You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/top-workbooks.md
+38-33Lines changed: 38 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,41 +3,46 @@ title: Commonly used Microsoft Sentinel workbooks
3
3
description: Learn about the most commonly used workbooks to use popular, out-of-the-box Microsoft Sentinel resources.
4
4
author: yelevin
5
5
ms.topic: reference
6
-
ms.date: 01/09/2023
6
+
ms.date: 06/14/2024
7
7
ms.author: yelevin
8
+
appliesto:
9
+
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
10
+
ms.collection: usx-security
8
11
---
9
12
10
13
# Commonly used Microsoft Sentinel workbooks
11
14
12
-
The following table lists the most commonly used, built-in Microsoft Sentinel workbooks.
13
-
14
-
Access workbooks in Microsoft Sentinel under **Threat Management** > **Workbooks** on the left, and then search for the workbook you want to use. For more information, see [Visualize and monitor your data](monitor-your-data.md).
15
-
16
-
> [!TIP]
17
-
> We recommend deploying any workbooks associated with the data you're ingesting. Workbooks allow for broader monitoring and investigating based on your collected data.
18
-
>
19
-
> For more information, see [Connect data sources](connect-data-sources.md) and [Centrally discover and deploy Microsoft Sentinel out-of-the-box content and solutions](sentinel-solutions-deploy.md).
20
-
>
21
-
22
-
|Workbook name |Description |
23
-
|---------|---------|
24
-
|**Analytics Efficiency**| Provides insights into the efficacy of your analytics rules to help you achieve better SOC performance. <br><br>For more information, see [The Toolkit for Data-Driven SOCs](https://techcommunity.microsoft.com/t5/azure-sentinel/the-toolkit-for-data-driven-socs/ba-p/2143152).|
25
-
|**Azure Activity**| Provides extensive insight into your organization's Azure activity by analyzing and correlating all user operations and events. <br><br>For more information, see [Auditing with Azure Activity logs](audit-sentinel-data.md#auditing-with-azure-activity-logs). |
26
-
|**Microsoft Entra audit logs**| Uses Microsoft Entra audit logs to provide insights into Microsoft Entra scenarios. <br><br>For more information, see [Quickstart: Get started with Microsoft Sentinel](get-visibility.md). |
27
-
|**Microsoft Entra audit, Activity and Sign-in logs**| Provides insights into Microsoft Entra audit, Activity, and Sign-in data with one workbook. Shows activity such as sign-ins by location, device, failure reason, user action, and more. <br><br> This workbook can be used by both Security and Azure administrators. |
28
-
|**Microsoft Entra sign-in logs**| Uses the Microsoft Entra sign-in logs to provide insights into Microsoft Entra scenarios. |
29
-
|**Microsoft cloud security benchmark**| Provides a single pane of glass for gathering and managing data to address Microsoft cloud security benchmark control requirements, aggregating data from 25+ Microsoft security products. <br><br>For more information, see our [TechCommunity blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/what-s-new-azure-security-benchmark-workbook-preview/ba-p/2865930). |
30
-
|**Cybersecurity Maturity Model Certification (CMMC)**| Provides a mechanism for viewing log queries aligned to CMMC controls across the Microsoft portfolio, including Microsoft security offerings, Office 365, Teams, Intune, Azure Virtual Desktop, and so on. <br><br>For more information, see our [TechCommunity blog](https://techcommunity.microsoft.com/t5/azure-sentinel/what-s-new-cybersecurity-maturity-model-certification-cmmc/ba-p/2111184).|
31
-
|**Data collection health monitoring** / **Usage monitoring**| Provides insights into your workspace's data ingestion status, such as ingestion size, latency, and number of logs per source. View monitors and detect anomalies to help you determine your workspaces data collection health. <br><br>For more information, see [Monitor the health of your data connectors with this Microsoft Sentinel workbook](monitor-data-connector-health.md). |
32
-
|**Event Analyzer**| Enables you to explore, audit, and speed up Windows Event Log analysis, including all event details and attributes, such as security, application, system, setup, directory service, DNS, and so on. |
33
-
|**Exchange Online**|Provides insights into Microsoft Exchange online by tracing and analyzing all Exchange operations and user activities. |
34
-
|**Identity & Access**| Provides insight into identity and access operations in Microsoft product usage, via security logs that include audit and sign-in logs. |
35
-
|**Incident Overview**| Designed to help with triage and investigation by providing in-depth information about an incident, including general information, entity data, triage time, mitigation time, and comments. <br><br>For more information, see [The Toolkit for Data-Driven SOCs](https://techcommunity.microsoft.com/t5/azure-sentinel/the-toolkit-for-data-driven-socs/ba-p/2143152). |
36
-
