Microsoft Sentinel: Step by Step Full Tutorial (follow along)
Résumé
TLDRThe webinar provides a detailed overview of building Microsoft Sentinel in one hour, including the prerequisites, configuration of a log analytics workspace, and integration of data sources. Leaders Joe Stalker and Lamar emphasize the importance of Sentinel as a SIEM solution that aggregates alerts from Microsoft Defender and Azure services, incorporating third-party log sources. Attendees learn how to set up data connectors, utilize Kusto Query Language for querying events, and implement automation with rules and playbooks to enhance security operations.
A retenir
- 🔍 Introduction to Microsoft Sentinel and its capabilities
- ⚙️ Prerequisites for building Sentinel
- 📊 Setting up a log analytics workspace
- 🛠️ Connecting third-party data sources
- 📈 Using Kusto Query Language (KQL) for querying
- 📑 Implementing analytic rules for threat detection
- ⚡ Automating responses through playbooks
- 🔒 Importance of log retention policies
- 📅 Overview of free trials and limits in Sentinel
- 👥 Collaboration with Microsoft for security practices
Chronologie
- 00:00:00 - 00:05:00
In the webinar introduction, Joe Stalker, founder of Patriot, highlights the agenda, including an overview of Microsoft Sentinel, prerequisites for building, and a detailed walkthrough on setting up Sentinel.
- 00:05:00 - 00:10:00
Joe introduces himself and his team member Lamar, emphasizing their vast experience with Microsoft Sentinel and the support they provide to clients as a Microsoft cybersecurity partner.
- 00:10:00 - 00:15:00
Lamar explains the integration of Microsoft Sentinel with Defender services, illustrating how various Microsoft security solutions contribute to a comprehensive security posture.
- 00:15:00 - 00:20:00
Lamar discusses the incident lifecycle in Microsoft Sentinel, explaining how an attack usually begins with email and describing the interaction of security services like Defender for Cloud and Defender for Identity during an attack.
- 00:20:00 - 00:25:00
Lamar elaborates on integrating third-party log data into Sentinel, mentioning various methods for log ingestion and highlighting the importance of correct configuration for effective monitoring.
- 00:25:00 - 00:30:00
Joe outlines the setup process for Microsoft Sentinel, starting with creating a Log Analytics Workspace and setting up the necessary prerequisites like Azure subscriptions and permissions.
- 00:30:00 - 00:35:00
The team discusses the importance of setting data caps during the evaluation period, helping to avoid unexpected charges as users familiarize themselves with Sentinel.
- 00:35:00 - 00:40:00
Joe details the process of installing data connectors for Azure activity logs and Microsoft 365 audit logs from the Content Hub, emphasizing the distinction between free and paid data sources.
- 00:40:00 - 00:45:00
In the setup process, Joe highlights the configuration of various data connectors, including necessary permissions, and mentions how to ensure only alerts are ingested during the evaluation phase.
- 00:45:00 - 00:54:45
The session wraps up by discussing automation rules and playbooks in Sentinel, showcasing how these features allow users to automate responses and orchestration within their security operations.
Carte mentale
Vidéo Q&R
What is Microsoft Sentinel?
Microsoft Sentinel is a cloud-native security information and event management (SIEM) solution that provides intelligent security analytics and threat intelligence across the enterprise.
What are the prerequisites for building Sentinel?
You need an active Azure subscription, contributor role access to the subscription, and a Global administrator account for certain Microsoft logs.
How does Microsoft Sentinel integrate with XDR?
Sentinel serves as a single pane of glass for alerts and data from Microsoft Defender and Azure services, enabling correlation of security data across various platforms.
What data connectors can be utilized with Microsoft Sentinel?
You can utilize data connectors for Azure activity logs, Microsoft 365 Defender alerts, and several third-party sources, including firewalls and identity protection services.
Can third-party logs be integrated into Sentinel?
Yes, Sentinel can pull in logs from third-party sources via APIs, Syslog, or other methods such as using the Log Analytics agent.
What is KQL and why is it important?
Kusto Query Language (KQL) is used for querying data in Azure's log analytics and Sentinel, facilitating complex queries to analyze logs.
How can automation be implemented in Sentinel?
Automation can be set through automation rules and playbooks, enabling orchestration of responses to security incidents.
How long can Sentinel retain logs?
By default, Sentinel retains logs for 30 days, but you can extend this to 90 days at no extra cost.
What are analytic rules in Sentinel?
Analytic rules in Sentinel are predefined queries that detect unusual behavior, threats, or security incidents based on the incoming logs.
How can one start using Microsoft Sentinel?
One can start using Microsoft Sentinel by creating a free Azure account and following guidance for setting up log analytics and Sentinel.
Voir plus de résumés vidéo
AKU KOST BARENG SEPUPU!!
Laptop Gaming ""MURAH"" Asus. Tipis. Enteng. Performa monster - TUF Gaming A14
Sumber Intensi Pancasila Pidato Bung Karno 1 Juli 1945
Jordan Peterson - The Theory of Multiple Intelligences is Rubbish!
Beyond Wit and Grit: Rethinking the Keys to Success | Howard Gardner | TEDxBeaconStreet
WOULD HAVE BEEN | COULD HAVE BEEN | SHOULD HAVE BEEN | MAY HAVE BEEN | PART 15 | GRAMMAR RULES
- 00:00:02welcome to today's webinar on building
- 00:00:04Sentinel in one hour we'll go ahead and
- 00:00:07go through the agenda here so we'll give
- 00:00:09you an overview of
- 00:00:10Sentinel uh we'll discuss the
- 00:00:12prerequisites for building uh Sentinel
- 00:00:16and then uh you'll be following along as
- 00:00:19we actually go through all the steps uh
- 00:00:21just by way of introduction my name is
- 00:00:23Joe stalker I'm the founder and CEO of
- 00:00:25patriot um so I started Patriot um
- 00:00:27almost 10 years ago and uh have written
- 00:00:30a book on securing Microsoft
- 00:00:33365 I also help lead our managed uh
- 00:00:36Sentinel practice which is uh 247 xdr uh
- 00:00:41service
- 00:00:42offering and I'm joined today uh by
- 00:00:45Lamar no Lamar would you mind um sharing
- 00:00:47a little bit about yourself hi everyone
- 00:00:50nice to have you on today my name's
- 00:00:52Lamar now um been working in Microsoft
- 00:00:55Consulting for several years it's a
- 00:00:57passion of mine to especially around the
- 00:00:59senal
- 00:01:00area um it's been a fun learning
- 00:01:02experience and always learning something
- 00:01:04new a little bit more about Patriots so
- 00:01:06we are a Microsoft cyber security
- 00:01:08partner uh we partner very closely with
- 00:01:10Microsoft it's the only partner we have
- 00:01:13and uh they've ranked this one of their
- 00:01:14top three Partners in the US uh based on
- 00:01:17the number of uh projects uh that we've
- 00:01:19completed about 2,000 since
- 00:01:222015 uh last year we deployed over 4
- 00:01:24million seats of the defender xdr stack
- 00:01:28and on average we're helping close to 4
- 00:01:29400 clients per year and we do offer a a
- 00:01:33247 sock uh so if you for example build
- 00:01:36Sentinel and and you need help after
- 00:01:38hours or weekend or even frankly during
