Skip to content

Commit d52f2fc

Browse files
authored
Merge pull request #222421 from yelevin/yelevin/incident-redesign
Incident redesign
2 parents fdce325 + 0f2257d commit d52f2fc

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

53 files changed

+765
-29
lines changed

articles/sentinel/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,8 @@
147147
href: notebooks.md
148148
- name: Investigate incidents
149149
items:
150+
- name: Incident investigation in Microsoft Sentinel
151+
href: incident-investigation.md
150152
- name: Use tasks to manage incident workflow
151153
href: incident-tasks.md
152154
- name: Investigate large datasets
@@ -390,7 +392,9 @@
390392
items:
391393
- name: Use tasks to handle incident workflow
392394
href: work-with-tasks.md
393-
- name: Investigate incidents
395+
- name: Investigate incidents (Preview)
396+
href: investigate-incidents.md
397+
- name: Investigate incidents (GA)
394398
href: investigate-cases.md
395399
- name: Relate alerts to incidents
396400
href: relate-alerts-to-incidents.md

articles/sentinel/add-entity-to-threat-intelligence.md

Lines changed: 34 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Add entities to threat intelligence in Microsoft Sentinel
33
description: This article shows you, if you discover a malicious entity in an incident investigation, how to add the entity to your threat intelligence indicator lists in Microsoft Sentinel.
44
author: yelevin
5-
ms.topic: how-to
6-
ms.date: 08/25/2022
75
ms.author: yelevin
6+
ms.topic: how-to
7+
ms.date: 01/17/2023
88
---
99

1010
# Add entities to threat intelligence in Microsoft Sentinel
@@ -13,13 +13,37 @@ When investigating an incident, you examine entities and their context as an imp
1313

1414
For example, you may discover an IP address performing port scans across your network, or functioning as a command and control node, sending and/or receiving transmissions from large numbers of nodes in your network.
1515

16-
Microsoft Sentinel allows you to flag these types of entities as malicious, right from within the investigation graph, and add it to your threat indicator lists. You'll then be able to view the added indicators both in Logs and in the Threat Intelligence blade, and use them across your Microsoft Sentinel workspace.
16+
Microsoft Sentinel allows you to flag these types of entities as malicious, right from within your incident investigation, and add it to your threat indicator lists. You'll then be able to view the added indicators both in Logs and in the Threat Intelligence blade, and use them across your Microsoft Sentinel workspace.
1717

1818
> [!IMPORTANT]
1919
> Adding entities as TI indicators is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2020
2121
## Add an entity to your indicators list
2222

23+
The new [incident details page](investigate-incidents.md) gives you another way to add entities to threat intelligence, in addition to the investigation graph. Both ways are shown below.
24+
25+
# [Incident details page](#tab/incidents)
26+
27+
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
28+
29+
1. Select an incident to investigate. In the incident details panel, select **View full details** to open the incident details page.
30+
31+
:::image type="content" source="media/add-entity-to-threat-intelligence/incident-details-overview.png" alt-text="Screenshot of incident details page." lightbox="media/add-entity-to-threat-intelligence/incident-details-overview.png":::
32+
33+
1. Find the entity from the **Entities** widget that you want to add as a threat indicator. (You can filter the list or enter a search string to help you locate it.)
34+
35+
1. Select the three dots to the right of the entity, and select **Add to TI (Preview)** from the pop-up menu.
36+
37+
Only the following types of entities can be added as threat indicators:
38+
- Domain name
39+
- IP address (IPv4 and IPv6)
40+
- URL
41+
- File (hash)
42+
43+
:::image type="content" source="media/add-entity-to-threat-intelligence/entity-actions-from-overview.png" alt-text="Screenshot of adding an entity to threat intelligence.":::
44+
45+
# [Investigation graph](#tab/cases)
46+
2347
The [investigation graph](investigate-cases.md) is a visual, intuitive tool that presents connections and patterns and enables your analysts to ask the right questions and follow leads. You can use it to add entities to your threat intelligence indicator lists, making them available across your workspace.
2448

2549
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
@@ -38,6 +62,10 @@ The [investigation graph](investigate-cases.md) is a visual, intuitive tool that
3862

