentinel** > **Threat management** > **Hunting** > **Bookmarks** tab, and select the bookmark or bookmarks you want to investigate.
89+
90+
2. In the bookmark details, ensure that at least one entity is mapped. For example, for **ENTITIES**, you see entries for **IP**, **Machine**, or **Account**.
91+
92+
3. Click **Investigate** to view the bookmark in the investigation graph.
93+
94+
For instructions to use the investigation graph, see [Use the investigation graph to deep dive](tutorial-investigate-cases.md#use-the-investigation-graph-to-deep-dive).
95+
96+
## Add bookmarks to a new or existing incident
97+
98+
> [!IMPORTANT]
99+
> Adding bookmarks to a new or existing incident is currently in public preview.
100+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
101+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
68102
69-
![show results](./media/bookmarks/view-update-bookmarks.png)
103+
1. In the Azure portal, navigate to **Sentinel** > **Threat management** > **Hunting** > **Bookmarks** tab, and select the bookmark or bookmarks you want to add to an incident.
70104

71-
## View bookmarked data in Log Analytics
105+
2. Select **Incident actions (Preview)** from the command bar:
106+
107+
> [!div class="mx-imgBorder"]
108+
> ![Add bookmarks to incident](./media/bookmarks/incident-actions.png)
72109
73-
There are multiple options to viewing your bookmarked data in Log Analytics.
110+
3. Select either **Create new incident** or **Add to existing incident**, as required. Then:
111+
112+
- For a new incident: Optionally update the details for the incident, and then select **Create**.
113+
- For adding a bookmark to an existing incident: Select one incident, and then select **Add**.
74114

75-
The easiest way to view bookmarked queries, results, or history is by selecting the desired bookmark in the **Bookmarks** table and use the links provided in the details pane. Options include:
76-
- Click on **View query** to view the source query in Log Analytics.
77-
- Click on **View bookmark history** to see all bookmark metadata including: who made the update, the updated values, and the time the update occurred.
115+
To view the bookmark within the incident: Navigate to **Sentinel** > **Threat management** > **Incidents** and select the incident with your bookmark. Select **View full details**, and then select the **Bookmarks** tab.
78116

79-
- You can also view the raw bookmark data for all bookmarks by clicking on **Bookmark logs** above the bookmark grid. This view will show the all your bookmarks in the hunting bookmark table with associated metadata. You can use KQL queries to filter down to the latest version of the specific bookmark you are looking for.
117+
## View bookmarked data in logs
80118

119+
To view bookmarked queries, results, or their history, select the bookmark from the **Hunting** > **Bookmarks** tab, and use the links provided in the details pane:
120+
121+
- **View source query** to view the source query in the **Logs** pane.
122+
123+
- **View bookmark logs** to see all bookmark metadata, which includes who made the update, the updated values, and the time the update occurred.
124+
125+
You can also view the raw bookmark data for all bookmarks by selecting **Bookmark Logs** from the command bar on the **Hunting** > **Bookmarks** tab:
126+
127+
> [!div class="mx-imgBorder"]
128+
> ![Bookmark Logs](./media/bookmarks/bookmark-logs.png)
129+
130+
This view shows all your bookmarks with associated metadata. You can use [Keyword Query Language](https://docs.microsoft.com/sharepoint/dev/general-development/keyword-query-language-kql-syntax-reference) (KQL) queries to filter down to the latest version of the specific bookmark you are looking for.
81131

82132
> [!NOTE]
83-
> There can be significant delay (measured in minutes) between the creation of a bookmark and when it is displayed in the **HuntingBookmark** table. It is recommended to create your bookmarks first, then analyze them after the data is ingested.
133+
> There can be a significant delay (measured in minutes) between the time you create a bookmark and when it is displayed in the **Bookmarks** tab.
84134
85135
## Delete a bookmark
86-
If you want to delete a bookmark do the following:
87-
1. Open th **Hunting bookmark** tab.
88-
2. Select the target bookmark.
89-
3. Select the ellipsis (...) at the end of the row and select **Delete bookmark**.
136+
137+
1. In the Azure portal, navigate to **Sentinel** > **Threat management** > **Hunting** > **Bookmarks** tab, and select the bookmark or bookmarks you want to delete.
138+
139+
2. Select the ellipsis (...) at the end of the row and select **Delete bookmark**.
90140

91-
Deleting the bookmark removes the bookmark from the list in the **Bookmark** tab. The Log Analytics HuntingBookmark table will continue to contain previous bookmark entries, but the latest entry will change the **SoftDelete** value to true, making it easy to filter out old bookmarks. Deleting a bookmark does not remove any entities from the investigation experience that are associated with other bookmarks or alerts.
141+
Deleting the bookmark removes the bookmark from the list in the **Bookmark** tab. The Log Analytics **HuntingBookmark** table will continue to contain previous bookmark entries, but the latest entry will change the **SoftDelete** value to true, making it easy to filter out old bookmarks. Deleting a bookmark does not remove any entities from the investigation experience that are associated with other bookmarks or alerts.
92142

93143

94144
## Next steps

articles/sentinel/connect-aws.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Connect Symantec AWS data to Azure Sentinel Preview| Microsoft Docs
2+
title: Connect Symantec AWS data to Azure Sentinel | Microsoft Docs
33
description: Learn how to connect Symantec AWS data to Azure Sentinel.
44
services: sentinel
55
documentationcenter: na
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 07/10/2019
15+
ms.date: 09/23/2019
1616
ms.author: rkarlin
1717

1818
---
@@ -79,5 +79,5 @@ You must have write permission on the Azure Sentinel workspace.
7979
## Next steps
8080
In this document, you learned how to connect AWS CloudTrail to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
8181
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
82-
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
82+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
8383

0 commit comments

Comments
 (0)