Skip to content

Commit d032c02

Browse files
authored
Merge pull request #299308 from batamig/transition-guide-ii
Transition guide take 2 in Sentinel docs
2 parents 531afe5 + f942896 commit d032c02

10 files changed

+404
-165
lines changed

articles/sentinel/TOC.yml

Lines changed: 50 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@
5353
href: enable-sentinel-features-content.md
5454
- name: Onboard to Microsoft Sentinel
5555
href: quickstart-onboard.md
56+
- name: Connect Microsoft Sentinel to the Defender portal
57+
href: /unified-secops-platform/microsoft-sentinel-onboard?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
5658
- name: Configure content
5759
href: configure-content.md
5860
- name: Set up multiple workspaces
@@ -63,52 +65,56 @@
6365
href: configure-data-retention-archive.md
6466
- name: Deploy side-by-side
6567
href: deploy-side-by-side.md
66-
- name: Migrate to Microsoft Sentinel
68+
- name: Migrate
6769
items:
68-
- name: Plan and design your migration
70+
- name: Transition your environment to the Defender portal
71+
href: move-to-defender.md
72+
- name: Migrate to Microsoft Sentinel
6973
items:
70-
- name: Plan your migration
71-
href: migration.md
72-
- name: Use the SIEM migration experience
73-
href: siem-migration.md
74-
- name: Track migration with a workbook
75-
href: migration-track.md
76-
- name: Migrate from ArcSight
77-
items:
78-
- name: Migrate detection rules
79-
href: migration-arcsight-detection-rules.md
80-
- name: Migrate SOAR automation
81-
href: migration-arcsight-automation.md
82-
- name: Export historical data
83-
href: migration-arcsight-historical-data.md
84-
- name: Migrate from Splunk
85-
items:
86-
- name: Migrate detection rules
87-
href: migration-splunk-detection-rules.md
88-
- name: Migrate SOAR automation
89-
href: migration-splunk-automation.md
90-
- name: Export historical data
91-
href: migration-splunk-historical-data.md
92-
- name: Migrate from QRadar
93-
items:
94-
- name: Migrate detection rules
95-
href: migration-qradar-detection-rules.md
96-
- name: Migrate SOAR automation
97-
href: migration-qradar-automation.md
98-
- name: Export historical data
99-
href: migration-qradar-historical-data.md
100-
- name: Ingest historical data
101-
items:
102-
- name: Select target platform
103-
href: migration-ingestion-target-platform.md
104-
- name: Select data ingestion tool
105-
href: migration-ingestion-tool.md
106-
- name: Ingest data
107-
href: migration-export-ingest.md
108-
- name: Convert dashboards to workbooks
109-
href: migration-convert-dashboards.md
110-
- name: Update SOC processes
111-
href: migration-security-operations-center-processes.md
74+
- name: Plan and design your migration
75+
items:
76+
- name: Plan your migration
77+
href: migration.md
78+
- name: Use the SIEM migration experience
79+
href: siem-migration.md
80+
- name: Track migration with a workbook
81+
href: migration-track.md
82+
- name: Migrate from ArcSight
83+
items:
84+
- name: Migrate detection rules
85+
href: migration-arcsight-detection-rules.md
86+
- name: Migrate SOAR automation
87+
href: migration-arcsight-automation.md
88+
- name: Export historical data
89+
href: migration-arcsight-historical-data.md
90+
- name: Migrate from Splunk
91+
items:
92+
- name: Migrate detection rules
93+
href: migration-splunk-detection-rules.md
94+
- name: Migrate SOAR automation
95+
href: migration-splunk-automation.md
96+
- name: Export historical data
97+
href: migration-splunk-historical-data.md
98+
- name: Migrate from QRadar
99+
items:
100+
- name: Migrate detection rules
101+
href: migration-qradar-detection-rules.md
102+
- name: Migrate SOAR automation
103+
href: migration-qradar-automation.md
104+
- name: Export historical data
105+
href: migration-qradar-historical-data.md
106+
- name: Ingest historical data
107+
items:
108+
- name: Select target platform
109+
href: migration-ingestion-target-platform.md
110+
- name: Select data ingestion tool
111+
href: migration-ingestion-tool.md
112+
- name: Ingest data
113+
href: migration-export-ingest.md
114+
- name: Convert dashboards to workbooks
115+
href: migration-convert-dashboards.md
116+
- name: Update SOC processes
117+
href: migration-security-operations-center-processes.md
112118
- name: Manage solutions and content
113119
items:
114120
- name: Overview
@@ -1099,8 +1105,6 @@
10991105
href: /azure/azure-monitor/logs/data-retention-configure?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
11001106
- name: Auxiliary logs use cases
11011107
href: basic-logs-use-cases.md
1102-
- name: Connect Microsoft Sentinel to Microsoft Defender XDR
1103-
href: /defender-xdr/microsoft-sentinel-onboard?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
11041108
- name: Manage multiple workspaces
11051109
items:
11061110
- name: Workspaces in the Defender portal

articles/sentinel/automation/automation.md

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -53,23 +53,7 @@ For more information, see [Automate threat response with playbooks in Microsoft
5353

