Skip to content

Commit a8673b3

Browse files
authored
Merge pull request #89384 from rkarlin/fixed-mess-ga-sentinel
updating with carol's review, raz's review and Mor's last comments
2 parents 05cbf6b + 85366f3 commit a8673b3

12 files changed

+52
-102
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26034,6 +26034,11 @@
2603426034
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-autoscale-powershell",
2603526035
"redirect_document_id": false
2603626036
},
26037+
{
26038+
"source_path": "articles/sentinel/tutorial-detect-threats.md",
26039+
"redirect_url": "/azure/sentinel/tutorial-detect-threats-built-in",
26040+
"redirect_document_id": false
26041+
},
2603726042
{
2603826043
"source_path": "articles/sentinel/user-analytics.md",
2603926044
"redirect_url": "/azure/sentinel/overview",

articles/sentinel/TOC.yml

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,10 @@
1111
href: quickstart-get-visibility.md
1212
- name: Tutorials
1313
items:
14-
- name: Detect suspicious threats
15-
href: tutorial-detect-threats.md
16-
items:
17-
- name: Use built-in analytics
18-
href: tutorial-detect-threats-built-in.md
19-
- name: Use custom rules
20-
href: tutorial-detect-threats-custom.md
14+
- name: Use built-in analytics to detect threats
15+
href: tutorial-detect-threats-built-in.md
16+
- name: Create custom rules to detect threats
17+
href: tutorial-detect-threats-custom.md
2118
- name: Monitor your data
2219
href: tutorial-monitor-your-data.md
2320
- name: Investigate incidents
85.4 KB
Loading
-1.18 KB
Loading

articles/sentinel/multiple-tenants-service-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ If you’re a managed security service provider (MSSP) and you’re using [Azure
3333
1. Open Azure Sentinel. You will see all the workspaces in the selected subscriptions, and you’ll be able to work with them seamlessly, like any workspace in your own tenant.
3434

3535
> [!NOTE]
36-
> You will not be able to connect connectors in Azure Sentinel from within a managed workspace. To connect a connector, you must directly sign into the tenant on which you want to connect a connector and authenticate there with the required permissions.
36+
> You will not be able to deploy connectors in Azure Sentinel from within a managed workspace. To deploy a connector, you must directly sign into the tenant on which you want to deploy a connector and authenticate there with the required permissions.
3737
3838

3939

articles/sentinel/offboard.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,9 @@ If you no longer want to use the Azure Sentinel, this article explains how to re
2323

2424
## How to delete Azure Sentinel
2525

26-
In the background, when you install Azure Sentinel, the **SecurityInsights** solution is installed on your selected workspace. So the first thing you need to do is remove the solution. In the Azure portal, you need to delete the SecurityInsights solution.
26+
In the background, when you install Azure Sentinel, the **SecurityInsights** solution is installed on your selected workspace. So the first thing you need to do is remove the **SecurityInsights** solution.
2727

28-
1. Go to **Workspace settings** and then **Solutions**.
28+
1. Go to **Azure Sentinel**, followed by **Configuration**, followed by **Workspace settings**, and then **Solutions**.
2929

3030
2. Select `SecurityInsights` and click on it.
3131

@@ -34,7 +34,7 @@ In the background, when you install Azure Sentinel, the **SecurityInsights** sol
3434
3. At the top of the page select **Delete**.
3535

3636
> [!IMPORTANT]
37-
> If you delete the workspace, the removal process is also triggered.
37+
> If you delete the workspace, the the workspace and Azure Sentinel are removed from your tenant in Azure Monitor.
3838
3939
![Delete the SecurityInsights solution](media/offboard/delete-solution.png)
4040

@@ -45,19 +45,17 @@ When you delete the solution, Azure Sentinel takes up to 48 hours to complete th
4545
After the disconnection is identified, the offboarding process begins.
4646

4747
**The configuration of these connectors is deleted:**
48-
- Office activity
48+
- Office 365
4949

50-
- AWS cloud trail
50+
- AWS
5151

5252
- Microsoft services security alerts (Azure ATP, Microsoft Cloud App Security including Cloud Discovery Shadow IT reporting, Azure AD Identity Protection, Microsoft Defender ATP, Azure Security Center)
5353

