You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/incident-management-sentinel/includes/6-exercise-investigate-incident.md
+85-9Lines changed: 85 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,12 @@
1
+
Security operations analysts use Microsoft Sentinel to monitor and respond to security incidents in their organization. In these exercises we investigate security incidents using Microsoft Sentinel in Microsoft Azure, and in the Microsoft Defender portal Unified Security Operations Platform.
1
2
2
-
As a Contoso security engineer, you need to analyze the deletions of virtual machines (VMs) from the Contoso Azure subscription, and be alerted when a similar activity occurs in the future. You decide to implement an analytics rule to create an incident when someone deletes an existing VM. You can then investigate the incident to determine the details, and close the incident when you're finished.
3
+
## [Azure portal](#tab/azure-portal)
4
+
5
+
As a Contoso security operations analyst, you need to analyze the deletions of virtual machines (VMs) from the Contoso Azure subscription, and be alerted when a similar activity occurs in the future. You decide to implement an analytics rule to create an incident when someone deletes an existing VM. You can then investigate the incident to determine the details, and close the incident when you're finished.
3
6
4
7
In this exercise, you create a Microsoft Sentinel analytics rule to detect when a VM is deleted. You then delete the VM you created at the beginning of this module, and investigate and resolve the incident the rule created.
5
8
6
-
To complete this exercise, make sure you finished the setup exercise at the beginning of the module and the Azure Activity connector now shows a status of **Connected**.
9
+
To complete this exercise, make sure you finished the setup exercise at the beginning of the module, and the Azure Activity connector now shows a status of **Connected**.
7
10
8
11
## Create an analytics rule from the wizard
9
12
@@ -13,7 +16,7 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
13
16
1. On your Microsoft Sentinel page, select **Analytics** under **Configuration** in the left menu.
14
17
1. On the **Analytics** page, select **Create** > **Scheduled query rule**.
15
18
16
-
**General tab**
19
+
## General tab
17
20
18
21
1. On the **General** tab of the wizard, provide the following information.
19
22
@@ -27,7 +30,7 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
27
30
28
31
1. Select **Next: Set rule logic**.
29
32
30
-
**Set rule logic tab**
33
+
## Set rule logic tab
31
34
32
35
1. On the **Set rule logic** tab, in the **Rule query** section, enter the following query:
33
36
@@ -50,14 +53,14 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
50
53
51
54
1. Select **Next: Incident settings**.
52
55
53
-
**Incident settings tab**
56
+
## Incident settings tab
54
57
55
58
1. On the **Incident settings** tab, ensure that **Create incidents from alerts triggered by this analytics rule** is set to **Enabled**.
56
59
1. In the **Alert grouping** section, select **Enabled** to group related alerts into incidents. Ensure that **Grouping alerts into a single incident if all the entities match (recommended)** is selected.
57
60
1. Ensure that **Reopen closed matching incidents** is **Disabled**.
58
61
1. Select **Next: Automated response**.
59
62
60
-
**Review and create**
63
+
## Review and create
61
64
62
65
1. Select **Next: Review**.
63
66
1. On the **Review and create** tab, when validation is successful, select **Create**.
@@ -67,8 +70,8 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
67
70
To test rule detection and incident creation, delete the VM you created during setup.
68
71
69
72
1. In the Azure portal, search for and select **Virtual machines**.
70
-
2. On the **Virtual machines** page, select the checkbox next to **simple-vm**, and then select **Delete** from the toolbar.
71
-
3. On the **Delete Resources** pane, enter *delete* in the **Enter "delete" to confirm deletion** field, and then select **Delete**.
73
+
1. On the **Virtual machines** page, select the checkbox next to **simple-vm**, and then select **Delete** from the toolbar.
74
+
1. On the **Delete Resources** pane, enter *delete* in the **Enter "delete" to confirm deletion** field, and then select **Delete**.
72
75
1. Select **Delete** again.
73
76
74
77
Give the operation several minutes to complete before you proceed to the next step.
@@ -95,7 +98,7 @@ In this step, you investigate the incident Microsoft Sentinel created when you d
95
98
1. Select the close icons to close the **Investigate** and **Incident** pages.
96
99
1. On the **Incidents** page, observe that **Open incidents** and **Active incidents** now have values of **0**.
97
100
98
-
You've successfully created a Microsoft Sentinel analytics rule, deleted a VM to create an incident, and investigated and closed the incident the rule created.
101
+
You successfully created a Microsoft Sentinel analytics rule, deleted a VM to create an incident, and investigated and closed the incident the rule created.
99
102
100
103
## Clean up resources
101
104
@@ -107,3 +110,76 @@ To avoid incurring costs, delete the Azure resources that you created in this mo
107
110
1. On the **Delete a resource group** page, under **Enter resource group name to confirm deletion**, enter *azure-sentinel-rg*.