- 00:01:41the day but you know we do offer a a
- 00:01:43weekend and after hour um coverage plan
- 00:01:45as well uh but we can help uh monitor
- 00:01:49your Sentinel that you
- 00:01:51build uh Lamar would you mind just
- 00:01:53giving us a high level overview of you
- 00:01:55know what kind of stuff feeds into
- 00:01:57Microsoft Sentinel especially as it
- 00:02:00relates to what Microsoft refers to is
- 00:02:02their uh their xdr
- 00:02:04service yeah thanks Joe so yeah Sentinel
- 00:02:08is your single pane of glass for for all
- 00:02:12things in the Microsoft uh Defender
- 00:02:15Suite as well as your Azure side of the
- 00:02:18house so if we notice here right we have
- 00:02:20all the all the SAS apps fly come into a
- 00:02:23Defender for cloud apps we have M365
- 00:02:27Defender for endpoint Defender for
- 00:02:29identity that it's kind of your Defender
- 00:02:30stack you can of course see these things
- 00:02:33in your Defender xdr portal um there's
- 00:02:36there's some interesting and and
- 00:02:38exciting things happening on the
- 00:02:40combination of Sentinel and xdr these
- 00:02:42days too which we can get to later we
- 00:02:44also have the entra ID side of the house
- 00:02:46where it's your proactive uh protections
- 00:02:50on your identities so all that can flow
- 00:02:53into your Defender xdr but then we also
- 00:02:55have the all the Azure stuff right your
- 00:02:58your VMS your cloud your SQL your app
- 00:03:01Services those things also generate
- 00:03:04alerts those alerts need to be managed
- 00:03:07they need to be investigated and
- 00:03:10preferably automated as well so those
- 00:03:13things are powered by Defender for cloud
- 00:03:15but then really the the main way to deal
- 00:03:18with those the best way is to make sure
- 00:03:20they come over to Sentinel and that's
- 00:03:22where you have all of your supporting
- 00:03:24data as well you can have correlation
- 00:03:27across identities end points Cloud you
- 00:03:31can really see the full picture of of an
- 00:03:33entire incident from one
- 00:03:35spot
- 00:03:37awesome so walk us through like a a
- 00:03:40typical you know security event and how
- 00:03:42that would kind of play out in
- 00:03:45Sentinel yeah so this is a great slide
- 00:03:47for that as we know most attacks start
- 00:03:50with email so there's an email that
- 00:03:53comes in uh that's where we have our
- 00:03:55Defender for office right can can start
- 00:03:58tracking that hopefully blocking it
- 00:04:00right at the beginning um if that
- 00:04:02doesn't happen something gets clicked on
- 00:04:05and there's there's something that gets
- 00:04:07installed on an
- 00:04:08endpoint um that endpoint can either be
- 00:04:11for example a user's laptop or it could
- 00:04:14be a VM in Azure so depending on where
- 00:04:17that's at you have Defender for cloud
- 00:04:19you have Defender for endpoint there to
- 00:04:21catch that as
- 00:04:22well moving on if that user's identity
- 00:04:25gets compromised you'll have Defender
- 00:04:28for identity
- 00:04:30that's where we can uh track your active
- 00:04:32directory side of the house to see uh
- 00:04:35what type of lateral movement attempts
- 00:04:37they having what are they doing with
- 00:04:40those
- 00:04:41identities um you also have across the
- 00:04:44top there Defender for cloud apps so you
- 00:04:47know did they access sensitive data did
- 00:04:50they exfiltrate it um another path is
- 00:04:53instead of active directory if they come
- 00:04:55in from the ENT side that's that top
- 00:04:57gray area there we have identity
- 00:05:00protection there as well so that's
- 00:05:02another area that we can we can block
- 00:05:04and make sure that that we stop them at
- 00:05:05that level and you have Defender for iot
- 00:05:09so it's growing and growing a new area
- 00:05:11of of attacks for a lot of Bad actors so
- 00:05:16Defender also can integrate into your
- 00:05:18iot and OT
- 00:05:20environments and if an incident touches
- 00:05:23all of these you'll get the entire
- 00:05:25picture right from Sentinel so of course
- 00:05:27we want to block it proactively this
- 00:05:29Paints the entire picture for us got it
- 00:05:32so so the xdr stack it's all the
- 00:05:35prevention capabilities as well as
- 00:05:37detection capabilities and then that's
- 00:05:39flowing into Microsoft Sentinel which is
- 00:05:41a Sim solution uh what what about uh
- 00:05:45third party sources how do we get those
- 00:05:47in yeah so if it produces logs we can
- 00:05:50bring it in right so depending on the
- 00:05:53third party itself uh many many third
- 00:05:56parties are are giving us access to apis
- 00:06:00where Sentinel can go and pull the logs
- 00:06:03um that makes it pretty easy generate an
- 00:06:05authorization a key and depending on the
- 00:06:08vendor you know may need a couple more
- 00:06:10pieces of data and once we have that we
- 00:06:12pull data in there's another way of
- 00:06:15doing it is through your uh if they
- 00:06:17produce CIS log or CF type data those
- 00:06:21are more commonly used for things like
- 00:06:24firewalls
- 00:06:25switches uh and those types of things if
- 00:06:29it produces those datas we can use a CIS
- 00:06:31log forwarder to then uh install Arc and
- 00:06:35the AMA agent on there and that will
- 00:06:37forward them off to Sentinel in a secure
- 00:06:40manner 443 encrypted over the over the
- 00:06:43internet to Sentinel you can also do it
- 00:06:46a couple other ways but you can do it
- 00:06:49via uh private space as well so there's
- 00:06:53there's tons of options however that log
- 00:06:55gets created even if it's a flat file
- 00:06:57somewhere Sentinel can pick it up your
- 00:06:59machine produce files we can bring those
- 00:07:01in so wherever the log happens to be
- 00:07:03created or exist we can grab
- 00:07:05it so today you know just for um you
- 00:07:09know building out Sentinel getting data
- 00:07:11to flow uh we'll show you how to pull
- 00:07:13data in using just the native data
- 00:07:15connectors from the uh xdr stack so um
- 00:07:18the Azure activity logs uh we'll show
- 00:07:21you how to bring in um all of these um
- 00:07:25you know xdr uh components so those will
- 00:07:28come in show you to bring in the Office
- 00:07:30365
- 00:07:32logs and uh so these are currently the
- 00:07:35the the free sources right the alert
- 00:07:38data um we'll also bring in the
- 00:07:40Microsoft inro logs uh we'll show you
- 00:07:42how to do that and uh so that'll that'll
- 00:07:45kind of get you started today with your
- 00:07:46Sentinel setup now you'll notice
- 00:07:49Microsoft Sentinel sits on top of a
- 00:07:53what's called a log analytics
- 00:07:55workspace so that'll be the very first
- 00:07:58thing we create today that's kind of the
- 00:08:01you know this is the solution that pulls
- 00:08:03all the logs into it and then Sentinel
- 00:08:06is kind of that solution that reasons
- 00:08:08over it and also provides uh security
- 00:08:12orchestration and response and
- 00:08:14automation uh so we'll kind of walk
- 00:08:16through that today as well so some of
- 00:08:18the
- 00:08:19prerequisites uh to build your Sentinel
- 00:08:22environment you will need an active
- 00:08:24Azure
- 00:08:25subscription um if you don't have one uh
- 00:08:29we paste this link here uh in the chat
- 00:08:32for you to be able to to get started and
- 00:08:35and create one uh but this will be a a
- 00:08:38prerequisite and again don't worry if
