Skip to content

Commit c6c8d8d

Browse files
committed
workbooks content
1 parent 2ae12e6 commit c6c8d8d

File tree

3 files changed

+97
-161
lines changed

3 files changed

+97
-161
lines changed

articles/sentinel/get-visibility.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ If your workspace is onboarded to the unified security operations platform, sele
2424

2525
:::image type="content" source="media/get-visibility/dashboard.png" alt-text="Screenshot of the Microsoft Sentinel Overview dashboard.":::
2626

27-
Data for each section of the dashboard is pre-calculated, and the last refresh time is shown at the top of each section. Select **Refresh** at the top of the page to refresh the entire page.
27+
Data for each section of the dashboard is precalculated, and the last refresh time is shown at the top of each section. Select **Refresh** at the top of the page to refresh the entire page.
2828

2929
## View incident data
3030

@@ -36,7 +36,7 @@ The following image shows an example of the **Incidents** section on the **Overv
3636

3737
The **Incidents** section lists the following data:
3838

39-
- The number of number of new, active, and closed incidents over the last 24 hours.
39+
- The number of new, active, and closed incidents over the last 24 hours.
4040
- The total number of incidents of each severity.
4141
- The number of closed incidents of each type of closing classification.
4242
- Incident statuses by creation time, in four hour intervals.
@@ -52,7 +52,7 @@ After deploying automation with Microsoft Sentinel, monitor your workspace's aut
5252

5353
- Start with a summary of the automation rules activity: Incidents closed by automation, the time the automation saved, and related playbooks health.
5454

55-
Microsoft Sentinel calculates the time saved by automation by finding the average time that a single automation saved, multiplied by the number of incident that were resolved by automation. The formula is as follows:
55+
Microsoft Sentinel calculates the time saved by automation by finding the average time that a single automation saved, multiplied by the number of incidents resolved by automation. The formula is as follows:
5656

5757
`(avgWithout - avgWith) * resolvedByAutomation`
5858

@@ -64,7 +64,7 @@ After deploying automation with Microsoft Sentinel, monitor your workspace's aut
6464

6565
- Below the summary, a graph summarizes the numbers of actions performed by automation, by type of action.
6666

67-
- At the bottom of the section, find a count of the active automation rules with a link to the automation blade.
67+
- At the bottom of the section, find a count of the active automation rules with a link to the **Automation** page.
6868

6969
Select the **configure automation rules** link to the jump the **Automation** page, where you can configure more automation.
7070

@@ -90,10 +90,23 @@ Track data for your analytics rules in the **Analytics** section of the **Overvi
9090

9191
:::image type="content" source="./media/qs-get-visibility/analytics.png" alt-text="Screenshot of the Analytics section in the Microsoft Sentinel Overview page.":::
9292

93-
The number of analytics rules in Microsoft Sentinel are shown by status, including enabled, disabled, and auto-disabled.
93+
The number of analytics rules in Microsoft Sentinel are shown by status, including enabled, disabled, and autodisabled.
9494

9595
Select the **MITRE view** link to jump to the **MITRE ATT&CK**, where you can view how your environment is protected against MITRE ATT&CK tactics and techniques. Select the **manage analytics rules** link to jump to the **Analytics** page, where you can view and manage the rules that configure how alerts are triggered.
9696

97+
<!--unclear what this section is doing here. doesn't seem to have any connection to workbooks?
98+
## Create new detections
99+
100+
Generate detections on the [data sources that you connected to Microsoft Sentinel](connect-data-sources.md) to investigate threats in your organization.
101+
102+
When you create a new detection, leverage the detections crafted by Microsoft security researchers that are tailored to the data sources you connected.
103+
104+
To view the installed out-of-the-box detections, go to **Analytics** and then **Rule templates**. This tab contains all the installed Microsoft Sentinel rule templates. To find more rule templates, go to the **Content hub** in Microsoft Sentinel to install product solutions or standalone content.
105+
106+
![Use built-in detections to find threats with Microsoft Sentinel](media/tutorial-detect-built-in/view-oob-detections.png)
107+
108+
For more information about getting out-of-the-box detections, see [Get built-in-analytics](detect-threats-built-in.md).
109+
-->
97110
## Next steps
98111

