You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/multiple-tenants-service-providers.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ If you’re a managed security service provider (MSSP) and you’re using [Azure
33
33
1. Open Azure Sentinel. You will see all the workspaces in the selected subscriptions, and you’ll be able to work with them seamlessly, like any workspace in your own tenant.
34
34
35
35
> [!NOTE]
36
-
> You will not be able to connect connectors in Azure Sentinel from within a managed workspace. To connect a connector, you must directly sign into the tenant on which you want to connect a connector and authenticate there with the required permissions.
36
+
> You will not be able to deploy connectors in Azure Sentinel from within a managed workspace. To deploy a connector, you must directly sign into the tenant on which you want to deploy a connector and authenticate there with the required permissions.
Copy file name to clipboardExpand all lines: articles/sentinel/offboard.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,9 +23,9 @@ If you no longer want to use the Azure Sentinel, this article explains how to re
23
23
24
24
## How to delete Azure Sentinel
25
25
26
-
In the background, when you install Azure Sentinel, the **SecurityInsights** solution is installed on your selected workspace. So the first thing you need to do is remove the solution. In the Azure portal, you need to delete the SecurityInsights solution.
26
+
In the background, when you install Azure Sentinel, the **SecurityInsights** solution is installed on your selected workspace. So the first thing you need to do is remove the **SecurityInsights** solution.
27
27
28
-
1. Go to **Workspace settings** and then **Solutions**.
28
+
1. Go to **Azure Sentinel**, followed by **Configuration**, followed by **Workspace settings**, and then **Solutions**.
29
29
30
30
2. Select `SecurityInsights` and click on it.
31
31
@@ -34,7 +34,7 @@ In the background, when you install Azure Sentinel, the **SecurityInsights** sol
34
34
3. At the top of the page select **Delete**.
35
35
36
36
> [!IMPORTANT]
37
-
> If you delete the workspace, the removal process is also triggered.
37
+
> If you delete the workspace, the the workspace and Azure Sentinel are removed from your tenant in Azure Monitor.
38
38
39
39

40
40
@@ -45,19 +45,17 @@ When you delete the solution, Azure Sentinel takes up to 48 hours to complete th
45
45
After the disconnection is identified, the offboarding process begins.
46
46
47
47
**The configuration of these connectors is deleted:**
48
-
- Office activity
48
+
- Office 365
49
49
50
-
- AWS cloud trail
50
+
- AWS
51
51
52
52
- Microsoft services security alerts (Azure ATP, Microsoft Cloud App Security including Cloud Discovery Shadow IT reporting, Azure AD Identity Protection, Microsoft Defender ATP, Azure Security Center)
53
53
54
-
- Threat Intelligence indicator
55
-
56
-
- CloudTrail
54
+
- Threat Intelligence
57
55
58
56
- Common security logs (including CEF-based logs, Barracuda, and Syslog) (If you have Azure Security Center, these logs will continue to be collected.)
59
57
60
-
- Windows security events (If you have Azure Security Center, these logs will continue to be collected.)
58
+
- Windows Security Events (If you have Azure Security Center, these logs will continue to be collected.)
61
59
62
60
Within the first 48 hours, the data and alert rules (including real-time automation configuration) will no longer be accessible or queryable in Azure Sentinel.
Copy file name to clipboardExpand all lines: articles/sentinel/quickstart-get-visibility.md
+23-28Lines changed: 23 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,6 @@ author: rkarlin
7
7
manager: rkarlin
8
8
editor: ''
9
9
10
-
ms.assetid: 5a4ae93c-d648-41fb-8fb8-96a025d2f73e
11
10
ms.service: azure-sentinel
12
11
ms.subservice: azure-sentinel
13
12
ms.devlang: na
@@ -26,7 +25,7 @@ ms.author: rkarlin
26
25
27
26
28
27
29
-
In this quickstart, you will learn how to quickly be able to view and monitor what's happening across your environment using Azure Sentinel. After you connected your data sources to Azure Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Azure Sentinel gives you dashboards that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use built-in dashboards or create a new dashboard easily, from scratch or based on an existing dashboard.
28
+
In this quickstart, you will learn how to quickly be able to view and monitor what's happening across your environment using Azure Sentinel. After you connected your data sources to Azure Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Azure Sentinel gives you workbooks that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use built-in dashboards or create a new dashboard easily, from scratch or based on an existing dashboard.