- 00:08:40you don't have that uh Azure
- 00:08:42subscription right this moment again
- 00:08:43this meeting is recorded so you can
- 00:08:46simply uh when you get the recording you
- 00:08:49can then follow along um but if you um
- 00:08:52wanted to you can actually check out
- 00:08:54this quick start great little
- 00:08:56guide to get your Sentinel uh up and
- 00:08:58running so so we'll kind of um you know
- 00:09:01start there
- 00:09:03today if you want to bring in the
- 00:09:05Microsoft audit logs from say SharePoint
- 00:09:09and one drive and teams and email then
- 00:09:13you will need a uh Global administrator
- 00:09:17account to a Microsoft tenant now if you
- 00:09:21don't have a like a lab tenant or if
- 00:09:23you're okay in in installing and
- 00:09:25production you know since again this is
- 00:09:27just read only we're just getting the
- 00:09:28logs not going to affect anything in in
- 00:09:32your production environment um then you
- 00:09:34can certainly do that with your um you
- 00:09:37know production
- 00:09:38environment so if you do follow the
- 00:09:41principle of lease privilege you know
- 00:09:43the role-based access controls um at a
- 00:09:46minimum within your Azure
- 00:09:48subscription you're going to need a uh
- 00:09:51the contributor role um at the
- 00:09:54subscription level in which Microsoft
- 00:09:56Sentinel workspace is going to reside so
- 00:09:58that would be like one permission now if
- 00:10:01if you spin up your own kind of lab
- 00:10:03environment and you have an Azure
- 00:10:05subscription created you're already
- 00:10:07going to have the owner permission so
- 00:10:10this principle of lease privilege is
- 00:10:11just for those of you that really need
- 00:10:13to follow very strict you know
- 00:10:15permission
- 00:10:16modeling you'll need the uh Sentinel
- 00:10:18contributor or Microsoft Sentinel reader
- 00:10:20permissions on the resource Group uh
- 00:10:23that the workspace the log analytics
- 00:10:25workspace belongs to so those are uh the
- 00:10:28prere
- 00:10:30so today um we're going to show you how
- 00:10:34to set up Sentinel which consists of
- 00:10:36creating a log analytics
- 00:10:38workspace adding Sentinel on top of that
- 00:10:42workspace then we're going to start to
- 00:10:44show you how to pull data in uh using
- 00:10:46the content Hub which is kind of like a
- 00:10:48catalog of over 300 different sources so
- 00:10:52if you have like paloo or foret or
- 00:10:56Cisco um you know those kinds of uh
- 00:10:59connectors you know you can pull those
- 00:11:01in there we'll show you how to manage
- 00:11:03the data
- 00:11:05connector and then deploying the
- 00:11:06analytic rules is typically The Next
- 00:11:09Step um we'll also show you how to
- 00:11:11enable the user and entity behavior um
- 00:11:14analytics and anomaly
- 00:11:16detections we'll go over some kql Basics
- 00:11:19and some basic incident manage
- 00:11:21management and then some reporting
- 00:11:23Basics so that's really what's on the
- 00:11:26agenda uh for today so to get started to
- 00:11:29set up Microsoft Sentinel you'll browse
- 00:11:32to portal. azure.com
- 00:11:35and again uh feel feel free to follow
- 00:11:38along so I'm here in Portal azure.com so
- 00:11:41up in the top you'll type in um Sentinel
- 00:11:45and you'll search for Microsoft
- 00:11:48Sentinel you'll notice I have a couple
- 00:11:50of these um lab environments already
- 00:11:53here but for you it should be probably
- 00:11:55blank unless you've also got one uh
- 00:11:58created so so you're going to go and
- 00:11:59click on
- 00:12:01Create and uh the first thing that
- 00:12:03you're going to do is create a new
- 00:12:05workspace because again Sentinel sits on
- 00:12:08top of uh log
- 00:12:11analytics you'll choose your
- 00:12:13subscription that hopefully you have
- 00:12:14access to if not you'll need to create a
- 00:12:16subscription and again you'll follow
- 00:12:17that quick start guide that we put in
- 00:12:19the chat uh for you we do recommend
- 00:12:23creating a resource Group a fresh clean
- 00:12:26Resource Group uh for this to be cre in
- 00:12:30so we'll give it like a acronym like
- 00:12:33RG and then um you know Sentinel lab
- 00:12:39three okay and of course you can follow
- 00:12:41your own naming convention
- 00:12:43there and uh so that's the name of the
- 00:12:46resource Group and then the log
- 00:12:47analytics workspace I'll call it like
- 00:12:49log
- 00:12:52analytics
- 00:12:54Sentinel
- 00:12:57three and then we'll just go Ahad and
- 00:12:59click on review and
- 00:13:01create now creating this log analytics
- 00:13:04workspace um should only take 10 seconds
- 00:13:08or so should be pretty quick you can
- 00:13:10kind of monitor the progress
- 00:13:13here once this uh gets created we'll
- 00:13:16actually go back to
- 00:13:18Sentinel and then we'll add Sentinel
- 00:13:20into this uh log analytics
- 00:13:27workspace yeah Joe so starting this here
- 00:13:29gives us the the 30-day free trial right
- 00:13:32that's a great point so you'll have 31
- 00:13:34days to evaluate and one of the very
- 00:13:37first things we're going to do is we're
- 00:13:39going to show you um how to enable a uh
- 00:13:46a data cap um because one of the really
- 00:13:49important things during your 31-day free
- 00:13:51trial is um you want to make sure you
- 00:13:55know that you're not uh exceeding what
- 00:13:57is free so what's is they're going to
- 00:13:59give you the first 10 gigs per day of
- 00:14:02ingestion so we can set a cap so that
- 00:14:07Sentinel will stop ingesting data once
- 00:14:10it reaches the 10 gig that way you don't
- 00:14:13get any surprise charges now once you're
- 00:14:16ready to go into production obviously
- 00:14:18you'll want to you know remove that cap
- 00:14:20so that way you're able to
- 00:14:22get you know all the alerts that you
- 00:14:24need to but uh yeah so to set the cap
- 00:14:28you go down to in your log analytics
- 00:14:30workspace you go to usage and estimated
- 00:14:32costs then you go to daily cap you'll
- 00:14:36turn on the
- 00:14:39cap and
- 00:14:42uh this is because we haven't created
- 00:14:45The Sentinel instance on it so I skipped
- 00:14:47uh one step so inside of Sentinel when
- 00:14:50we go back to Sentinel we're going to
- 00:14:52now create Sentinel and we're going to
- 00:14:54put it on top of that log analy
- 00:14:56workspace and then we'll be able to
- 00:14:57create the data cap so I'm going to go
- 00:14:59go ahead and go to create here I'm going
- 00:15:01to choose that new um workspace that I
- 00:15:04created in the previous step going to
- 00:15:06click add again this should take about
- 00:15:09seven to 10 seconds here it's pretty
- 00:15:11quick for this to get created to get
- 00:15:13added into that okay that's done now in
- 00:15:16order to get to the data cap section
- 00:15:18we're going to go down to settings at
- 00:15:20the
- 00:15:21bottom then we're going to click on
- 00:15:22workspace
- 00:15:24settings usage and estimated costs
- 00:15:29uh daily cap now we can turn on that
- 00:15:32daily cap okay so we're going to set it
- 00:15:34to 10 gig so that'll be the cap another
- 00:15:37thing kind of worth pointing out is the
- 00:15:39retention policy so by default when you
- 00:15:43first create uh log
- 00:15:45analytics um it's going to retain your
- 00:15:47logs for 30 days but Microsoft actually
- 00:15:51gives you an additional 60 days for free