|<aname="investigation-insights"></a>**Investigation Insights**| Provides analysts with insight into incident, bookmark, and entity data. Common queries and detailed visualizations can help analysts investigate suspicious activities. |
37
-
|**Microsoft Defender for Cloud Apps - discovery logs**| Provides details about the cloud apps that are used in your organization, and insights from usage trends and drill-down data for specific users and applications. <br><br>For more information, see [Connect data from Microsoft Defender for Cloud Apps](./data-connectors/microsoft-defender-for-cloud-apps.md).|
38
-
|**MITRE ATT&CK Workbook**| Provides details about MITRE ATT&CK coverage for Microsoft Sentinel. |
39
-
|**Office 365**| Provides insights into Office 365 by tracing and analyzing all operations and activities. Drill down into SharePoint, OneDrive, Teams, and Exchange data. |
40
-
|**Security Alerts**| Provides a Security Alerts dashboard for alerts in your Microsoft Sentinel environment. <br><br>For more information, see [Automatically create incidents from Microsoft security alerts](create-incidents-from-alerts.md). |
41
-
|**Security Operations Efficiency**| Intended for security operations center (SOC) managers to view overall efficiency metrics and measures regarding the performance of their team. <br><br>For more information, see [Manage your SOC better with incident metrics](manage-soc-with-incident-metrics.md). |
42
-
|**Threat Intelligence**| Provides insights into threat indicators, including type and severity of threats, threat activity over time, and correlation with other data sources, including Office 365 and firewalls. <br><br>For more information, see [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md) and our [TechCommunity blog](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-azure-sentinel-threat-intelligence-workbook/ba-p/2858265). |
43
-
|**Zero Trust (TIC3.0)**| Provides an automated visualization of Zero Trust principles, cross-walked to the [Trusted Internet Connections framework](https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic). <br><br>For more information, see the [Zero Trust (TIC 3.0) workbook announcement blog](https://techcommunity.microsoft.com/t5/public-sector-blog/announcing-the-azure-sentinel-zero-trust-tic3-0-workbook/ba-p/2313761). |
15
+
This article lists the most commonly used Microsoft Sentinel workbooks. Install the solution or standalone item that contains the workbook from the **Content hub** in Microsoft Sentinel. Get the workbook from the **Content hub** by selecting **Manage** on the solution or standalone item. Or, in Microsoft Sentinel under **Threat Management**, go to **Workbooks** and search for the workbook you want to use. For more information, see [Visualize and monitor your data](monitor-your-data.md).
16
+
17
+
We recommend you deploy any workbooks associated with the data you ingest into Microsoft Sentinel. Workbooks allow for broader monitoring and investigating based on your collected data. For more information, see [Microsoft Sentinel data connectors](connect-data-sources.md) and [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
18
+
19
+
## Commonly used workbooks
20
+
21
+
The following table includes workbooks we recommend and the solution or standalone item from the **Content hub** that contains the workbook.
22
+
23
+
|Workbook name |Description |Content hub title|
24
+
|---------|---------|---------|
25
+
|**Analytics Health & Audit**| Provides visibility on the health and audit of your analytics rules. Find out whether an analytics rule is running as expected and get a list of changes made to an analytic rule. <br><br>For more information, see [Monitor the health and audit the integrity of your analytics rules](monitor-analytics-rule-integrity.md).|Analytics Health & Audit|
26
+
|**Azure Activity**| Provides extensive insight into your organization's Azure activity by analyzing and correlating all user operations and events. <br><br>For more information, see [Auditing with Azure Activity logs](audit-sentinel-data.md#auditing-with-azure-activity-logs). |Azure Activity|
27
+
|**Azure Security Benchmark**| Provides visibility for the security posture of cloud workloads. View log queries, Azure resource graph, and policies aligned to Azure Security Benchmark controls across Microsoft security offerings, Azure, Microsoft 365, 3rd party, on-premises, and multicloud workloads. <br><br>For more information, see our [TechCommunity blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/what-s-new-azure-security-benchmark-workbook-preview/ba-p/2865930). |Azure Security Benchmark|
28
+
|**Cybersecurity Maturity Model Certification (CMMC)**| Provides a way to view log queries aligned to CMMC controls across the Microsoft portfolio, including Microsoft security offerings, Microsoft 365, Microsoft Teams, Intune, Azure Virtual Desktop, and more. <br><br>For more information, see our [TechCommunity blog](https://techcommunity.microsoft.com/t5/azure-sentinel/what-s-new-cybersecurity-maturity-model-certification-cmmc/ba-p/2111184).|Cybersecurity Maturity Model Certification (CMMC) 2.0|