99112
Use workbook templates to dive deeper into events generated across your environment. For more information, see [Visualize log and query data with Microsoft Sentinel workbooks](workbooks.md).

articles/sentinel/monitor-your-data.md

Lines changed: 79 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Visualize your data using workbooks in Microsoft Sentinel | Microsoft Doc
33
description: Learn how to visualize your data using workbooks in Microsoft Sentinel.
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 03/07/2024
6+
ms.date: 05/22/2024
77
ms.author: yelevin
88
appliesto:
99
- Microsoft Sentinel in the Azure portal
@@ -13,7 +13,9 @@ ms.collection: usx-security
1313

1414
# Visualize and monitor your data by using workbooks in Microsoft Sentinel
1515

16-
After you connect your data sources to Microsoft Sentinel, visualize and monitor the data using workbooks in Microsoft Sentinel. Microsoft Sentinel allows you to create custom workbooks across your data or, use existing workbook templates available with packaged solutions or as standalone content from the content hub. These templates allow you to quickly gain insights across your data as soon as you connect a data source.
16+
After you connect your data sources to Microsoft Sentinel, visualize and monitor the data using workbooks in Microsoft Sentinel. Microsoft Sentinel workbooks are based on Azure Monitor workbooks, and add tables and charts with analytics for your logs and queries to the tools already available in Azure.
17+
18+
Microsoft Sentinel allows you to create custom workbooks across your data or use existing workbook templates available with packaged solutions or as standalone content from the content hub. Each workbook is an Azure resource like any other, and you can assign it with Azure role-based access control (RBAC) to define and limit who can access.
1719

1820
This article describes how to visualize your data in Microsoft Sentinel by using workbooks.
1921

@@ -24,6 +26,7 @@ This article describes how to visualize your data in Microsoft Sentinel by using
2426
- You must have at least **Workbook reader** or **Workbook contributor** permissions on the resource group of the Microsoft Sentinel workspace.
2527

2628
The workbooks that you see in Microsoft Sentinel are saved within the Microsoft Sentinel workspace's resource group and are tagged by the workspace in which they were created.
29+
2730
- To use a workbook template, install the solution that contains the workbook or install the workbook as a standalone item from the **Content Hub**. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
2831

2932
## Create a workbook from a template
@@ -50,18 +53,25 @@ Use a template installed from the content hub to create a workbook.
5053

5154
[ ![Screenshot that shows the saved workbook.](media/monitor-your-data/workbook-graph.png) ](media/monitor-your-data/workbook-graph.png#lightbox)
5255

53-
To clone your workbook, select **Edit** and then **Save as**. Save the clone with another name, under the same subscription and resource group. Cloned workbooks are displayed under the **My workbooks** tab.
56+
For example, select the **TimeRange** filter to view data for a different time range than the current selection. To edit a specific workbook area, either select **Edit** or select the ellipsis (**...**) to add elements, or move, clone, or remove the area.
57+
58+
To clone your workbook, select **Save as**. Save the clone with another name, under the same subscription and resource group. Cloned workbooks are displayed under the **My workbooks** tab.
5459

5560
1. When you're done, select **Save** to save your changes.
5661

57-
For more information, see how to [Create interactive reports with Azure Monitor Workbooks](../azure-monitor/visualize/workbooks-overview.md).
62+
For more information, see:
63+
64+
- [Create interactive reports with Azure Monitor Workbooks](../azure-monitor/visualize/workbooks-overview.md)
65+
- [Tutorial: Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md)
5866

5967
## Create new workbook
6068

6169
Create a workbook from scratch in Microsoft Sentinel.
6270

6371
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Workbooks**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Workbooks**.
72+
6473
1. Select **Add workbook**.
74+
6575
1. To edit the workbook, select **Edit**, and then add text, queries, and parameters as necessary. For more information on how to customize the workbook, see how to [Create interactive reports with Azure Monitor Workbooks](../azure-monitor/visualize/workbooks-overview.md).
6676

6777
[ ![Screenshot that shows a new workbook.](media/monitor-your-data/create-workbook.png) ](media/monitor-your-data/create-workbook.png#lightbox)
@@ -80,6 +90,12 @@ Create a workbook from scratch in Microsoft Sentinel.
8090