- 00:15:53when you're using Sentinel on top of log
- 00:15:55analytics so to take advantage of that
- 00:15:58just bump that up to 90 there's no
- 00:15:59additional fee to do that um so that is
- 00:16:02a good practice to to take advantage of
- 00:16:04and you know if you have any regulatory
- 00:16:07requirements um you know you may need to
- 00:16:09go longer so for example PCI the payment
- 00:16:12card industry um I last I checked they
- 00:16:15want you to keep your security logs for
- 00:16:17one year so that you'd go ahead and bump
- 00:16:19that up now once you go above 90 days
- 00:16:22you know there there are some additional
- 00:16:24uh costs for log retention past 90 days
- 00:16:27and you could read about that in the
- 00:16:29learn more length there but I'll just go
- 00:16:31ahead and set that to
- 00:16:3390 Okay so we've got our uh data cap set
- 00:16:38now what we want to talk about next is
- 00:16:41the um now that we've created the log
- 00:16:44analytics workspace we've enabled
- 00:16:46Sentinel we've set the data cap and the
- 00:16:49retention policy the next step is to
- 00:16:51import some content from the content Hub
- 00:16:55now what we recommend enabling are what
- 00:16:58are called the always free data sources
- 00:17:01so your Azure activity
- 00:17:05logs your Office 365 audit logs which
- 00:17:08include SharePoint exchange and and
- 00:17:11teams and the uh security alerts from
- 00:17:15the Microsoft Defender xdr stack so all
- 00:17:18of these Defender xdr products all the
- 00:17:20alerts uh from these products those are
- 00:17:22all free so in the content Hub you'll
- 00:17:25search um for each of these so azure
- 00:17:28acity Microsoft
- 00:17:30365 Defender xdr and then you'll just
- 00:17:34simply click the install button and
- 00:17:37that'll start uh pulling that data in or
- 00:17:40at least getting the connector installed
- 00:17:42there's a second step to uh to pull the
- 00:17:45data in but let's start there so we're
- 00:17:47going to find the Azure audit logs first
- 00:17:51by going over to getting back into
- 00:17:54Sentinel we'll refresh here we'll get
- 00:17:56into our new lab
- 00:18:00and it's this is where it's telling you
- 00:18:01the free trial's been activated um
- 00:18:04you'll have some time and uh you
- 00:18:08know we set that cap so no worries there
- 00:18:11so we go down to Content
- 00:18:13Hub and we'll go ahead and search for
- 00:18:16the
- 00:18:18um Azure activity which is shown
- 00:18:21here we'll go Ahad and install
- 00:18:24that it should take about 5 seconds or
- 00:18:27so to install it's usually pretty
- 00:18:33quick that's installed now we're going
- 00:18:35to look for the uh
- 00:18:38Microsoft uh
- 00:18:42365 and this one's pretty quick as well
- 00:18:44should be about 5 seconds or so and
- 00:18:47install
- 00:18:50that and uh while this is installing
- 00:18:53you'll notice some details in the
- 00:18:55content Hub um this particular content
- 00:18:58pack
- 00:18:59includes 15 analytics rules a data
- 00:19:02connector uh 21 hunting queries and
- 00:19:05three
- 00:19:06workbooks um we're going to discuss
- 00:19:09analytic rules and workbooks um here in
- 00:19:11a
- 00:19:11moment uh but installing the content Hub
- 00:19:15basically creates a data connector and
- 00:19:18data connectors you know we we'll go and
- 00:19:20configure those in a moment we have one
- 00:19:22more to uh configure here which is the
- 00:19:25uh the defender
- 00:19:27xdr uh
- 00:19:29component so we'll go and install this
- 00:19:32say install yeah and a common thing
- 00:19:34there Joe is clients will ask well just
- 00:19:37by installing that are the logs flowing
- 00:19:41now what would we say to that yeah so we
- 00:19:44need to go into the connector and um
- 00:19:46configure each of those connectors and
- 00:19:48that allows you to choose like we were
- 00:19:51talking about before you know when we're
- 00:19:54configuring this um this xdr connector
- 00:19:58if we want the only the free data
- 00:20:00sources we need to make sure we only get
- 00:20:02the security alerts and maybe not like
- 00:20:05the the raw data from say Defender for
- 00:20:08endpoint so the raw data like the
- 00:20:10registry changes the network events you
- 00:20:13know that stuff's not free but the
- 00:20:15alerts coming from Defender for endpoint
- 00:20:17uh would be free so that next step um
- 00:20:20that Lamar is kind of bringing up there
- 00:20:21that's what we'll uh configure
- 00:20:24next now I want to I want to bring in a
- 00:20:27fourth connector um that I that I feel
- 00:20:29is pretty important um so the Microsoft
- 00:20:32entra ID connector this is super
- 00:20:35important because most of the alerts
- 00:20:37that we're investigating in our sock
- 00:20:39typically are attacks against the
- 00:20:41identity so I do recommend bring this
- 00:20:44one in now just be advised you know the
- 00:20:47um data from Microsoft entri ID is is
- 00:20:49not free um after your 31 Day free tral
- 00:20:53you know during your 31-day free tral
- 00:20:55you know there's there's no cost to this
- 00:20:57but after that um if you're continuing
- 00:20:59to use sentinel um you know you'll need
- 00:21:03to look at the uh costs uh for this
- 00:21:06table which you can do under under
- 00:21:07settings it'll show you the cost um but
- 00:21:10that'll be something to kind of keep in
- 00:21:11mind here but I'm going to go ahead and
- 00:21:12install the Microsoft entri ID connector
- 00:21:15because I do feel like that one's pretty
- 00:21:16important that's going to give us our
- 00:21:18signin logs um
- 00:21:21our um you know different uh attacks
- 00:21:25against the identity you'll notice that
- 00:21:27there's 63 three analytics
- 00:21:30rules that come with this
- 00:21:32particular uh connector okay so let's
- 00:21:35actually go in
- 00:21:37and uh you know configure a data
- 00:21:39connector here so in the data connectors
- 00:21:42uh the ones that we've installed are are
- 00:21:44showing here so if I wanted to like
- 00:21:46configure for example the you know
- 00:21:48Microsoft entry
- 00:21:49ID come in here to open the connector
- 00:21:54page it's going to check our permissions
- 00:21:56make sure that we have permissions to
- 00:21:58the tenant that we're you know bringing
- 00:22:00the signin data uh from of course that
- 00:22:02makes you know perfect sense and then um
- 00:22:06you uh you also do need uh access to the
- 00:22:10uh Microsoft entra diagnostic settings
- 00:22:12so you would come in here and check all
- 00:22:14these boxes uh to enable that
- 00:22:17connector similarly you'll go through
- 00:22:19each of these connectors and you'll
- 00:22:21check the boxes like you know if you
- 00:22:23want to bring in the exchange logs the
- 00:22:24SharePoint logs the team logs you'd hit
- 00:22:27apply and then it's going to start
- 00:22:28bringing in uh that log data so just
- 00:22:32kind of repeat that for each of these go
- 00:22:33through them uh enable uh the settings
- 00:22:36you know on
- 00:22:37those and once those once the data is
- 00:22:41Flowing the next thing to do if we kind
- 00:22:43of go back to our menu
- 00:22:45here is to deploy the analytic rules and
- 00:22:50uh ubaa so let's actually talk about
- 00:22:53that so the first thing I'll do is I'll
- 00:22:57go ahead and go down to settings and
- 00:23:01I'll show you where the uh the ubaa is
- 00:23:04so um user and entity Behavior analytics