29
+
|**Data collection health monitoring**| Provides insights into your workspace's data ingestion status, such as ingestion size, latency, and number of logs per source. Monitors and detect anomalies to help you determine your workspaces data collection health. <br><br>For more information, see [Monitor the health of your data connectors with this Microsoft Sentinel workbook](monitor-data-connector-health.md). |Data collection health monitoring|
30
+
|**Event Analyzer**| Explore, audit, and speed up Windows Event Log analysis. Includes all event details and attributes, such as security, application, system, setup, directory service, DNS, and more. |Windows Security Events|
31
+
|**Identity & Access**| Provides insight into identity and access operations by collecting and analyzing security logs, using the audit and sign-in logs to gather insights into use of Microsoft products. |Windows Security Events|
32
+
|**Incident Overview**| Designed to help with triage and investigation by providing in-depth information about an incident, including general information, entity data, triage time, mitigation time, and comments. <br><br>For more information, see [The Toolkit for Data-Driven SOCs](https://techcommunity.microsoft.com/t5/azure-sentinel/the-toolkit-for-data-driven-socs/ba-p/2143152). |SOC Handbook|
33
+
|<aname="investigation-insights"></a>**Investigation Insights**| Provides analysts with insight into incident, bookmark, and entity data. Common queries and detailed visualizations can help analysts investigate suspicious activities. |SOC Handbook|
34
+
|**Microsoft Defender for Cloud Apps - discovery logs**| Provides details about the cloud apps that are used in your organization, and insights from usage trends and drill-down data for specific users and applications. <br><br>For more information, see [Microsoft Defender for Cloud Apps connector for Microsoft Sentinel](./data-connectors/microsoft-defender-for-cloud-apps.md).|Microsoft Defender for Cloud Apps|
35
+
|**Microsoft Entra Audit Logs**| Uses the audit logs to gather insights around Microsoft Entra ID scenarios. Learn about user operations, including password and group management, device activities, and top active users and apps.<br><br>For more information, see [Quickstart: Get started with Microsoft Sentinel](get-visibility.md). |Microsoft Entra ID|
36
+
|**Microsoft Entra Sign-in logs**| Provides insights to sign-in operations, such as user sign-ins and locations, email addresses, and IP addresses of your users, failed activities, and the errors that triggered the failures. |Microsoft Entra ID|
37
+
|**MITRE ATT&CK Workbook**| Provides details about MITRE ATT&CK coverage for Microsoft Sentinel. |SOC Handbook|
38
+
|**Office 365**| Provides insights into Office 365 by tracing and analyzing all operations and activities. Drill down into SharePoint, OneDrive, Teams, and Exchange data. |Microsoft 365|
39
+
|**Security Alerts**| Provides a Security Alerts dashboard for alerts in your Microsoft Sentinel environment. <br><br>For more information, see [Automatically create incidents from Microsoft security alerts](create-incidents-from-alerts.md). |SOC Handbook|
40
+
|**Security Operations Efficiency**| Intended for security operations center (SOC) managers to view overall efficiency metrics and measures regarding the performance of their team. <br><br>For more information, see [Manage your SOC better with incident metrics](manage-soc-with-incident-metrics.md). |SOC Handbook|
41
+
|**Threat Intelligence**| Provides insights into threat indicators ingestion. Search for indicators at scale across Microsoft 1st party, 3rd party, on-premises, hybrid, and multicloud workloads. <br><br>For more information, see [Understand threat intelligence in Microsoft Sentinel](understand-threat-intelligence.md) and our [TechCommunity blog](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-azure-sentinel-threat-intelligence-workbook/ba-p/2858265). |Threat Intelligence|
42
+
|**Workspace Usage Report**|Provides insights into your workspace's usage. View your workspace’s data consumption, latency, recommended tasks, and cost and usage statistics.|Workspace Usage Report|
43
+
|**Zero Trust (TIC3.0)**| Provides an automated visualization of Zero Trust principles, cross-walked to the [Trusted Internet Connections framework](https://www.cisa.gov/resources-tools/programs/trusted-internet-connections-tic). <br><br>For more information, see the [Zero Trust (TIC 3.0) workbook announcement blog](https://techcommunity.microsoft.com/t5/public-sector-blog/announcing-the-azure-sentinel-zero-trust-tic3-0-workbook/ba-p/2313761). |Zero Trust (TIC 3.0)|
44
+
45
+
## Related content
46
+
47
+
-[Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md)
48
+
-[Visualize and monitor your data](monitor-your-data.md)
0 commit comments