54-
- Threat Intelligence indicator
55-
56-
- CloudTrail
54+
- Threat Intelligence
5755

5856
- Common security logs (including CEF-based logs, Barracuda, and Syslog) (If you have Azure Security Center, these logs will continue to be collected.)
5957

60-
- Windows security events (If you have Azure Security Center, these logs will continue to be collected.)
58+
- Windows Security Events (If you have Azure Security Center, these logs will continue to be collected.)
6159

6260
Within the first 48 hours, the data and alert rules (including real-time automation configuration) will no longer be accessible or queryable in Azure Sentinel.
6361

articles/sentinel/quickstart-get-visibility.md

Lines changed: 23 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ author: rkarlin
77
manager: rkarlin
88
editor: ''
99

10-
ms.assetid: 5a4ae93c-d648-41fb-8fb8-96a025d2f73e
1110
ms.service: azure-sentinel
1211
ms.subservice: azure-sentinel
1312
ms.devlang: na
@@ -26,7 +25,7 @@ ms.author: rkarlin
2625

2726

2827

29-
In this quickstart, you will learn how to quickly be able to view and monitor what's happening across your environment using Azure Sentinel. After you connected your data sources to Azure Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Azure Sentinel gives you dashboards that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use built-in dashboards or create a new dashboard easily, from scratch or based on an existing dashboard.
28+
In this quickstart, you will learn how to quickly be able to view and monitor what's happening across your environment using Azure Sentinel. After you connected your data sources to Azure Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Azure Sentinel gives you workbooks that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use built-in dashboards or create a new dashboard easily, from scratch or based on an existing dashboard.
3029

3130
## Get visualization
3231

@@ -55,43 +54,43 @@ The main body of the overview page gives insight at a glance into the security s
5554

5655
![Azure Sentinel map](./media/qs-get-visibility/anomolies.png)
5756

58-
## Use built-in dashboards<a name="dashboards"></a>
57+
## Use built-in workbooks<a name="dashboards"></a>
5958

60-
Built-in dashboards provide integrated data from your connected data sources to let you deep dive into the events generated in those services. The built-in dashboards include Azure ID, Azure activity events, and on-premises, which can be data from Windows Events from servers, from first party alerts, from any third-party including firewall traffic logs, Office 365, and insecure protocols based on Windows events. The dashboards are based on Azure Monitor Workbooks to provide you with enhanced customizability and flexibility in designing your own dashboard. For more information, see [Workbooks](../azure-monitor/app/usage-workbooks.md).
59+
Built-in workbooks provide integrated data from your connected data sources to let you deep dive into the events generated in those services. The built-in workbooks include Azure ID, Azure activity events, and on-premises, which can be data from Windows Events from servers, from first party alerts, from any third-party including firewall traffic logs, Office 365, and insecure protocols based on Windows events. The workbooks are based on Azure Monitor Workbooks to provide you with enhanced customizability and flexibility in designing your own workbook. For more information, see [Workbooks](../azure-monitor/app/usage-workbooks.md).
6160

62-
1. Under **Settings**, select **Dashboards**. Under **Installed**, you can see all your installed dashboards. Under **All**, you can see the whole gallery of built-in dashboards that are available for installation.
63-
2. Search for a specific dashboard to see the whole list and description of what each offers.
64-
3. Assuming you use Azure AD, to get up and running with Azure Sentinel, we recommend that you install at least the following dashboards:
61+
1. Under **Settings**, select **Workbooks**. Under **Installed**, you can see all your installed workbook. Under **All**, you can see the whole gallery of built-in workbooks that are available for installation.
62+
2. Search for a specific workbook to see the whole list and description of what each offers.
63+
3. Assuming you use Azure AD, to get up and running with Azure Sentinel, we recommend that you install at least the following workbooks:
6564
- **Azure AD**: Use either or both of the following:
66-
- **Azure AD sign-ins** analyzes sign-ins over time to see if there are anomalies. This dashboard provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
65+
- **Azure AD sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbooks provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
6766
- **Azure AD audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
6867