108
111
1. Select **Delete**, and then select **Delete** again.
109
112
113
+
## [Defender portal](#tab/defender-portal)
114
+
115
+
In this exercise you walk through the process of reviewing, modifying, investigating, and responding to a security incident within the Unified Security Operations Platform.
116
+
117
+
> [!NOTE]
118
+
> When a lab instruction calls for opening a link to the simulated environment, it's recommended that you open the link in a new browser window so that you can simultaneously view the instructions and the exercise environment. To do so, select the right mouse key and select the option.
119
+
120
+
1. Open the simulated environment by selecting this link: **[Microsoft Defender portal](https://app.highlights.guide/start/1e5185e8-b314-48fe-b848-965232192baa?token=bba5e99b-3887-4a6c-b0d8-3099d15a4c23)**.
121
+
122
+
> [!NOTE]
123
+
> The environment for this exercise is a simulation generated from the product. As a limited simulation, links on a page may not be enabled and text-based inputs that fall outside of the specified script may not be supported. A pop-up message displays stating, "This feature isn't available within the simulation." When this occurs, select OK and continue the exercise steps.
124
+
>
125
+
>:::image type="content" source="../media/simulation-pop-up-error.png" alt-text="Screenshot of pop-up screen indicating that this feature isn't available within the simulation.":::
126
+
127
+
## Task: Review the Incident Queue and Apply Filters
128
+
129
+
1. In the Microsoft Defender portal navigation menu:
130
+
1. Expand **Investigation & response**.
131
+
1. Expand **Incidents & alerts**.
132
+
1. Select **Incidents**.
133
+
134
+
1. Within the Incident Queue, filter the incidents for high severity and a status of active.
135
+
1. Select "add filter."
136
+
1. Set the filter to categories and set the value to **Ransomware**.
137
+
1. Select the "User account compromise identified from a known attack pattern" incident and view the summary on the right hand menu
138
+
139
+
## Task: Generate an Incident Summary with Copilot for Security
140
+
141
+
1. Continuing with the same incident from the previous task, select the name to enter the incident page.
142
+
1. After entering the incident, allow Copilot to review the incident and generate an incident summary.
143
+
1. Review the summary details to understand what took place in the incident.
144
+
145
+
## Task: Review an Alert
146
+
147
+
1. Within the alert timeline, select the "Malicious URL In Proxy logs."
148
+
1. Review the details under "what happened."
149
+
1. Check which analytic rule generated this alert.
150
+
1. Within the incident graph, select the IP address "10.50.0.16."
151
+
1. Select the node and choose "view details" to see related details to the IP.
152
+
1. In the alert timeline, select "Connection to a suspicious domain related to credential phishing."
153
+
1. Review the process tree to review the sequence of processes being performed on the workstation up until the incident.
154
+
155
+
## Task: Review the Incident Assets (Entities)
156
+
157
+
1. Within the incident, select the "assets" tab near the top.
158
+
1. Select "users."
159
+
1. Select the user’s name.
160
+
1. Review the details in the side menu.
161
+
1. Select "devices."
162
+
1. Select the first device.
163
+
1. Select "open device page."
164
+
1. Review the details shown on the page.
165
+
166
+
## Task: Review the Evidence and Response
167
+
168
+
1. Navigate back to the incident page.
169
+
1. Select the "Evidence and Response" tab near the top.
170
+
1. Select a few items of evidence and review the details in the side menu.
171
+
172
+
## Task: Review the Recommended Actions
173
+
174
+
1. Select the "Recommended actions" tab.
175
+
1. Review the list of listed actions.
176
+
1. Select through the list to see the details, implementation status, impact, implementation steps, and history.
177
+
178
+
## Task: Close an Incident
179
+
180
+
1. Within the incident, select "Manage Incident."
181
+
1. Set the status to resolved.
182
+
1. Within the classification, select a categorization.
In this module, you learned about using Microsoft Sentinel to detect and investigate security threats in an environment. You practiced using rules and alerts to investigate and identify anomalies in Contoso's Azure Activity log.
2
+
In this module, you learned about using Microsoft Sentinel to detect and investigate security threats in your Microsoft Azure environment. You also practiced using rules and alerts to investigate and identify anomalies in Contoso's Azure Activity log, and how to use Kusto Query Language (KQL) to summarize and visualize data, which is essential for creating custom analytics rules and workbooks in Microsoft Sentinel. And, you learned how to investigate consolidated incidents in the Microsoft Defender portal.
3
3
4
4
You can now lead the IT team in helping Contoso protect its security environment by managing incidents with Microsoft Sentinel. Ongoing activities might include creating custom analytics rules, using playbooks for automated responses, and using workbooks to provide dashboards and visualizations.
title: Security incident management in Microsoft Sentinel
5
5
description: Learn about security incidents, incident evidence and entities, incident management, and how to use Microsoft Sentinel to handle incidents.
0 commit comments