Skip to content

Commit d45a01b

Browse files
authored
Merge pull request #267820 from MicrosoftDocs/release-usx-pub-preview
{Publishing] Release branch USX pub preview - MERGE Apr 3, 8am PDT or earlier (for 10am publish)
2 parents 80c8a58 + 6d9b99a commit d45a01b

File tree

174 files changed

+2471
-1593
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+2471
-1593
lines changed

articles/azure-vmware/azure-security-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ After connecting data sources to Microsoft Sentinel, you can create rules to gen
159159
160160
6. On the **Incident settings** tab, enable **Create incidents from alerts triggered by this analytics rule** and select **Next: Automated response**.
161161
162-
:::image type="content" source="../sentinel/media/tutorial-detect-threats-custom/general-tab.png" alt-text="Screenshot showing the Analytic rule wizard for creating a new rule in Microsoft Sentinel.":::
162+
:::image type="content" source="../sentinel/media/detect-threats-custom/general-tab.png" alt-text="Screenshot showing the Analytic rule wizard for creating a new rule in Microsoft Sentinel.":::
163163
164164
7. Select **Next: Review**.
165165

articles/sentinel/TOC.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@
99
href: whats-new.md
1010
- name: Best practices
1111
href: best-practices.md
12+
- name: Experience in Defender portal
13+
href: microsoft-sentinel-defender-portal.md
1214
- name: Plan
1315
items:
1416
- name: Deployment planning guide
@@ -252,6 +254,8 @@
252254
href: best-practices-data.md
253255
- name: Tutorial - Forward syslog data to workspace
254256
href: forward-syslog-monitor-agent.md
257+
- name: Connect data sources
258+
href: configure-data-connector.md
255259
- name: Classifying data with entities
256260
href: entities.md
257261
- name: Ingestion-time data transformation
@@ -979,7 +983,9 @@
979983
- name: Handle ingestion delay in analytics rules
980984
href: ingestion-delay.md
981985
- name: Get fine-tuning recommendations
982-
href: detection-tuning.md
986+
href: detection-tuning.md
987+
- name: Troubleshoot analytics rules
988+
href: troubleshoot-analytics-rules.md
983989
- name: Deploy and monitor decoy honeytokens
984990
href: monitor-key-vault-honeytokens.md
985991
- name: Handle false positives

articles/sentinel/add-advanced-conditions-to-automation-rules.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,15 @@
11
---
22
title: Add advanced conditions to Microsoft Sentinel automation rules
33
description: This article explains how to add complex, advanced "Or" conditions to automation rules in Microsoft Sentinel, for more effective triage of incidents.
4-
author: yelevin
5-
ms.author: yelevin
64
ms.topic: how-to
7-
ms.date: 05/09/2023
5+
author: batamig
6+
ms.author: bagol
7+
ms.date: 03/14/2024
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
11+
ms.collection: usx-security
12+
813
---
914

1015
# Add advanced conditions to Microsoft Sentinel automation rules
@@ -31,12 +36,16 @@ Condition groups can contain two levels of conditions:
3136

3237
You can see that this capability affords you great power and flexibility in determining when rules will run. It can also greatly increase your efficiency by enabling you to combine many old automation rules into one new rule.
3338

39+
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
40+
3441
## Add a condition group
3542

3643
Since condition groups offer a lot more power and flexibility in creating automation rules, the best way to explain how to do this is by presenting some examples.
3744

3845
Let's create a rule that will change the severity of an incoming incident from whatever it is to High, assuming it meets the conditions we'll set.
3946

47+
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), select the **Configuration** > **Automation** page. For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Configuration** > **Automation**.
48+
4049
1. From the **Automation** page, select **Create > Automation rule** from the button bar at the top.
4150

4251
See the [general instructions for creating an automation rule](create-manage-use-automation-rules.md) for details.
@@ -45,14 +54,23 @@ Let's create a rule that will change the severity of an incoming incident from w
4554