3963
:::image type="content" source="media/add-entity-to-threat-intelligence/add-entity-to-ti.png" alt-text="Screenshot of adding entity to threat intelligence.":::
4064

65+
---
66+
67+
Whichever of the two interfaces you choose, you will end up here:
68+
4169
1. The **New indicator** side panel will open. The following fields will be populated automatically:
4270

4371
- **Type**
@@ -55,12 +83,12 @@ The [investigation graph](investigate-cases.md) is a visual, intuitive tool that
5583
- Optional; automatically populated by the **incident ID**. You can add others.
5684

5785
- **Name**
58-
- Name of the indicator - this is what will be displayed in your list of indicators.
86+
- Name of the indicator—this is what will be displayed in your list of indicators.
5987
- Optional; automatically populated by the **incident name.**
6088

6189
- **Created by**
6290
- Creator of the indicator.
63-
- Optional; automatically-populated by the user logged into Microsoft Sentinel.
91+
- Optional; automatically populated by the user logged into Microsoft Sentinel.
6492

6593
Fill in the remaining fields accordingly.
6694

@@ -102,6 +130,6 @@ The [investigation graph](investigate-cases.md) is a visual, intuitive tool that
102130

103131
In this article, you learned how to add entities to your threat indicator lists. For more information, see:
104132

105-
- [Investigate incidents with Microsoft Sentinel](investigate-cases.md)
133+
- [Investigate incidents with Microsoft Sentinel](investigate-incidents.md)
106134
- [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md)
107135
- [Work with threat indicators in Microsoft Sentinel](work-with-threat-indicators.md)

articles/sentinel/entity-pages.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use entity pages to get information about entities that you come ac
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
7-
ms.date: 07/26/2022
7+
ms.date: 01/17/2023
88
---
99

1010
# Investigate entities with entity pages in Microsoft Sentinel
@@ -23,6 +23,8 @@ More specifically, entity pages consist of three parts:
2323

2424
- The right-side panel presents [behavioral insights](#entity-insights) on the entity. These insights are continuously developed by Microsoft security research teams. They are based on various data sources and provide context for the entity and its observed activities, helping you to quickly identify [anomalous behavior](soc-ml-anomalies.md) and security threats.
2525

26+
If you're investigating an incident using the **[new investigation experience](investigate-incidents.md) (now in Preview)**, you'll be able to see a panelized version of the entity page right inside the incident details page. You have a [list of all the entities in a given incident](investigate-incidents.md#explore-the-incidents-entities), and selecting an entity opens a side panel with three "cards"—**Info**, **Timeline**, and **Insights**— showing all the same information described above, within the specific time frame corresponding with that of the alerts in the incident.
27+
2628
## The timeline
2729