30
29
31
30
## Get visualization
32
31
@@ -55,43 +54,43 @@ The main body of the overview page gives insight at a glance into the security s
## Use built-in dashboards<aname="dashboards"></a>
57
+
## Use built-in workbooks<aname="dashboards"></a>
59
58
60
-
Built-in dashboards provide integrated data from your connected data sources to let you deep dive into the events generated in those services. The built-in dashboards include Azure ID, Azure activity events, and on-premises, which can be data from Windows Events from servers, from first party alerts, from any third-party including firewall traffic logs, Office 365, and insecure protocols based on Windows events. The dashboards are based on Azure Monitor Workbooks to provide you with enhanced customizability and flexibility in designing your own dashboard. For more information, see [Workbooks](../azure-monitor/app/usage-workbooks.md).
59
+
Built-in workbooks provide integrated data from your connected data sources to let you deep dive into the events generated in those services. The built-in workbooks include Azure ID, Azure activity events, and on-premises, which can be data from Windows Events from servers, from first party alerts, from any third-party including firewall traffic logs, Office 365, and insecure protocols based on Windows events. The workbooks are based on Azure Monitor Workbooks to provide you with enhanced customizability and flexibility in designing your own workbook. For more information, see [Workbooks](../azure-monitor/app/usage-workbooks.md).
61
60
62
-
1. Under **Settings**, select **Dashboards**. Under **Installed**, you can see all your installed dashboards. Under **All**, you can see the whole gallery of built-in dashboards that are available for installation.
63
-
2. Search for a specific dashboard to see the whole list and description of what each offers.
64
-
3. Assuming you use Azure AD, to get up and running with Azure Sentinel, we recommend that you install at least the following dashboards:
61
+
1. Under **Settings**, select **Workbooks**. Under **Installed**, you can see all your installed workbook. Under **All**, you can see the whole gallery of built-in workbooks that are available for installation.
62
+
2. Search for a specific workbook to see the whole list and description of what each offers.
63
+
3. Assuming you use Azure AD, to get up and running with Azure Sentinel, we recommend that you install at least the following workbooks:
65
64
-**Azure AD**: Use either or both of the following:
66
-
-**Azure AD sign-ins** analyzes sign-ins over time to see if there are anomalies. This dashboard provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
65
+
-**Azure AD sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbooks provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
67
66
-**Azure AD audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
68
67
69
-
- Add a dashboard for your firewall. For example, add the Palo Alto dashboard. The dashboard analyzes your firewall traffic, providing you with correlations between your firewall data and threat events, and highlights suspicious events across entities. Dashboards provide you with information about trends in your traffic and let you drill down into and filter results.
68
+
- Add a workbook for your firewall. For example, add the Palo Alto workbook. The workbook analyzes your firewall traffic, providing you with correlations between your firewall data and threat events, and highlights suspicious events across entities. Workbooks provide you with information about trends in your traffic and let you drill down into and filter results.
You can customize the dashboards either by editing the main query . You can click the button  to go to [Log Analytics to edit the query there](../azure-monitor/log-query/get-started-portal.md), and you can select the ellipsis (...) and select **Customize tile data**, which enables you to edit the main time filter, or remove the specific tiles from the dashboard.
73
+
You can customize the workbooks either by editing the main query . You can click the button  to go to [Log Analytics to edit the query there](../azure-monitor/log-query/get-started-portal.md), and you can select the ellipsis (...) and select **Customize tile data**, which enables you to edit the main time filter, or remove the specific tiles from the workbook.
75
74
76
75
For more information on working with queries, see [Tutorial: Visual data in Log Analytics](../azure-monitor/learn/tutorial-logs-dashboards.md)
77
76
78
77
### Add a new tile
79
78
80
-
If you want to add a new tile, you can add it to an existing dashboard, either one that you create or an Azure Sentinel built-in dashboard.
79
+
If you want to add a new tile, you can add it to an existing workbook, either one that you create or an Azure Sentinel built-in workbook.
81
80
1. In Log Analytics, create a tile using the instructions found in [Tutorial: Visual data in Log Analytics](../azure-monitor/learn/tutorial-logs-dashboards.md).
82
-
2. After the tile is created, under **Pin**, select the dashboard in which you want the tile to appear.
81
+
2. After the tile is created, under **Pin**, select the workbook in which you want the tile to appear.
83
82
84
-
## Create new dashboards
85
-
You can create a new dashboard from scratch or use a built-in dashboard as the basis for your new dashboard.