4655
1. Select the trigger **When incident is created**.
4756

48-
1. Under **Conditions**, leave the **Incident provider** and **Analytics rule name** conditions as they are. We'll add more conditions below.
57+
1. Under **Conditions**, if you see the **Incident provider** and **Analytics rule name** conditions, leave them as they are. These conditions aren't available if your workspace is onboarded to the unified security operations platform. In either case, we'll add more conditions later in this process.
4958

5059
1. Under **Actions**, select **Change severity** from the drop-down list.
5160

5261
1. Select **High** from the drop-down list that appears below **Change severity**.
5362

63+
For example, the following tabs show samples from a workspace that's onboarded to the unified security operations platform, in either the Azure or Defender portals, and a workspace that isn't:
64+
65+
### [Onboarded workspaces](#tab/after-onboarding)
66+
67+
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/create-automation-rule-no-conditions-onboarded.png" alt-text="Screenshot of creating new automation rule without adding conditions.":::
68+
69+
### [Workspaces that aren't onboarded](#tab/before-onboarding)
70+
5471
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/create-automation-rule-no-conditions.png" alt-text="Screenshot of creating new automation rule without adding conditions.":::
5572

73+
---
5674
## Example 1: simple conditions
5775

5876
In this first example, we'll create a simple condition group: If either condition A **or** condition B is true, the rule will run and the incident's severity will be set to *High*.

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,26 @@
11
---
2-
title: Add entities to threat intelligence in Microsoft Sentinel
3-
description: This article shows you, if you discover a malicious entity in an incident investigation, how to add the entity to your threat intelligence indicator lists in Microsoft Sentinel.
2+
title: Add entities to threat intelligence
3+
titleSuffix: Microsoft Sentinel
4+
description: Learn how to add a malicious entity discovered in an incident investigation to your threat intelligence in Microsoft Sentinel.
45
author: yelevin
56
ms.author: yelevin
67
ms.topic: how-to
7-
ms.date: 01/17/2023
8+
ms.date: 3/14/2024
9+
appliesto:
10+
- Microsoft Sentinel in the Azure portal
11+
ms.collection: usx-security
12+
#Customer intent: As a security analyst, I want to quickly add relevant threat intelligence from my investigation for myself and others so I don't lose important information.
813
---
914

1015
# Add entities to threat intelligence in Microsoft Sentinel
1116

12-
When investigating an incident, you examine entities and their context as an important part of understanding the scope and nature of the incident. In the course of the investigation, you may discover a domain name, URL, file, or IP address in the incident that should be labeled and tracked as an indicator of compromise (IOC), a threat indicator.
17+
During an investigation, you examine entities and their context as an important part of understanding the scope and nature of an incident. When you discover an entity as a malicious domain name, URL, file, or IP address in the incident, it should be labeled and tracked as an indicator of compromise (IOC) in your threat intelligence.
1318

14-
For example, you may discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
19+
For example, you discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
1520

16-
Microsoft Sentinel allows you to flag these types of entities as malicious, right from within your incident investigation, and add it to your threat indicator lists. You'll then be able to view the added indicators both in Logs and in the Threat Intelligence blade, and use them across your Microsoft Sentinel workspace.
21+
Microsoft Sentinel allows you to flag these types of entities right from within your incident investigation, and add it to your threat intelligence. You are able to view the added indicators both in **Logs** and **Threat Intelligence**, and use them across your Microsoft Sentinel workspace.
1722

18-
## Add an entity to your indicators list
23+
## Add an entity to your threat intelligence
1924

2025
The new [incident details page](investigate-incidents.md) gives you another way to add entities to threat intelligence, in addition to the investigation graph. Both ways are shown below.
2126

@@ -123,7 +128,7 @@ Whichever of the two interfaces you choose, you will end up here:
123128

124129
1. The entity will be added as a threat indicator in your workspace. You can find it [in the list of indicators in the **Threat intelligence** page](work-with-threat-indicators.md#find-and-view-your-indicators-in-the-threat-intelligence-page), and also [in the *ThreatIntelligenceIndicators* table in **Logs**](work-with-threat-indicators.md#find-and-view-your-indicators-in-logs).
125130

126-
## Next steps
131+
## Related content
127132

128133
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
129134

0 commit comments

Comments
 (0)