- 00:23:07um this is going to let you know that
- 00:23:09there's okay there's anomalies related
- 00:23:11to uh a user or you know uh an entity's
- 00:23:14Behavior it's using machine learning
- 00:23:16models it's looking at pure analysis uh
- 00:23:20blast radius and uh it's really great at
- 00:23:22detecting uh behavioral anomalies so you
- 00:23:25just simply come in here and you click
- 00:23:27the set button and then you come in and
- 00:23:29enable it for the um sources so once you
- 00:23:33um you know turn it
- 00:23:34on um in our case we're using Microsoft
- 00:23:37enter ID as a is a cloud only kind of
- 00:23:39tenant uh if you do use uh Defender for
- 00:23:43identity uh against your on premise
- 00:23:45active directory then you can go ahead
- 00:23:47and check active directory as well okay
- 00:23:51uh you would hit apply um and then you
- 00:23:54enable these that effectively enables
- 00:23:57these log sources for for
- 00:23:59ubaa you'll notice anomalies is already
- 00:24:01on by default um there so now we get
- 00:24:05into um the topic of analytics rules now
- 00:24:08what is an analytic rule uh if we come
- 00:24:10over here to the templates what we're
- 00:24:12noticing here is we've got already uh 63
- 00:24:17analytic
- 00:24:18rules but they're all off by default
- 00:24:21notice that they're not enabled so
- 00:24:25there's two ways to get these enabled
- 00:24:27you can kind of go through them one by
- 00:24:29one and enable them so if I can select
- 00:24:31one like login attempts to disabled
- 00:24:35accounts so if I create this rule
- 00:24:38because I want to be notified if
- 00:24:39someone's attempting to sign into a
- 00:24:41disabled account I have an opportunity
- 00:24:44to uh to review uh you know what's going
- 00:24:48to happen now by default Microsoft kind
- 00:24:49of assigns their own severity levels so
- 00:24:51they're going to say that if somebody
- 00:24:53signs into a disabled account that's a
- 00:24:55medium now you can override that here as
- 00:24:58your publishing this rule if you like
- 00:25:00you also notice that it's um indexed
- 00:25:03against the miter attack uh framework so
- 00:25:06this is kind of a lexicon of hacker
- 00:25:08techniques and tactics um and there's a
- 00:25:11purpose for doing this mapping so that
- 00:25:13you can visualize it later uh which will
- 00:25:16show you how to
- 00:25:17do but then the analytic rule is using
- 00:25:21kql so csto query language uh to search
- 00:25:25the logs for certain Behavior so it's
- 00:25:28looking um at as an example for signin
- 00:25:33events where the result type is
- 00:25:3650057 which means you know the the user
- 00:25:39account is disabled so someone is
- 00:25:41attempting to sign into disabled
- 00:25:43accounts and then it's summarizing that
- 00:25:45and uh and mapping that so when the
- 00:25:48security analyst goes into to look at
- 00:25:50the incident later um the log data is
- 00:25:53then mapped to uh entity data for easy
- 00:25:56triaging for the analyst
- 00:25:59now you'll notice by default the query
- 00:26:01would run every one days but you can
- 00:26:02override that and have that run as
- 00:26:04frequently as say uh every five minutes
- 00:26:08if you need it to run more frequently uh
- 00:26:10than every five minutes you can do so um
- 00:26:13by simply querying or copying this data
- 00:26:16so I can copy this I can hit cancel and
- 00:26:19I can create my own what's called a a
- 00:26:21near real time query so in near real
- 00:26:24time instead of running it on a
- 00:26:26scheduled basis like every five minutes
- 00:26:28a near realtime query rule is going to
- 00:26:29run it nearly instantaneously so I can
- 00:26:31say you know notify if someone signs
- 00:26:36into a disabled
- 00:26:38account right I go next and then here I
- 00:26:42paste the
- 00:26:44query validates the query and then on
- 00:26:47the incident notice that I don't run it
- 00:26:50every five minutes because it's simply
- 00:26:51going to run in uh near real time now I
- 00:26:54believe you can have up to 50 uh near
- 00:26:56real time rules in any one instance so
- 00:26:59use them carefully because you only have
- 00:27:0150 whereas the uh scheduled rules you
- 00:27:05can have up to 512 of these and we're
- 00:27:08not even scratching the surface with the
- 00:27:1163 uh that we've uh imported from the
- 00:27:14content Hub but if I want to go back and
- 00:27:17and and finish the uh the sequence of
- 00:27:19you know getting this thing published
- 00:27:21here let's say I was satisfied with
- 00:27:23running it every five
- 00:27:25minutes I'm going to go ahead and go
- 00:27:27next
- 00:27:29and then you'll notice your automated
- 00:27:31response if this was the kind of
- 00:27:33activity that you wanted something to
- 00:27:35happen like hey I wanted to send me a
- 00:27:37teams message or an email whenever that
- 00:27:40event occurs this is where you would
- 00:27:43actually have an automation rule um be
- 00:27:45applied you know based on that activity
- 00:27:47so that can just kind of run behind the
- 00:27:49scenes um other automation rules that
- 00:27:52you might consider would be you know if
- 00:27:54this was some kind of a malware incident
- 00:27:56maybe you want to automate you know
- 00:27:58disabling um or I'm sorry isolating that
- 00:28:01machine or running an AV scan or
- 00:28:03something like that so A bunch of stuff
- 00:28:05you can automate uh Lamar will kind of
- 00:28:07go through automation here uh once I
- 00:28:11finish up my sequence I'll hand it over
- 00:28:13him he'll kind of show how to create a
- 00:28:14Playbook and how that ties
- 00:28:17in okay so I'm going to go ahead and
- 00:28:20save that now it would be pretty tedious
- 00:28:24to go through all 63 one at a
- 00:28:29time to activate all of them that'd be
- 00:28:32kind of tedious right so what we've done
- 00:28:35here is we've actually found a
- 00:28:38script uh where you can now Mass enable
- 00:28:41those uh analytic
- 00:28:44rules uh I created a a URL shortener
- 00:28:48link um that actually takes you to this
- 00:28:50full article um so for the purposes of
- 00:28:55this um which I knew I had a security
- 00:28:58uh audience here that they wouldn't just
- 00:29:01you know click on any old you're all
- 00:29:04shortener but
- 00:29:06um let me go ahead and uh paste that
- 00:29:09into the chat here for you
- 00:29:11all okay so what we just pasted into the
- 00:29:15chat uh allows you to to mass enable all
- 00:29:19of those uh analytic rules that um you
- 00:29:23know that you have there so deploying
- 00:29:25those analytic rules uh enabling the
- 00:29:27ubaa
- 00:29:29you know that's uh kind of that step now
- 00:29:32we we showed you some kql and we showed
- 00:29:35you the fact that the analytic rules are
- 00:29:37based on kql so it's pretty important to
- 00:29:39know you know kql and how to work with
- 00:29:42incidents
- 00:29:43right so if we hop over into
- 00:29:49um the SEL portal we'll kind of uh show
- 00:29:52you a couple of Basics
- 00:29:55here so if I go into
- 00:29:59um logs once your connectors are up and
- 00:30:02running you can now interact directly
- 00:30:06with the logs that are um being imported
- 00:30:11so for example if I kind of look at the
- 00:30:13schema here I've got my audit logs my
- 00:30:16signin logs my URL click events so if
- 00:30:20somebody clicks on a link in their email
- 00:30:24we have a record of that link click and