5454
After onboarding your Microsoft Sentinel workspace to the Defender portal, note the following differences in the way automation functions in your workspace:
5555

56-
| Functionality | Description |
57-
| --------- | --------- |
58-
| **Automation rules with alert triggers** | In the Defender portal, automation rules with alert triggers act only on Microsoft Sentinel alerts. <br><br>For more information, see [Alert create trigger](../automate-incident-handling-with-automation-rules.md#alert-create-trigger). |
59-
| **Automation rules with incident triggers** | In both the Azure portal and the Defender portal, the **Incident provider** condition property is removed, as all incidents have *Microsoft XDR* as the incident provider (the value in the *ProviderName* field). <br><br>At that point, any existing automation rules run on both Microsoft Sentinel and Microsoft Defender XDR incidents, including those where the **Incident provider** condition is set to only *Microsoft Sentinel* or *Microsoft 365 Defender*. <br><br>However, automation rules that specify a specific analytics rule name run only on incidents that contain alerts that were created by the specified analytics rule. This means that you can define the **Analytic rule name** condition property to an analytics rule that exists only in Microsoft Sentinel to limit your rule to run on incidents only in Microsoft Sentinel. <br><br>For more information, see [Incident trigger conditions](../automate-incident-handling-with-automation-rules.md#conditions). |
60-
|**Latency in playbook triggers** | [It might take up to 5 minutes](../microsoft-sentinel-defender-portal.md#5min) for Microsoft Defender incidents to appear in Microsoft Sentinel. If this delay is present, playbook triggering is delayed too. |
61-
| **Changes to existing incident names** | The Defender portal uses a unique engine to correlate incidents and alerts. When onboarding your workspace to the Defender portal, existing incident names might be changed if the correlation is applied. To ensure that your automation rules always run correctly, we therefore recommend that you avoid using incident titles as condition criteria in your automation rules, and suggest instead to use the name of any analytics rule that created alerts included in the incident, and tags if more specificity is required. |
62-
| ***Updated by* field** | <li>After onboarding your workspace, the **Updated by** field has a [new set of supported values](../automate-incident-handling-with-automation-rules.md#incident-update-trigger), which no longer include *Microsoft 365 Defender*. In existing automation rules, *Microsoft 365 Defender* is replaced by a value of *Other* after onboarding your workspace. <br><br><li>If multiple changes are made to the same incident in a 5-10 minute period, a single update is sent to Microsoft Sentinel, with only the most recent change. <br><br>For more information, see [Incident update trigger](../automate-incident-handling-with-automation-rules.md#incident-update-trigger). |
63-
| **Automation rules that add incident tasks** | If an automation rule adds an incident task, the task is shown only in the Azure portal. |
64-
| **Creating automation rules directly from an incident** | [Creating automation rules directly from an incident](../false-positives.md#add-exceptions-with-automation-rules-azure-portal-only) is supported only in the Azure portal. If you're working in the Defender portal, create your automation rules from scratch from the **Automation** page. |
65-
| **Microsoft incident creation rules** | Microsoft incident creation rules aren't supported in the Defender portal. <br><br>For more information, see [Microsoft Defender XDR incidents and Microsoft incident creation rules](../microsoft-365-defender-sentinel-integration.md#microsoft-defender-xdr-incidents-and-microsoft-incident-creation-rules). |
66-
| **Running automation rules from the Defender portal** | It might take up to 10 minutes from the time that an alert is triggered and an incident is created or updated in the Defender portal to when an automation rule is run. This time lag is because the incident is created in the Defender portal and then forwarded to Microsoft Sentinel for the automation rule. |
67-
| **Active playbooks tab** | After onboarding to the Defender portal, by default the **Active playbooks** tab shows a predefined filter with onboarded workspace's subscription. In the Azure portal, add data for other subscriptions using the subscription filter. <br><br>For more information, see [Create and customize Microsoft Sentinel playbooks from content templates](use-playbook-templates.md). |
68-
| **Running playbooks manually on demand** | The following procedures aren't currently supported in the Defender portal: <br><li>[Run a playbook manually on an alert](run-playbooks.md#run-a-playbook-manually-on-an-alert)<br><li>[Run a playbook manually on an entity](run-playbooks.md#run-a-playbook-manually-on-an-entity) |
69-
| **Running playbooks on incidents requires Microsoft Sentinel sync** | If you try to run a playbook on an incident from the Defender portal and see the message *"Can't access data related to this action. Refresh the screen in a few minutes."* message, this means that the incident isn't yet synchronized to Microsoft Sentinel. <br><br>Refresh the incident page after the incident is synchronized to run the playbook successfully. |
70-
| **Incidents: Adding alerts to incidents / <br>Removing alerts from incidents** | Since adding alerts to, or removing alerts from incidents isn't supported after onboarding your workspace to the Defender portal, these actions are also not supported from within playbooks. For more information, see [Capability differences between portals](../microsoft-sentinel-defender-portal.md#capability-differences-between-portals). |
71-
|**Microsoft Defender XDR integration in multiple workspaces**|If you've integrated XDR data with more than one workspace in a single tenant, the data will now only be ingested into the primary workspace in the Defender portal. Transfer automation rules to the relevant workspace to keep them running.|
72-
|**Automation and the Correlation engine** |The correlation engine may combine alerts from multiple signals into a single incident, which could result in automation receiving data you didn’t anticipate. We recommend reviewing your automation rules to ensure you're seeing the expected results.|
56+
[!INCLUDE [automation-in-defender](../includes/automation-in-defender.md)]
7357