83
+
## Create new workbooks
84
+
You can create a new workbook from scratch or use a built-in workbook as the basis for your new workbook.
86
85
87
-
1. To create a new dashboard from scratch, select **Dashboards** and then **+New dashboard**.
88
-
2. Select the subscription the dashboard is created in and give it a descriptive name. Each dashboard is an Azure resource like any other, and you can assign it roles (RBAC) to define and limit who can access.
89
-
3. To enable it to show up in your dashboards to pin visualizations to, you have to share it. Click **Share** and then **Manage users**.
86
+
1. To create a new workbook from scratch, select **Workbooks** and then **+New workbook**.
87
+
2. Select the subscription the workbook is created in and give it a descriptive name. Each workbook is an Azure resource like any other, and you can assign it roles (RBAC) to define and limit who can access.
88
+
3. To enable it to show up in your workbooks to pin visualizations to, you have to share it. Click **Share** and then **Manage users**.
90
89
91
-
1. Use the **Check access** and **Role assignments** as you would for any other Azure resource. For more information, see [Share Azure dashboards by using RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
90
+
1. Use the **Check access** and **Role assignments** as you would for any other Azure resource. For more information, see [Share Azure workbooks by using RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
92
91
93
92
94
-
## New dashboard examples
93
+
## New workbook examples
95
94
96
95
The following sample query enables you to compare trends of traffic across weeks. You can easily switch which device vendor and data source you run the query on. This example uses SecurityEvent from Windows, you can switch it to run on AzureActivity or CommonSecurityLog on any other firewall.
97
96
@@ -113,26 +112,22 @@ You might want to create a query that incorporates data from multiples sources.
113
112
| project OperationName, RoleAssignmentTime = TimeGenerated, user = Caller) on user
114
113
| project-away user1
115
114
116
-
You can create different dashboards based on role of person looking at the data and what they're looking for. For example, you can create a dashboard for your network admin that includes the firewall data. You can also create dashboards based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour, for example, you might want to look at your Azure AD sign-ins every hour to search for anomalies.
115
+
You can create different workbooks based on role of person looking at the data and what they're looking for. For example, you can create a dashboard for your network admin that includes the firewall data. You can also create workbooks based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour, for example, you might want to look at your Azure AD sign-ins every hour to search for anomalies.
117
116
118
117
## Create new detections
119
118
120
119
Generate detections on the [data sources that you connected to Azure Sentinel](connect-data-sources.md) to investigate threats in your organization.
121
120
122
121
When you create a new detection, leverage the built-in detections crafted by Microsoft security researchers that are tailored to the data sources you connected.
123
122
124
-
1.[In the GitHub community,](https://github.com/Azure/Azure-Sentinel/tree/master/Detections) go to the **Detections** folder and select the relevant folders.

132
126
127
+
For more information about getting out-of-the-box detections, see [Tutorial: Get built-in-analytics](tutorial-detect-threats-built-in.md).
133
128
134
129
## Next steps
135
130
In this quickstart, you learned how to get started using Azure Sentinel. Continue to the tutorial for [how to detect threats](tutorial-detect-threats-built-in.md).
136
131
> [!div class="nextstepaction"]
137
-
> [Detect threats](tutorial-detect-threats-built-in.md) to automate your responses to threats.
132
+
> [Create custom threat detection rules](tutorial-detect-threats-custom.md) to automate your responses to threats.
@@ -48,7 +48,7 @@ This following template types are available:
48
48
49
49
## Use out-of-the-box detections
50
50
51
-
1. In order to use a built-in template, click on **Create rule** to create a new active rule based on that template.
51
+
1. In order to use a built-in template, click on **Create rule** to create a new active rule based on that template. Each entry has a list of required data sources that are automatically checked and this can result in **Create rule** being disabled.
52
52
53
53

54
54
@@ -61,7 +61,5 @@ For more information on the fields in the wizard, see [Tutorial: Create custom a
61
61
## Next steps
62
62
In this tutorial, you learned how to get started detecting threats using Azure Sentinel.
63
63
64
-
To learn how to automate your responses to threats, [how to respond to threats using automated playbooks](tutorial-respond-threats-playbook.md).
65
-
> [!div class="nextstepaction"]
66
-
> [Respond to threats](tutorial-respond-threats-playbook.md) to automate your responses to threats.
64
+
To learn how to automate your responses to threats, [Set up automated threat responses in Azure Sentinel](tutorial-respond-threats-playbook.md).
0 commit comments