69-
- Add a dashboard for your firewall. For example, add the Palo Alto dashboard. The dashboard analyzes your firewall traffic, providing you with correlations between your firewall data and threat events, and highlights suspicious events across entities. Dashboards provide you with information about trends in your traffic and let you drill down into and filter results.
68+
- Add a workbook for your firewall. For example, add the Palo Alto workbook. The workbook analyzes your firewall traffic, providing you with correlations between your firewall data and threat events, and highlights suspicious events across entities. Workbooks provide you with information about trends in your traffic and let you drill down into and filter results.
7069

7170
![Pal Alto dashboard](./media/qs-get-visibility/palo-alto-week-query.png)
7271

7372

74-
You can customize the dashboards either by editing the main query ![button](./media/qs-get-visibility/edit-query-button.png). You can click the button ![button](./media/qs-get-visibility/go-to-la-button.png) to go to [Log Analytics to edit the query there](../azure-monitor/log-query/get-started-portal.md), and you can select the ellipsis (...) and select **Customize tile data**, which enables you to edit the main time filter, or remove the specific tiles from the dashboard.
73+
You can customize the workbooks either by editing the main query ![button](./media/qs-get-visibility/edit-query-button.png). You can click the button ![button](./media/qs-get-visibility/go-to-la-button.png) to go to [Log Analytics to edit the query there](../azure-monitor/log-query/get-started-portal.md), and you can select the ellipsis (...) and select **Customize tile data**, which enables you to edit the main time filter, or remove the specific tiles from the workbook.
7574

7675
For more information on working with queries, see [Tutorial: Visual data in Log Analytics](../azure-monitor/learn/tutorial-logs-dashboards.md)
7776

7877
### Add a new tile
7978

80-
If you want to add a new tile, you can add it to an existing dashboard, either one that you create or an Azure Sentinel built-in dashboard.
79+
If you want to add a new tile, you can add it to an existing workbook, either one that you create or an Azure Sentinel built-in workbook.
8180
1. In Log Analytics, create a tile using the instructions found in [Tutorial: Visual data in Log Analytics](../azure-monitor/learn/tutorial-logs-dashboards.md).
82-
2. After the tile is created, under **Pin**, select the dashboard in which you want the tile to appear.
81+
2. After the tile is created, under **Pin**, select the workbook in which you want the tile to appear.
8382

84-
## Create new dashboards
85-
You can create a new dashboard from scratch or use a built-in dashboard as the basis for your new dashboard.
83+
## Create new workbooks
84+
You can create a new workbook from scratch or use a built-in workbook as the basis for your new workbook.
8685

87-
1. To create a new dashboard from scratch, select **Dashboards** and then **+New dashboard**.
88-
2. Select the subscription the dashboard is created in and give it a descriptive name. Each dashboard is an Azure resource like any other, and you can assign it roles (RBAC) to define and limit who can access.
89-
3. To enable it to show up in your dashboards to pin visualizations to, you have to share it. Click **Share** and then **Manage users**.
86+
1. To create a new workbook from scratch, select **Workbooks** and then **+New workbook**.
87+
2. Select the subscription the workbook is created in and give it a descriptive name. Each workbook is an Azure resource like any other, and you can assign it roles (RBAC) to define and limit who can access.
88+
3. To enable it to show up in your workbooks to pin visualizations to, you have to share it. Click **Share** and then **Manage users**.
9089

91-
1. Use the **Check access** and **Role assignments** as you would for any other Azure resource. For more information, see [Share Azure dashboards by using RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
90+
1. Use the **Check access** and **Role assignments** as you would for any other Azure resource. For more information, see [Share Azure workbooks by using RBAC](../azure-portal/azure-portal-dashboard-share-access.md).
9291

9392

94-
## New dashboard examples
93+
## New workbook examples
9594

9695
The following sample query enables you to compare trends of traffic across weeks. You can easily switch which device vendor and data source you run the query on. This example uses SecurityEvent from Windows, you can switch it to run on AzureActivity or CommonSecurityLog on any other firewall.
9796

@@ -113,26 +112,22 @@ You might want to create a query that incorporates data from multiples sources.
113112
| project OperationName, RoleAssignmentTime = TimeGenerated, user = Caller) on user
114113
| project-away user1
115114