2830
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-timeline.png" alt-text="Screenshot of an example of a timeline on an entity page.":::
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Understand Microsoft Sentinel's incident investigation and case management capabilities
3+
description: This article describes Microsoft Sentinel's incident investigation and case management capabilities and features, taking you through the phases of a typical incident investigation while presenting all the displays and tools available to you to help you along.
4+
author: yelevin
5+
ms.author: yelevin
6+
ms.topic: conceptual
7+
ms.date: 01/01/2023
8+
---
9+
10+
# Understand Microsoft Sentinel's incident investigation and case management capabilities
11+
12+
Microsoft Sentinel gives you a complete, full-featured case management platform for investigating and managing security incidents. **Incidents** are Microsoft Sentinel’s name for case files that contain a complete and constantly updated chronology of a security threat, whether it’s individual pieces of evidence (alerts), suspects and parties of interest (entities), insights collected and curated by security experts and AI/machine learning models, or comments and logs of all the actions taken in the course of the investigation.
13+
14+
The incident investigation experience in Microsoft Sentinel begins with the **Incidents** page – a new experience designed to give you everything you need for your investigation in one place. The key goal of this new experience is to increase your SOC’s efficiency and effectiveness, reducing its mean time to resolve (MTTR).
15+
16+
> [!IMPORTANT]
17+
>
18+
> The new incident experience is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19+
>
20+
> Some of the individual functionalities mentioned below are also in **PREVIEW**. They will be so indicated.
21+
22+
This article takes you through the phases of a typical incident investigation, presenting all the displays and tools available to you to help you along.
23+
24+
## Increase your SOC's maturity
25+
26+
Microsoft Sentinel gives you the tools to help your Security Operations (SecOps) maturity level up.
27+
28+
### Standardize processes
29+
30+
**Incident tasks** are workflow lists of tasks for analysts to follow to ensure a uniform standard of care and to prevent crucial steps from being missed. SOC managers and engineers can develop these task lists and have them automatically apply to different groups of incidents as appropriate, or across the board. SOC analysts can then access the assigned tasks within each incident, marking them off as they’re completed. Analysts can also manually add tasks to their open incidents, either as self-reminders or for the benefit of other analysts who may collaborate on the incident (for example, due to a shift change or escalation).
31+
32+
Learn more about [incident tasks](incident-tasks.md).
33+
34+
### Audit incident management
35+
36+
The incident **activity log** tracks actions taken on an incident, whether initiated by humans or automated processes, and displays them along with all the comments on the incident. You can add your own comments here as well. It gives you a complete record of everything that happened, ensuring thoroughness and accountability.
37+
38+
## Investigate effectively and efficiently
39+
40+
### See timeline
41+
42+
First things first: As an analyst, the most basic question you want to answer is, why is this incident being brought to my attention? Entering an incident’s details page will answer that question: right in the center of the screen, you’ll see the **Incident timeline** widget. The timeline is the diary of all the **alerts** that represent all the logged events that are relevant to the investigation, in the order in which they happened. The timeline also shows **bookmarks**, snapshots of evidence collected while hunting and added to the incident. See the full details of any item on this list by selecting it. Many of these details—such as the original alert, the analytics rule that created it, and any bookmarks—appear as links that you can select to dive still deeper and learn more.
43+
44+
Learn more about what you can do from the [incident timeline](investigate-incidents.md#incident-timeline).
45+
46+
### Learn from similar incidents
47+
48+
If anything you’ve seen so far in your incident looks familiar, there may be good reason. Microsoft Sentinel stays one step ahead of you by showing you the incidents most similar to the open one. The **Similar incidents** widget shows you the most relevant information about incidents deemed to be similar, including their last updated date and time, last owner, last status (including, if they are closed, the reason they were closed), and the reason for the similarity.
49+
50+
This can benefit your investigation in several ways:
51+
52+
- Spot concurrent incidents that may be part of a larger attack strategy.
53+
- Use similar incidents as reference points for your current investigation—see how they were dealt with.
54+
- Identify owners of past similar incidents to benefit from their knowledge.
55+
56+
The widget shows you the 20 most similar incidents. Microsoft Sentinel decides which incidents are similar based on common elements including entities, the source analytics rule, and alert details. From this widget you can jump directly to any of these incidents' full details pages, while keeping the connection to the current incident intact.
57+
58+
Learn more about what you can do with [similar incidents](investigate-incidents.md#similar-incidents-preview).
59+
60+
### Examine top insights
61+
62+
Next, having the broad outlines of what happened (or is still happening), and having a better understanding of the context, you’ll be curious about what interesting information Microsoft Sentinel has already found out for you. It automatically asks the big questions about the entities in your incident and shows the top answers in the **Top insights** widget, visible on the right side of the incident details page. This widget shows a collection of insights based on both machine-learning analysis and the curation of top teams of security experts.