7458
## Related content
7559

articles/sentinel/create-analytics-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ In the **Incident settings** tab, choose whether Microsoft Sentinel turns alerts
179179
>
180180
> - In this scenario, incidents are created by Microsoft Defender XDR, not by Microsoft Sentinel.
181181
> - These incidents appear in the incidents queue in both the Azure and Defender portals.
182-
> - In the Azure portal, new incidents are displayed with "Microsoft Defender XDR" as the **incident provider name**.
182+
> - In the Azure portal, new incidents are displayed with "Microsoft XDR" as the **incident provider name**.
183183
184184
- If you want a single incident to be created from a group of alerts, instead of one for every single alert, see the next step.
185185

articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Use the options in the **Conditions** area to define conditions for your automat
118118

119119
If you selected one of the incident triggers and you want the automation rule to take effect only on incidents created in Microsoft Sentinel, or alternatively, only on those imported from Microsoft Defender XDR, specify the source in the **If Incident provider equals** condition. (This condition is displayed only if an incident trigger is selected.)
120120

121-
- **Analytic rule name**: For all trigger types, if you want the automation rule to take effect only on certain analytics rules, specify which ones by modifying the **If Analytics rule name contains** condition. (This condition isn't displayed if Microsoft Defender XDR is selected as the incident provider.)
121+
- **Analytic rule name**: For all trigger types, if you want the automation rule to take effect only on certain analytics rules, specify which ones by modifying the **If Analytics rule name contains** condition. (This condition isn't displayed if Microsoft XDR is selected as the incident provider.)
122122

123123
Then, continue by selecting one of the following operators:
124124

articles/sentinel/deploy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The plan and prepare phase is typically performed by a SOC architect or related
2525
| Step | Details |
2626
| --------- | ------- |
2727
| **1. Plan and prepare overview and prerequisites** | Review the [Azure tenant prerequisites](prerequisites.md). |
28-
| **2. Plan workspace architecture** | Design your Log Analytics workspace enabled for Microsoft Sentinel. Consider parameters such as:<br><br>- Whether you'll use a single tenant or multiple tenants<br>- Any compliance requirements you have for data collection and storage<br>- How to control access to Microsoft Sentinel data<br><br>Review these articles:<br><br>1. [Design workspace architecture](/azure/azure-monitor/logs/workspace-design?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)<br>3. [Review sample workspace designs](sample-workspace-designs.md)<br>4. [Prepare for multiple workspaces](prepare-multiple-workspaces.md) |
28+
| **2. Plan workspace architecture** | Design your Log Analytics workspace enabled for Microsoft Sentinel. Regardless of whether you'll be onboarding to the Microsoft Defender portal, you'll still need a Log Analytics workspace. <br><br>Consider parameters such as:<br>- Whether you'll use a single tenant or multiple tenants<br>- Any compliance requirements you have for data collection and storage<br>- How to control access to Microsoft Sentinel data<br><br>Review these articles:<br><br>1. [Design workspace architecture](/azure/azure-monitor/logs/workspace-design?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)<br>3. [Review sample workspace designs](sample-workspace-designs.md)<br>4. [Prepare for multiple workspaces](prepare-multiple-workspaces.md) |
2929
| **3. [Prioritize data connectors](prioritize-data-connectors.md)** | Determine which data sources you need and the data size requirements to help you accurately project your deployment's budget and timeline.<br><br>You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Microsoft Sentinel. |
3030
| **4. [Plan roles and permissions](roles.md)** |Use Azure role based access control (RBAC) to create and assign roles within your security operations team to grant appropriate access to Microsoft Sentinel. The different roles give you fine-grained control over what Microsoft Sentinel users can see and do. Azure roles can be assigned in the workspace directly, or in a subscription or resource group that the workspace belongs to, which Microsoft Sentinel inherits. |
3131
| **5. [Plan costs](billing.md)** |Start planning your budget, considering cost implications for each planned scenario.<br><br> Make sure that your budget covers the cost of data ingestion for both Microsoft Sentinel and Azure Log Analytics, any playbooks that will be deployed, and so on. |

0 commit comments

Comments
 (0)