Skip to content

Commit 4502438

Browse files
authored
Merge pull request #1991 from austinmccollum/austinmc-usx-hunting
USX hunting overview
2 parents 20b7e4a + 6d1338b commit 4502438

File tree

2 files changed

+69
-3
lines changed

2 files changed

+69
-3
lines changed

unified-secops-platform/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,12 @@
4545
href: reduce-risk-overview.md
4646
- name: Detect threats
4747
href: detect-threats-overview.md
48-
- name: Hunt for threats ## Separating this out because per PM hunting might happen in different scenarios. Also wanting it higher level as advanced hunting is one of the things highlighted for USX.
48+
- name: Hunt for threats
4949
items:
50+
- name: Overview
51+
href: hunting-overview.md
5052
- name: Advanced hunting
5153
href: /defender-xdr/advanced-hunting-overview?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json
52-
- name: Hunting in Microsoft Sentinel
53-
href: /azure/sentinel/hunting?toc=/unified-secops-platform/toc.json&bc=/unified-secops-platform/breadcrumb/toc.json&tabs=defender-portal
5454
- name: Investigate incidents
5555
items:
5656
- name: Overview
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
---
2+
title: Threat hunting features across Microsoft's unified security operations platform
3+
description: Learn about threat hunting features across Microsoft's unified security operations (SecOps) platform.
4+
search.appverid: met150
5+
ms.service: unified-secops-platform
6+
ms.author: austinmc
7+
author: austinmccollum
8+
ms.localizationpriority: medium
9+
ms.date: 11/23/2024
10+
audience: ITPro
11+
ms.collection:
12+
- M365-security-compliance
13+
- tier1
14+
- usx-security
15+
ms.topic: conceptual
16+
17+
# customer intent: As a security operations center business decision maker, I want to learn about threat hunting tools available in Microsoft's unified SecOps platform so I can get visibility into, and disrupt attacks in real time across identities, endpoints, email, cloud apps, data in hybrid and multicloud environments.
18+
---
19+
20+
# Hunting in Microsoft's unified SecOps platform
21+
22+
Hunting for security threats is a highly customizable activity that is most effective when accomplished across all stages of threat hunting: proactive, reactive, and post incident. Microsoft's unified security operations (SecOps) platform provides effective hunting tools for every stage of threat hunting. These tools are well fit for analysts who are just starting out in their career, or experienced threat hunters using advanced hunting methods. Threat hunters of all levels benefit from hunting tool features that allow them to share their techniques, queries, and findings with their team along the way.
23+
24+
## Hunting tools
25+
26+
The foundation of hunting queries in the Defender portal rests on Kusto Query Language (KQL). KQL is a powerful and flexible language that's optimized for searching through big-data stores in cloud environments. However, crafting complex queries isn't the only way to hunt for threats. Here are some more hunting tools and resources within the Defender portal designed to bring hunting into your reach:
27+
28+
- [**Security Copilot in advanced hunting**](/defender-xdr/advanced-hunting-security-copilot) generates KQL from natural language prompts.
29+
- [**Guided hunting**](/defender-xdr/advanced-hunting-query-builder) uses a query builder for crafting meaningful hunting queries without knowing KQL or the data schema.
30+
- [**Get help as you write queries**](/defender-xdr/advanced-hunting-query-language#get-help-as-you-write-queries) with features like autosuggest, schema tree, and sample queries.
31+
- [**Content hub**](/azure/sentinel/sentinel-solutions-deploy?tabs=azure-portal#hunting-query) provides expert queries to match out-of-the-box solutions in Microsoft Sentinel.
32+
- [**Microsoft Defender Experts for Hunting**](/defender-xdr/advanced-hunting-overview) compliments even the best threat hunters that want assistance.
33+
34+
Maximize the full extent of your team's hunting prowess with the following hunting tools in the Defender portal:
35+
36+
| **Hunting tool** | **Description** |
37+
|---|---|
38+
|[**Advanced hunting**](/defender-xdr/advanced-hunting-microsoft-defender) | View and query data sources available within Microsoft's unified SecOps platform and share queries with your team. Use all your existing Microsoft Sentinel workspace content, including queries and functions. |
