Skip to content

Commit 2d87ade

Browse files
Merge pull request #50066 from KenMAG/main
Revised module with Azure and Defender tabs, added simulation and improved Acrolinx score
2 parents 9802d52 + bfae932 commit 2d87ade

File tree

5 files changed

+91
-16
lines changed

5 files changed

+91
-16
lines changed

learn-pr/wwl-sci/incident-management-sentinel/6-exercise-investigate-incident.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Exercise - Investigate an incident
44
metadata:
55
title: Exercise - Investigate an incident
66
description: Follow these steps to create an analytics rule and use it to investigate an incident in Microsoft Sentinel.
7-
ms.date: 05/22/2023
8-
author: wwlpublish
7+
ms.date: 04/18/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
11-
durationInMinutes: 20
11+
durationInMinutes: 35
1212
content: |
1313
[!include[](includes/6-exercise-investigate-incident.md)]

learn-pr/wwl-sci/incident-management-sentinel/includes/6-exercise-investigate-incident.md

Lines changed: 85 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
1+
Security operations analysts use Microsoft Sentinel to monitor and respond to security incidents in their organization. In these exercises we investigate security incidents using Microsoft Sentinel in Microsoft Azure, and in the Microsoft Defender portal Unified Security Operations Platform.
12

2-
As a Contoso security engineer, you need to analyze the deletions of virtual machines (VMs) from the Contoso Azure subscription, and be alerted when a similar activity occurs in the future. You decide to implement an analytics rule to create an incident when someone deletes an existing VM. You can then investigate the incident to determine the details, and close the incident when you're finished.
3+
## [Azure portal](#tab/azure-portal)
4+
5+
As a Contoso security operations analyst, you need to analyze the deletions of virtual machines (VMs) from the Contoso Azure subscription, and be alerted when a similar activity occurs in the future. You decide to implement an analytics rule to create an incident when someone deletes an existing VM. You can then investigate the incident to determine the details, and close the incident when you're finished.
36

47
In this exercise, you create a Microsoft Sentinel analytics rule to detect when a VM is deleted. You then delete the VM you created at the beginning of this module, and investigate and resolve the incident the rule created.
58

6-
To complete this exercise, make sure you finished the setup exercise at the beginning of the module and the Azure Activity connector now shows a status of **Connected**.
9+
To complete this exercise, make sure you finished the setup exercise at the beginning of the module, and the Azure Activity connector now shows a status of **Connected**.
710

811
## Create an analytics rule from the wizard
912

@@ -13,7 +16,7 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
1316
1. On your Microsoft Sentinel page, select **Analytics** under **Configuration** in the left menu.
1417
1. On the **Analytics** page, select **Create** > **Scheduled query rule**.
1518

16-
**General tab**
19+
## General tab
1720

1821
1. On the **General** tab of the wizard, provide the following information.
1922

@@ -27,7 +30,7 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
2730

2831
1. Select **Next: Set rule logic**.
2932

30-
**Set rule logic tab**
33+
## Set rule logic tab
3134

3235
1. On the **Set rule logic** tab, in the **Rule query** section, enter the following query:
3336