116-
You can create different dashboards based on role of person looking at the data and what they're looking for. For example, you can create a dashboard for your network admin that includes the firewall data. You can also create dashboards based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour, for example, you might want to look at your Azure AD sign-ins every hour to search for anomalies.
115+
You can create different workbooks based on role of person looking at the data and what they're looking for. For example, you can create a dashboard for your network admin that includes the firewall data. You can also create workbooks based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour, for example, you might want to look at your Azure AD sign-ins every hour to search for anomalies.
117116

118117
## Create new detections
119118

120119
Generate detections on the [data sources that you connected to Azure Sentinel](connect-data-sources.md) to investigate threats in your organization.
121120

122121
When you create a new detection, leverage the built-in detections crafted by Microsoft security researchers that are tailored to the data sources you connected.
123122

124-
1. [In the GitHub community,](https://github.com/Azure/Azure-Sentinel/tree/master/Detections) go to the **Detections** folder and select the relevant folders.
125-
![relevant folders](./media/qs-get-visibility/detection-folders.png)
126-
127-
3. Go to the **Analytics** tab and select **add**.
128-
![create rule in Log Analytics](./media/qs-get-visibility/query-params.png)
123+
To view all the out-of-the-box detections, go to **Analytics** and then **Rule templates**. This tab contains all the Azure Sentinel built-in rules.
129124

130-
3. Copy all parameters to the rule and click **Create**.
131-
![create alert rule](./media/qs-get-visibility/create-alert-rule.png)
125+
![Use built-in detections to find threats with Azure Sentinel](media/tutorial-detect-built-in/view-oob-detections.png)
132126

127+
For more information about getting out-of-the-box detections, see [Tutorial: Get built-in-analytics](tutorial-detect-threats-built-in.md).
133128

134129
## Next steps
135130
In this quickstart, you learned how to get started using Azure Sentinel. Continue to the tutorial for [how to detect threats](tutorial-detect-threats-built-in.md).
136131
> [!div class="nextstepaction"]
137-
> [Detect threats](tutorial-detect-threats-built-in.md) to automate your responses to threats.
132+
> [Create custom threat detection rules](tutorial-detect-threats-custom.md) to automate your responses to threats.
138133

articles/sentinel/quickstart-onboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ After you connect your data sources, choose from a gallery of expertly created d
3838
- To enable Azure Sentinel, you need contributor permissions to the subscription in which the Azure Sentinel workspace resides.
3939
- To use Azure Sentinel, you need either contributor or reader permissions on the resource group that the workspace belongs to.
4040
- Additional permissions may be needed to connect specific data sources.
41-
- Azure Sentinel is a paid service. For pricing information see
41+
- Azure Sentinel is a paid service. For pricing information see [About Azure Sentinel](https://go.microsoft.com/fwlink/?linkid=2104058).
4242

4343
## Enable Azure Sentinel <a name="enable"></a>
4444

articles/sentinel/tutorial-detect-threats-built-in.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.date: 09/23/2019
1717
ms.author: rkarlin
1818

1919
---
20-
# Tutorial: Detect threats out-of-the-box - Preview
20+
# Tutorial: Detect threats out-of-the-box
2121

2222

2323
> [!IMPORTANT]
@@ -48,7 +48,7 @@ This following template types are available:
4848

4949
## Use out-of-the-box detections
5050

51-
1. In order to use a built-in template, click on **Create rule** to create a new active rule based on that template.
51+
1. In order to use a built-in template, click on **Create rule** to create a new active rule based on that template. Each entry has a list of required data sources that are automatically checked and this can result in **Create rule** being disabled.
5252

5353
![Use built-in detections to find threats with Azure Sentinel](media/tutorial-detect-built-in/use-built-in-template.png)
5454

@@ -61,7 +61,5 @@ For more information on the fields in the wizard, see [Tutorial: Create custom a
6161
## Next steps
6262
In this tutorial, you learned how to get started detecting threats using Azure Sentinel.
6363

64-
To learn how to automate your responses to threats, [how to respond to threats using automated playbooks](tutorial-respond-threats-playbook.md).
65-
> [!div class="nextstepaction"]
66-
> [Respond to threats](tutorial-respond-threats-playbook.md) to automate your responses to threats.
64+
To learn how to automate your responses to threats, [Set up automated threat responses in Azure Sentinel](tutorial-respond-threats-playbook.md).
6765

0 commit comments

Comments
 (0)