You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The [hunting dashboard](#use-the-hunting-dashboard) provides ready-made query examples designed to get you started and get you familiar with the tables and the query language. Queries run on data stored in log tables, such as for process creation, DNS events, or other event types.
26
26
@@ -46,7 +46,7 @@ You can also create hunting and livestream queries over data stored in Azure Dat
46
46
47
47
Use community resources, such as the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries) to find more queries and data sources.
48
48
49
-
## Use the hunting dashboard
49
+
## Hunting dashboard
50
50
51
51
The hunting dashboard enables you to run all your queries, or a selected subset, in a single selection. In the Microsoft Sentinel portal, select **Hunting**.
52
52
@@ -126,7 +126,7 @@ In the example above, start with the table name SecurityEvent and add piped elem
126
126
We recommend that your query uses an [Advanced Security Information Model (ASIM) parser](normalization-about-parsers.md) and not a built-in table. This ensures that the query will support any current or future relevant data source rather than a single data source.
127
127
128
128
129
-
## Bookmarks
129
+
## Bookmarks to keep track of data
130
130
131
131
Threat hunting typically requires reviewing mountains of log data looking for evidence of malicious behavior. During this process, investigators find events that they want to remember, revisit, and analyze as part of validating potential hypotheses and understanding the full story of a compromise.
132
132
@@ -142,14 +142,15 @@ During the hunting and investigation process, you might come across query result
142
142
- Investigate a single bookmarked finding by selecting the bookmark and then clicking **Investigate** in the details pane to open the investigation experience. View, investigate, and visually communicate your findings by using an interactive entity-graph diagram and timeline. You can also directly select a listed entity to view that entity’s corresponding entity page.
143
143
144
144
You can also create an incident from one or more bookmarks, or add one or more bookmarks to an existing incident. Select a checkbox to the left of any bookmarks you want to use, and then select **Incident actions** > **Create new incident** or **Add to existing incident**. Triage and investigate the incident like any other.
145
-
-Alternatively, view your bookmarked data directly in the **HuntingBookmark** table in your Log Analytics workspace. For example:
145
+
-View your bookmarked data directly in the **HuntingBookmark** table in your Log Analytics workspace. For example:
146
146
147
-
:::image type="content" source="media/bookmarks/bookmark-table.png" alt-text="Screenshot of the hunting bookmarks table in the Log Analytics workspace." lightbox="media/bookmarks/bookmark-table.png":::
147
+
:::image type="content" source="media/hunting/bookmark-table.png" alt-text="Screenshot of the hunting bookmarks table in the Log Analytics workspace." lightbox="media/bookmarks/bookmark-table.png":::
148
148
149
149
Viewing bookmarks from the table enables you to filter, summarize, and join bookmarked data with other data sources, making it easy to look for corroborating evidence.
150
-
For more information, see [Use bookmarks in hunting](bookmarks.md).
151
150
152
-
## Use notebooks to power investigations
151
+
To start using bookmarks, see [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
152
+
153
+
## Notebooks to power investigations
153
154
154
155
When your hunting and investigations become more complex, use Microsoft Sentinel notebooks to enhance your activity with machine learning, visualizations, and data analysis.
0 commit comments