8191
[ ![Switch workbooks.](media/monitor-your-data/switch-workbooks.png) ](media/monitor-your-data/switch-workbooks.png#lightbox)
8292

93+
## Create new tiles for your workbooks
94+
95+
To add a custom tile to a Microsoft Sentinel workbook, first create the tile in Log Analytics. For more information, see [Visual data in Log Analytics](../azure-monitor/visualize/tutorial-logs-dashboards.md).
96+
97+
Once you create a tile, select **Pin** and then select the workbook where you want the tile to appear.
98+
8399
## Refresh your workbook data
84100

85101
Refresh your workbook to display updated data. In the toolbar, select one of the following options:
@@ -110,6 +126,64 @@ To print a workbook, or save it as a PDF, use the options menu to the right of t
110126

111127
To delete a saved workbook, either a saved template or a customized workbook, select the saved workbook that you want to delete and select **Delete**. This action removes the saved workbook. It also removes the workbook resource and any changes you made to the template. The original template remains available.
112128

129+
130+
## Workbook recommendations
131+
132+
This section reviews basic recommendations we have for using Microsoft Sentinel workbooks.
133+
134+
### Add Microsoft Entra ID workbooks
135+
136+
If you use Microsoft Entra ID with Microsoft Sentinel, we recommend that you install the Microsoft Entra solution for Microsoft Sentinel and use the following workbooks:
137+
138+
- **Microsoft Entra sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbook provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
139+
- **Microsoft Entra audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
140+
141+
### Add firewall workbooks
142+
143+
We recommend that you install the appropriate solution from the **Content hub** to add a workbook for your firewall.
144+
145+
For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlight suspicious events across entities.
146+
147+
![Screenshot of the Palo Alto workbook](./media/qs-get-visibility/palo-alto-week-query.png)
148+
149+
### Create different workbooks for different uses
150+
151+
We recommend creating different visualizations for each type of persona that uses workbooks, based on the persona's role and what they're looking for. For example, create a workbook for your network admin that includes the firewall data.
152+
153+
Alternately, create workbooks based on how frequently you want to look at them, whether there are things you want to review daily, and others items you want to check once an hour. For example, you might want to look at your Microsoft Entra sign-ins every hour to search for anomalies.
154+
155+
### Sample query for comparing traffic trends across weeks
156+
157+
Use the following query to create a visualization that compares traffic trends across weeks. Switch the device vendor and data source you run the query on, depending on your environment.
158+
159+
The following sample query uses the **SecurityEvent** table from Windows. You might want to switch it to run on the **AzureActivity** or **CommonSecurityLog** table, on any other firewall.
160+
161+
```kusto
162+
// week over week query
163+
SecurityEvent
164+
| where TimeGenerated > ago(14d)
165+
| summarize count() by bin(TimeGenerated, 1d)
166+
| extend Week = iff(TimeGenerated>ago(7d), "This Week", "Last Week"), TimeGenerated = iff(TimeGenerated>ago(7d), TimeGenerated, TimeGenerated + 7d)
167+
```
168+
169+
### Sample query with data from multiple sources
170+
171+
You might want to create a query that incorporates data from multiples sources. For example, create a query that looks at Microsoft Entra audit logs for new users that were created, and then checks your Azure logs to see if the user started making role assignment changes within 24 hours of creation. That suspicious activity would show up in a visualization with the following query:
172+
173+
```kusto
174+
AuditLogs
175+
| where OperationName == "Add user"
176+
| project AddedTime = TimeGenerated, user = tostring(TargetResources[0].userPrincipalName)
177+
| join (AzureActivity
178+
| where OperationName == "Create role assignment"
179+
| project OperationName, RoleAssignmentTime = TimeGenerated, user = Caller) on user
180+
| project-away user1
181+
```
182+
113183
## Related articles
114184

115-
To learn about popular built-in workbooks, see [Commonly used Microsoft Sentinel workbooks](top-workbooks.md).
185+
For more information, see:
186+
187+
- [Commonly used Microsoft Sentinel workbooks](top-workbooks.md)
188+
189+
- [Azure Monitor workbooks](/azure/azure-monitor/visualize/workbooks-overview)

0 commit comments

Comments
 (0)