- 00:30:26that could be really really useful when
- 00:30:29we're trying to scope a incident
- 00:30:31response you know how many other people
- 00:30:33clicked on that same link uh we'll show
- 00:30:36you how to identify
- 00:30:38that so we're looking at all the logs
- 00:30:41that the data connectors are bringing
- 00:30:43into
- 00:30:44Sentinel and then uh so these are kind
- 00:30:47of the raw tables that you can actually
- 00:30:50you know query against natively now what
- 00:30:52are some examples of uh of a query well
- 00:30:56if I'm querying like the um
- 00:30:58security uh incidents um so you put in
- 00:31:01the name of the table you put in this
- 00:31:03pipe command kind of like Powershell
- 00:31:05right and then I can use something like
- 00:31:07count right now how would I know uh the
- 00:31:11syntax um you know how would I know how
- 00:31:13to uh how this all works there is a
- 00:31:17simple mode so I don't have to know
- 00:31:19necessarily the query language I can go
- 00:31:21to simple mode and this actually allows
- 00:31:23me to build out a query um using the uh
- 00:31:27the query Builder so I can actually just
- 00:31:30kind of select a table so I'll pick you
- 00:31:32know audit logs I can then um you know
- 00:31:36just jump in here and actually interact
- 00:31:37with uh simple mode in in this way so I
- 00:31:40can actually change okay I want the last
- 00:31:4230 minutes and I want to do uh limits
- 00:31:46and I want to add some filters so I can
- 00:31:48maybe do some
- 00:31:49aggregation um here maybe I want to uh
- 00:31:52sum a particular um or grab a particular
- 00:31:57uh
- 00:31:58display name and do a count by that
- 00:32:01right so if you don't know the kql
- 00:32:05syntax the simple mode is new it allows
- 00:32:07you to kind of add your own filter in
- 00:32:09kind of like an Excel
- 00:32:11spreadsheet if you want to learn a
- 00:32:13little bit more about Sentinel um we've
- 00:32:17uploaded a couple of uh resources so one
- 00:32:19of the resources that we put was this
- 00:32:22PowerPoint that we're actually going
- 00:32:23through and on one of the slides here uh
- 00:32:28are some of the resources to learn custo
- 00:32:30query language so uh there's a great
- 00:32:33resource Rod Trent must learn kql link
- 00:32:38um there's a kind of a gamified site
- 00:32:40that uh is called kc7 Cy cyber so
- 00:32:43patriate is actually a corporate sponsor
- 00:32:46uh we pay for the uh Azure costs uh for
- 00:32:50this and it allows you to kind of go in
- 00:32:51there kind of like a capture the flag
- 00:32:53game to learn kql really fantastic uh
- 00:32:57for security operations folks that need
- 00:32:59to learn custo query language and then
- 00:33:02uh kind of the deao standard of learning
- 00:33:04kql is this book that came out called
- 00:33:06the definitive guide to uh kql which you
- 00:33:08can you can get on
- 00:33:11U on Amazon but uh let me go ahead and
- 00:33:14show you uh an example of uh the first
- 00:33:19one the must learn kql so when you uh
- 00:33:21and I'll put this in the chat here for
- 00:33:23you as
- 00:33:24well for you to navigate to
- 00:33:28okay that is now in the in the
- 00:33:31chat so you know must learn kql so I
- 00:33:34showed you the count operator you know
- 00:33:36we had just used that so um you can
- 00:33:38either read the article or you can watch
- 00:33:40the video um but if I click on the count
- 00:33:43operator I can scroll down and he's got
- 00:33:46he explains the syntax of how the
- 00:33:48account operator is used and uh you know
- 00:33:51how exactly that
- 00:33:53functions um you know really nice
- 00:33:55samples right so I can actually you know
- 00:33:58grab the sample here I can copy that and
- 00:34:01I could just paste that right in uh in
- 00:34:04kql
- 00:34:05mode so I'm going to go and run
- 00:34:08that and uh so it's uh me go ahead and
- 00:34:15clear okay security event so security
- 00:34:18event is a table for on premise active
- 00:34:20directory which I'm not bringing into
- 00:34:21this lab but if I want to get into uh
- 00:34:25you know the sign and logs
- 00:34:28where the result uh
- 00:34:32type Z summarize
- 00:34:36count or just
- 00:34:43count so last 24 hours 16,000 you know
- 00:34:46successful so zero is is
- 00:34:49Success um another type of successful
- 00:34:52signin is actually um the uh keep me
- 00:34:57signed
- 00:34:59in so keep me signed in is a uh is an
- 00:35:03event
- 00:35:11of
- 00:35:135014 and that's kind of important
- 00:35:15because if you're only querying on zero
- 00:35:17which are successful signin but you're
- 00:35:19not querying on keep me signed in events
- 00:35:21you actually won't get the full um uh
- 00:35:24count so 16776 and I run that again
- 00:35:2916806 so you could see there there would
- 00:35:31have been additional sign-ins I would
- 00:35:33have missed so there are there is some
- 00:35:35kind of inside baseball you need to know
- 00:35:37uh when you're acquiring specific log
- 00:35:39tables now how would you know that you
- 00:35:43need to essentially be very comfortable
- 00:35:45with this uh take 10 operator so take 10
- 00:35:49allows you to quer a table and get the
- 00:35:52first 10 rows and then you can kind of
- 00:35:53inspect the content of that data right
- 00:35:57so I can now get much more familiar with
- 00:36:00um you know every uh element uh that's
- 00:36:04in there and then another kind of tip is
- 00:36:07if you're not familiar with the
- 00:36:08different type of uh
- 00:36:11Fields uh for a particular column you
- 00:36:15can
- 00:36:15summarize
- 00:36:17um the the column using um or using the
- 00:36:22summarize function you can actually
- 00:36:24summarize a column and it will give you
- 00:36:26okay 16 ,000 signin that were successful
- 00:36:30but what are all these other you know
- 00:36:31event
- 00:36:33types well we can actually find out by
- 00:36:36adding the result
- 00:36:39description so now we can actually uh
- 00:36:42get to know our table a little bit
- 00:36:43better
- 00:36:45right so we've got you know a
- 00:36:48conditional access policy required a
- 00:36:49compliant device okay that's that's uh
- 00:36:52code
- 00:36:53530000 so again this allows you to kind
- 00:36:56of explore with it a little bit um once
- 00:37:00you um understand uh the kql and let's
- 00:37:04say you wanted to get a signin result uh
- 00:37:08where the
- 00:37:11location uh was like in in Russia or
- 00:37:15something right so you can actually
- 00:37:19uh do something where we go back so
- 00:37:22where the time generated is greater than
- 00:37:25say
- 00:37:2790 days
- 00:37:31ago and we want to maybe um where the
- 00:37:35location is equal to
- 00:37:40Russia now we'll get a couple hits here
- 00:37:44uh but it's important to find out if
- 00:37:45these are successful hits so we have
- 00:37:47three hits three signin signin attempts
- 00:37:50in the last 90 days from Russia but we
- 00:37:52need to find out you know are those
- 00:37:55successful or not so now we add that
- 00:37:57summarized to the
- 00:38:03end and so here we can see those three
- 00:38:06signin attempts from Russia are invalid
- 00:38:09password attempts so there were attempts
- 00:38:11but they uh failed to successfully sign
- 00:38:13in so now you might you know take
- 00:38:17that and maybe you actually go to your
- 00:38:20analytic
- 00:38:21Rule and you want to create a new
- 00:38:23analytic rule
- 00:38:27Whenever there are you know successful