39+
|[**Microsoft Sentinel hunting**](/azure/sentinel/hunting) | Hunt for security threats across data sources. Use specialized search and query tools like **hunts**, **bookmarks** and **livestream**. |
40+
|[**Go hunt**](/defender-xdr/advanced-hunting-go-hunt) | Quickly pivot an investigation to entities found within an incident. |
41+
|[**Hunts**](/azure/sentinel/hunts) | An end-to-end, proactive threat hunting process with collaboration features. |
42+
|[**Bookmarks**](/azure/sentinel/bookmarks) | Preserve queries and their results, adding notes and contextual observations.|
43+
|[**Livestream**](/azure/sentinel/livestream) | Start an interactive hunting session and use any Log Analytics query. |
44+
|[**Hunting with summary rules**](/azure/sentinel/summary-rules#quickly-find-a-malicious-ip-address-in-your-network-traffic) | Use summary rules to save costs hunting for threats in verbose logs.|
45+
|[**MITRE ATT&CK map**](/azure/sentinel/mitre-coverage#use-the-mitre-attck-framework-in-analytics-rules-and-incidents) | When creating a new hunting query, select specific tactics and techniques to apply.|
46+
|[**Restore historical data**](/sentinel/restore) | Restore data from archived logs to use in high performing queries. |
47+
|[**Search large data sets**](/sentinel/search-jobs?tabs=defender-portal) | Search for specific events in logs up to seven years ago using KQL. |
48+
|[**Infrastructure chaining**](/defender/threat-intelligence/infrastructure-chaining) | Hunt for new connections between threat actors, group similar attack activity and substantiate assumptions.|
49+
|[**Threat explorer**](/defender-office-365/threat-explorer-threat-hunting) | Hunt for specialized threats related to email. |
50+
51+
## Hunting stages
52+
53+
The following table describes how you can make the most of the Defender portal's hunting tools across all stages of threat hunting:
54+
55+
| **Hunting stage** | **Hunting tools** |
56+
| --- | --- |
57+
| **Proactive** - Find the weak areas in your environment before threat actors do. Detect suspicious activity extra early. | - Regularly conduct end-to-end [hunts](/azure/sentinel/hunts) to proactively seek out undetected threats and malicious behaviors, validate hypotheses, and act on findings by creating new detections, incidents, or threat intelligence.<br><br> - Use the [MITRE ATT&CK map](/azure/sentinel/mitre-coverage#use-the-mitre-attck-framework-in-analytics-rules-and-incidents) to identify detection gaps, and then run predefined hunting queries for highlighted techniques.<br><br> - Insert new threat intelligence into proven queries to tune detections and confirm if a compromise is in process.<br><br> - Take proactive steps to build and test queries against data from new or updated sources.<br><br> - Use [advanced hunting](/defender-xdr/advanced-hunting-microsoft-defender) to find early-stage attacks or threats that don't have alerts. |
58+
| **Reactive** - Use hunting tools during an active investigation. | - Use [livestream](/azure/sentinel/livestream) to run specific queries at consistent intervals to actively monitor events.<br><br> - Quickly pivot on incidents with the [**Go hunt**](/defender-xdr/advanced-hunting-go-hunt) button to search broadly for suspicious entities found during an investigation.<br><br> - Hunt through threat intelligence to perform [infrastructure chaining](/defender/threat-intelligence/infrastructure-chaining).<br><br> - Use [Security Copilot in advanced hunting](/defender-xdr/advanced-hunting-security-copilot) to generate queries at machine speed and scale. |
59+
| **Post incident** - Improve coverage and insights to prevent similar incidents from recurring. | - Turn successful hunting queries into new [analytics and detection rules](/azure/sentinel/threat-detection), or refine existing ones.<br><br> - [Restore historical data](/sentinel/restore) and [search large datasets](/sentinel/search-jobs?tabs=defender-portal) for specialized hunting as part of full incident investigations. |
60+
61+
62+
## Related content
63+
64+
- [Threat detection in Microsoft's unified SecOps platform](/unified-secops-platform/detect-threats-overview)
65+
- [Security posture management and risk reduction](/unified-secops-platform/reduce-risk-overview)
66+
- [Service integration](/unified-secops-platform/overview-defender-portal)

0 commit comments

Comments
 (0)