@@ -50,14 +53,14 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
5053
5154
1. Select **Next: Incident settings**.
5255
53-
**Incident settings tab**
56+
## Incident settings tab
5457
5558
1. On the **Incident settings** tab, ensure that **Create incidents from alerts triggered by this analytics rule** is set to **Enabled**.
5659
1. In the **Alert grouping** section, select **Enabled** to group related alerts into incidents. Ensure that **Grouping alerts into a single incident if all the entities match (recommended)** is selected.
5760
1. Ensure that **Reopen closed matching incidents** is **Disabled**.
5861
1. Select **Next: Automated response**.
5962
60-
**Review and create**
63+
## Review and create
6164
6265
1. Select **Next: Review**.
6366
1. On the **Review and create** tab, when validation is successful, select **Create**.
@@ -67,8 +70,8 @@ Create an analytics rule that creates an incident when a VM is deleted in the Co
6770
To test rule detection and incident creation, delete the VM you created during setup.
6871
6972
1. In the Azure portal, search for and select **Virtual machines**.
70-
2. On the **Virtual machines** page, select the checkbox next to **simple-vm**, and then select **Delete** from the toolbar.
71-
3. On the **Delete Resources** pane, enter *delete* in the **Enter "delete" to confirm deletion** field, and then select **Delete**.
73+
1. On the **Virtual machines** page, select the checkbox next to **simple-vm**, and then select **Delete** from the toolbar.
74+
1. On the **Delete Resources** pane, enter *delete* in the **Enter "delete" to confirm deletion** field, and then select **Delete**.
7275
1. Select **Delete** again.
7376
7477
Give the operation several minutes to complete before you proceed to the next step.
@@ -95,7 +98,7 @@ In this step, you investigate the incident Microsoft Sentinel created when you d
9598
1. Select the close icons to close the **Investigate** and **Incident** pages.
9699
1. On the **Incidents** page, observe that **Open incidents** and **Active incidents** now have values of **0**.
97100
98-
You've successfully created a Microsoft Sentinel analytics rule, deleted a VM to create an incident, and investigated and closed the incident the rule created.
101+
You successfully created a Microsoft Sentinel analytics rule, deleted a VM to create an incident, and investigated and closed the incident the rule created.
99102
100103
## Clean up resources
101104
@@ -107,3 +110,76 @@ To avoid incurring costs, delete the Azure resources that you created in this mo
107110
1. On the **Delete a resource group** page, under **Enter resource group name to confirm deletion**, enter *azure-sentinel-rg*.
108111
1. Select **Delete**, and then select **Delete** again.
109112
113+
## [Defender portal](#tab/defender-portal)
114+
115+
In this exercise you walk through the process of reviewing, modifying, investigating, and responding to a security incident within the Unified Security Operations Platform.
116+
117+
> [!NOTE]
118+
> When a lab instruction calls for opening a link to the simulated environment, it's recommended that you open the link in a new browser window so that you can simultaneously view the instructions and the exercise environment. To do so, select the right mouse key and select the option.
119+
120+
1. Open the simulated environment by selecting this link: **[Microsoft Defender portal](https://app.highlights.guide/start/1e5185e8-b314-48fe-b848-965232192baa?token=bba5e99b-3887-4a6c-b0d8-3099d15a4c23)**.
121+
122+
> [!NOTE]
123+
> The environment for this exercise is a simulation generated from the product. As a limited simulation, links on a page may not be enabled and text-based inputs that fall outside of the specified script may not be supported. A pop-up message displays stating, "This feature isn't available within the simulation." When this occurs, select OK and continue the exercise steps.
124+
>
125+
>:::image type="content" source="../media/simulation-pop-up-error.png" alt-text="Screenshot of pop-up screen indicating that this feature isn't available within the simulation.":::
126+
127+
## Task: Review the Incident Queue and Apply Filters
128+
129+
1. In the Microsoft Defender portal navigation menu:
130+
1. Expand **Investigation & response**.
131+
1. Expand **Incidents & alerts**.
132+
1. Select **Incidents**.
133+
134+
1. Within the Incident Queue, filter the incidents for high severity and a status of active.
135+
1. Select "add filter."
136+
1. Set the filter to categories and set the value to **Ransomware**.
137+
1. Select the "User account compromise identified from a known attack pattern" incident and view the summary on the right hand menu
138+
139+
## Task: Generate an Incident Summary with Copilot for Security
140+
141+
1. Continuing with the same incident from the previous task, select the name to enter the incident page.
142+
1. After entering the incident, allow Copilot to review the incident and generate an incident summary.
143+
1. Review the summary details to understand what took place in the incident.
144+
145+
## Task: Review an Alert
146+
147+
1. Within the alert timeline, select the "Malicious URL In Proxy logs."
148+
1. Review the details under "what happened."
149+
1. Check which analytic rule generated this alert.
150+
1. Within the incident graph, select the IP address "10.50.0.16."
151+
1. Select the node and choose "view details" to see related details to the IP.
152+
1. In the alert timeline, select "Connection to a suspicious domain related to credential phishing."
153+
1. Review the process tree to review the sequence of processes being performed on the workstation up until the incident.
154+
155+
## Task: Review the Incident Assets (Entities)
156+
157+
1. Within the incident, select the "assets" tab near the top.
158+
1. Select "users."
159+
1. Select the user’s name.
160+
1. Review the details in the side menu.
161+
1. Select "devices."
162+
1. Select the first device.
163+
1. Select "open device page."
164+
1. Review the details shown on the page.
165+
166+
## Task: Review the Evidence and Response
167+
168+
1. Navigate back to the incident page.
169+
1. Select the "Evidence and Response" tab near the top.
170+
1. Select a few items of evidence and review the details in the side menu.
171+
172+
## Task: Review the Recommended Actions
173+
174+
1. Select the "Recommended actions" tab.
175+
1. Review the list of listed actions.
176+
1. Select through the list to see the details, implementation status, impact, implementation steps, and history.
177+
178+
## Task: Close an Incident
179+
180+
1. Within the incident, select "Manage Incident."
181+
1. Set the status to resolved.
182+
1. Within the classification, select a categorization.
183+
1. Select save.
184+
185+
---
Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11

2-
In this module, you learned about using Microsoft Sentinel to detect and investigate security threats in an environment. You practiced using rules and alerts to investigate and identify anomalies in Contoso's Azure Activity log.
2+
In this module, you learned about using Microsoft Sentinel to detect and investigate security threats in your Microsoft Azure environment. You also practiced using rules and alerts to investigate and identify anomalies in Contoso's Azure Activity log, and how to use Kusto Query Language (KQL) to summarize and visualize data, which is essential for creating custom analytics rules and workbooks in Microsoft Sentinel. And, you learned how to investigate consolidated incidents in the Microsoft Defender portal.
33

44
You can now lead the IT team in helping Contoso protect its security environment by managing incidents with Microsoft Sentinel. Ongoing activities might include creating custom analytics rules, using playbooks for automated responses, and using workbooks to provide dashboards and visualizations.
5-

learn-pr/wwl-sci/incident-management-sentinel/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.azure.incident-management-sentinel
33
metadata:
44
title: Security incident management in Microsoft Sentinel
55
description: Learn about security incidents, incident evidence and entities, incident management, and how to use Microsoft Sentinel to handle incidents.
6-
ms.date: 05/22/2023
7-
author: wwlpublish
6+
ms.date: 04/18/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
4.88 KB
Loading

0 commit comments

Comments
 (0)