- 00:38:31signin from Russia so you go next paste
- 00:38:36your syntax in
- 00:38:38here where the
- 00:38:41result uh
- 00:38:46type is zero or
- 00:38:51result
- 00:38:53type is
- 00:38:555014 keep me signed in
- 00:38:58okay and then you map um the resulting
- 00:39:03entities so that later on when we show
- 00:39:05you um the investigation you want to be
- 00:39:08able to map um The Entity ID uh to a
- 00:39:13user so that it actually shows up um for
- 00:39:17the person investigating
- 00:39:19it these are princip
- 00:39:23okay you would click next and you'd
- 00:39:25schedule this to run and then this would
- 00:39:27send you an alert anytime that that
- 00:39:29happened so that's that's an example of
- 00:39:31you know the benefit um of working with
- 00:39:35the logs and the kql building those
- 00:39:36analytic rules um you know at Patriot
- 00:39:39we've actually built over 200 of our own
- 00:39:43Uh custom
- 00:39:44rules um because based on our testing
- 00:39:48even though the outof the boox ones are
- 00:39:49pretty good when you actually use the
- 00:39:51miter attack to kind of map out where
- 00:39:54your holes are this is effectively kind
- 00:39:57of showing you show me all of my
- 00:39:59analytic rules and how does that relate
- 00:40:01to the coverage of minor attack right
- 00:40:05you'll notice that the outof thebox
- 00:40:07rules there's a gap on maybe um
- 00:40:10detecting interprocess communication or
- 00:40:12shared modules or browser extensions so
- 00:40:16this would kind of inform your team okay
- 00:40:19maybe we need to write an analytic rule
- 00:40:21where a browser extension is getting
- 00:40:23abused or where a bits job is firing you
- 00:40:27know bits jobs can be used to download
- 00:40:29content from the internet as a dropper
- 00:40:31to bring in Mau onto an endpoint so
- 00:40:34that's why we had to build our own Uh
- 00:40:36custom analytic rules to kind of fill
- 00:40:38some of these
- 00:40:40gaps so let's kind of take a step back
- 00:40:42here and see where we are um so we
- 00:40:46talked about you know using kql to look
- 00:40:48for you know sign-ins we talked about
- 00:40:50using the uh summarizing count we looked
- 00:40:54at you know detecting sign-ins from
- 00:40:56Russia um this one's kind of
- 00:40:58interesting um show me where people
- 00:41:02traveled uh to two different countries
- 00:41:05in the same day and in this particular
- 00:41:08case you can also look for specific
- 00:41:10countries as
- 00:41:12well uh you can also look for email
- 00:41:14events uh so this one might be kind of
- 00:41:16interesting uh show me all the email
- 00:41:18events where um this particular uh
- 00:41:21recipient who had more uh than one or at
- 00:41:25least one attachment or at least uh you
- 00:41:28know one uh hyperlink where a URL was
- 00:41:33clicked and tell me the domain names
- 00:41:36that were clicked
- 00:41:38on so that might be a fun one to kind of
- 00:41:40play with here so we'll go ahead and
- 00:41:43grab that
- 00:41:46syntax and you can follow along too if
- 00:41:49you have uh that data flowing in your
- 00:41:53tenant go to our
- 00:41:56logs to kql
- 00:41:59mode create new query
- 00:42:06here
- 00:42:08okay so a let statement it's kind of
- 00:42:11like a join statement we're basically um
- 00:42:13creating this variable called emails so
- 00:42:16show me all the email events and return
- 00:42:19the network message ID which is the
- 00:42:21unique identifier for the messages where
- 00:42:24Joe received uh an email containing at
- 00:42:26Le at least one attachment and at least
- 00:42:28one hyperlink show me um where those
- 00:42:31were clicked on so where the network
- 00:42:33message ID and this click events table
- 00:42:36is actually from this variable and then
- 00:42:38from that then send it over to the email
- 00:42:41URL info table and uh again show me
- 00:42:46information uh give me the domain names
- 00:42:49uh that were clicked on so you can then
- 00:42:51run
- 00:42:52that and so here's some of the URLs that
- 00:42:55this recipient clicked on so maybe
- 00:42:57clicked on you know um a looks like a
- 00:43:01meeting in teams and and some domains
- 00:43:04and this could be kind of helpful if you
- 00:43:05wanted to know well who else other than
- 00:43:08Joe you know maybe clicked on you know
- 00:43:11one of these uh domains so you can then
- 00:43:15you know basically copy this um
- 00:43:20and you know add an additional wear
- 00:43:23Clause here right so where the uh
- 00:43:29domains it's equal to
- 00:43:33this then you remove the
- 00:43:37recipient So in theory this should tell
- 00:43:40me anyone in the organization who uh
- 00:43:42also clicked on that
- 00:43:45link and uh just just me apparently um
- 00:43:51but yeah so that's the you know an
- 00:43:53example of uh you know interacting with
- 00:43:56identities inter ING with email the
- 00:43:59power of uh this xdr you know Sentinel
- 00:44:02kind of sitting on top of this is that
- 00:44:05you can literally query you can write
- 00:44:07one kql query that can look for an email
- 00:44:10that made it onto an endpoint where the
- 00:44:13identity was then compromised so you
- 00:44:15could actually construct a kql to query
- 00:44:18all those tables uh in the same uh query
- 00:44:21and then build an analytic role to you
- 00:44:23know send you an alert when that occurs
- 00:44:26um so when when an incident is created
- 00:44:29uh you're going to find that in Sentinel
- 00:44:31uh so if you're a sock analyst you're
- 00:44:33going to work most of your day is going
- 00:44:34to be over here in
- 00:44:36incidents so here's a couple incidents
- 00:44:38that were created so you know in
- 00:44:40incident handling basic um you might
- 00:44:43come in here and say okay well here's a
- 00:44:46multi-stage incident on an
- 00:44:49endpoint so as a as an analyst um here's
- 00:44:52the entities that I was showing you
- 00:44:54during the analytic rule creation that
- 00:44:56you map so it's kind of important when
- 00:44:58you're writing a kqu query that you map
- 00:45:01that to an entity so that the analysts
- 00:45:04when they're looking at it they can very
- 00:45:05quickly summarize you know what's
- 00:45:07involved okay there's the desktop
- 00:45:09involved they can click on it learn more
- 00:45:11information about that desktop so if I
- 00:45:14go to view full details
- 00:45:17here I can see what's involved so all
- 00:45:20the entities uh in this incident are
- 00:45:23going to be shown here in a list so I
- 00:45:25can quickly kind of see okay okay
- 00:45:27there's this there's a process a file
- 00:45:30hash and a hyperlink but what's kind of
- 00:45:32the full story like what actually
- 00:45:34happened here um now you could you could
- 00:45:37click investigate and it will kind of
- 00:45:38give you a big picture so especially if
- 00:45:40there's you know multiple machines
- 00:45:42involved you can kind of see you know um
- 00:45:45how everything was kind of connected
- 00:45:46that's kind of helpful and and for each
- 00:45:48of these things you know you can
- 00:45:49actually um drill in and correlate and
- 00:45:53and query off that data um you can uh
- 00:45:57kind of do quite a bit of pivoting here
- 00:45:58too in an investigation but what what we
- 00:46:01often do is we like to investigate this
- 00:46:05in the defender xdr
- 00:46:08portal and um I think less than a year
- 00:46:12ago this portal got unified with