63+
64+
These are a specially selected subset of the insights that appear on [entity pages](entity-pages.md#entity-insights), but in this context, insights for all the entities in the incident are presented together, giving you a more complete picture of what's happening. The full set of insights appears on the **Entities tab**, for each entity separately—see below.
65+
66+
The **Top insights** widget answers questions about the entity relating to its behavior in comparison to its peers and its own history, its presence on watchlists or in threat intelligence, or any other sort of unusual occurrence relating to it.
67+
68+
Most of these insights contain links to more information. These links open the Logs panel in-context, where you'll see the source query for that insight along with its results.
69+
70+
### View entities
71+
72+
Now that you have some context and some basic questions answered, you’ll want to get some more depth on the major players are in this story. Usernames, hostnames, IP addresses, file names, and other types of entities can all be “persons of interest” in your investigation. Microsoft Sentinel finds them all for you and displays them front and center in the **Entities** widget, alongside the timeline. Selecting an entity from this widget will pivot you to that entity's listing in the **Entities tab** on the same **incident page**.
73+
74+
The **Entities tab** contains a list of all the entities in the incident. When an entity in the list is selected, a side panel opens containing a display based on the [entity page](entity-pages.md). The side panel contains three cards:
75+
- **Info** contains basic information about the entity. For a user account entity this might be things like the username, domain name, security identifier (SID), organizational information, security information, and more.
76+
- **Timeline** contains a list of the alerts that feature this entity and activities the entity has done, as collected from logs in which the entity appears.
77+
- **Insights** contains answers to questions about the entity relating to its behavior in comparison to its peers and its own history, its presence on watchlists or in threat intelligence, or any other sort of unusual occurrence relating to it. These answers are the results of queries defined by Microsoft security researchers that provide valuable and contextual security information on entities, based on data from a collection of sources.
78+
79+
Depending on the entity type, you can take a number of further actions from this side panel:
80+
- Pivot to the entity's full [entity page](entity-pages.md) to get even more details over a longer timespan or launch the graphical investigation tool centered on that entity.
81+
- Run a [playbook](respond-threats-during-investigation.md) to take specific response or remediation actions on the entity (in Preview).
82+
- Classify the entity as an [indicator of compromise (IOC)](add-entity-to-threat-intelligence.md) and add it to your Threat intelligence list (in Preview).
83+
84+
Each of these actions is currently supported for certain entity types and not for others. The following table shows which actions are supported for which entity types:
85+
86+
| Available actions &#9654;<br>Entity types &#9660; | View full details<br>(in entity page) | Add to TI *<br>(Preview) | Run playbook *<br>(Preview) |
87+
| ----- | :----: | :----: | :----: |
88+
| **User account** | &#10004; | | &#10004; |
89+
| **Host** | &#10004; | | &#10004; |
90+
| **IP address** | &#10004; | &#10004; | &#10004; |
91+
| **URL** | | &#10004; | &#10004; |
92+
| **Domain name** | | &#10004; | &#10004; |
93+
| **File (hash)** | | &#10004; | &#10004; |
94+
| **Azure resource** | &#10004; | | |
95+
| **IoT device** | &#10004; | | |
96+
97+
\* For entities for which either or both of these two actions are available, you can take those actions right from the **Entities** widget in the **Overview tab**, never leaving the incident page.
98+
99+
### Explore logs
100+
101+
Now you’ll want to get down into the details to know *what exactly happened?* From almost any of the places mentioned above, you can drill down into the individual alerts, entities, insights, and other items contained in the incident, viewing the original query and its results. These results are displayed in the Logs (log analytics) screen that appears here as a panel extension of the incident details page, so you don’t leave the context of the investigation.
102+
103+
### Keep your records in order
104+
105+
Finally, in the interests of transparency, accountability, and continuity, you’ll want a record of all the actions that have been taken on the incident – whether by automated processes or by people. The incident **activity log** shows you all of these activities. You can also see any comments that have been made and add your own. The activity log is constantly auto-refreshing, even while open, so you can see changes to it in real time.
106+
107+
108+
## Next steps
109+
110+
In this document, you learned how the incident investigation experience in Microsoft Sentinel helps you [carry out an investigation in a single context](investigate-incidents.md). For more information about managing and investigating incidents, see the following articles:
111+
112+
- [Use tasks to manage incidents in Microsoft Sentinel](incident-tasks.md)
113+
- [Investigate entities with entity pages in Microsoft Sentinel](entity-pages.md).
114+
- [Automate incident handling in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md).
115+
- [Identify advanced threats with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](identify-threats-with-entity-behavior-analytics.md)
116+
- [Hunt for security threats](./hunting.md).

0 commit comments

Comments
 (0)