- 00:46:15Sentinel so that you no longer really
- 00:46:18start your day in Sentinel anymore you
- 00:46:21basically start your day in this xdr
- 00:46:23portal that way you don't have to click
- 00:46:26on this button investiga and Defender
- 00:46:28because that would mean you'd have to
- 00:46:29swap back and forth between your xdr
- 00:46:32software and the Sim now you can stay in
- 00:46:35xdr and you'll notice that uh Sentinel
- 00:46:39is now natively integrated inside of the
- 00:46:43Microsoft Defender xdr portal so I can
- 00:46:46work all of my incidents now in this
- 00:46:49unified portal I don't have to come back
- 00:46:51here I can actually stay here um back to
- 00:46:54this event so if I click on these URLs
- 00:46:57and and go okay well what is qq.com
- 00:46:59right so I I looked it up um it's
- 00:47:02actually a uh a Chinese kind of instant
- 00:47:05messaging uh software but why is this
- 00:47:10Intel uh you know process involved in
- 00:47:13communicating uh with this so if you
- 00:47:15click on the actual you know attack
- 00:47:17story um so there's a UR all um you know
- 00:47:22uh visited there's uh communication here
- 00:47:25but if I want to really in and this is
- 00:47:28really the power of the xdr and and
- 00:47:30really kind of a different you know
- 00:47:33um uh you know story here but if if I
- 00:47:36wanted to actually uh you know see more
- 00:47:39details about the process and and uh you
- 00:47:43know investigate this you're able to um
- 00:47:46click on this and then you'll be able to
- 00:47:48see that this process launched uh but
- 00:47:51then the network filter um detected this
- 00:47:57communication and then it was blocked
- 00:48:00which is cool right it's great that the
- 00:48:02xdr software didn't like the fact that
- 00:48:05this process attempted to make an
- 00:48:07outbound communication with uh a pretty
- 00:48:10weird you know um you know uh
- 00:48:14Chinese uh you know uh service the a
- 00:48:19instant messaging
- 00:48:20service now from here you could run a
- 00:48:23Playbook and this would be a good segue
- 00:48:26over to Lamar
- 00:48:27if I run this Playbook that allows me to
- 00:48:30maybe kick off a isolation right where I
- 00:48:33can isolate this endp point technically
- 00:48:35I can do it here as well um if I go back
- 00:48:38um into the uh device I can click on the
- 00:48:43uh
- 00:48:45actions and I can uh click on isolate
- 00:48:49device so I could do it right here but
- 00:48:51if I had a Playbook of maybe other steps
- 00:48:53like maybe I wanted to you know create
- 00:48:56ticket in my service now or or My
- 00:48:59ticketing system send a teams message
- 00:49:02maybe there's a bunch of things I I
- 00:49:03always want to do that's why we call it
- 00:49:05a Playbook um for sure I could isolate
- 00:49:08it here or I can run this kind of uh
- 00:49:10sequence of
- 00:49:11events um and so those um the automation
- 00:49:15rules inside of Sentinel you know they
- 00:49:18can be used to suppress noisy alerts but
- 00:49:20they can also be used uh to run
- 00:49:22playbooks so where you would find that
- 00:49:25in Sentinel is if you go back out to
- 00:49:30automation you'll notice that Sentinel
- 00:49:33comes with a bunch of kind of templetes
- 00:49:34here so you don't have to create them
- 00:49:36from scratch right so you can actually
- 00:49:39enrich the incident with virus total
- 00:49:41information so I don't have to then
- 00:49:43leave and browse to a different site to
- 00:49:45look up uh qq.com I can look up the IP
- 00:49:48and abuse
- 00:49:50ipdb um I can send an email I could um
- 00:49:55you know block the user from signing in
- 00:49:58I can revoke their signin
- 00:50:00sessions um or I can create my own kind
- 00:50:02of custom automation rule but Lamar um
- 00:50:05let me hand it over to you maybe a quick
- 00:50:07demo of uh you know a Playbook and kind
- 00:50:10of what that looks
- 00:50:12like perfect sounds good
- 00:50:15Joe me cue that up
- 00:50:21here so with automation there's really
- 00:50:24there's kind of two components to it you
- 00:50:26have what are the automation rules
- 00:50:29automation rules I consider these your
- 00:50:32orchestration so what things do we want
- 00:50:34to happen automatically and under what
- 00:50:37conditions so for example if we were to
- 00:50:40say um you know we want something to run
- 00:50:44when an incident is created uh the
- 00:50:46severity is
- 00:50:48High um you can get as specific as you
- 00:50:50want here with your conditions you could
- 00:50:53also do um you know title
- 00:50:57contains uh
- 00:51:00aitm or in the middle right you could be
- 00:51:04real specific as to when you want this
- 00:51:06to fire off automatically then you have
- 00:51:09the actions that it can do so the most
- 00:51:11powerful one is run Playbook aside from
- 00:51:14that one these other ones are things
- 00:51:15that happen within the Sentinel incident
- 00:51:17itself you can change the status
- 00:51:19severity owner Etc but in this case we'd
- 00:51:22want to say run a Playbook and I'll show
- 00:51:23you a little bit more about playbooks in
- 00:51:25a sec um but the point I want to make
- 00:51:27here is that you you can run multiple
- 00:51:30playbooks in a row as well so that
- 00:51:32really shows the power of that
- 00:51:33orchestration so maybe we want to uh
- 00:51:37block the user and then we also want to
- 00:51:40revoke the the sessions right so we want
- 00:51:43to do both of those in sequence when
- 00:51:45something like this happens you also
- 00:51:48have um when this rule expires if you
- 00:51:50want to put that and the order they do
- 00:51:52fire off in order and any rule that
- 00:51:54meets the criteria of your conditions
- 00:51:56will will be fired off so again
- 00:52:00automation is that orchestration what
- 00:52:02happens and when
- 00:52:03automatically your playbooks are more of
- 00:52:06that containerized uh logic flow of
- 00:52:09things that you want to happen so you
- 00:52:12get more more complex and more uh Rich
- 00:52:16type of uh responses in here so for
- 00:52:19example if you want to look in here I
- 00:52:21have a a couple examples I like to
- 00:52:23Tinker in here quite a bit so there's
- 00:52:26this one here Defender but let's say we
- 00:52:29want to isolate the device and run
- 00:52:31antivirus scan in one
- 00:52:34step so you can set that up so the nice
- 00:52:38thing is that Sentinel uh playbooks are
- 00:52:40built on logic apps from Azure it's a
- 00:52:43wellestablished well-known platform been
- 00:52:45around for many years so the fact that
- 00:52:47Sentinel can leverage that is amazing so
- 00:52:50we have a a very mature automation
- 00:52:52platform here has all sorts of things
- 00:52:55you could do for each loops on each
- 00:52:57incident you could do conditions so you
- 00:53:00could see I built this one out with a
- 00:53:01little bit of error handling so if if
- 00:53:04any of these steps fail then I have a a
- 00:53:06branch that would then add comments to
- 00:53:09the incident letting me know what was
- 00:53:11succeeded what failed and sending an
- 00:53:13email down at the
- 00:53:15bottom and to your point Joe you can
- 00:53:17also integrate many other third parties
- 00:53:19in here so if I wanted to create
- 00:53:22something in itsm you know we have jira
- 00:53:25we have uh server it's
- 00:53:27now um if we wanted to uh send any type
- 00:53:32of email or teams or if we're using
- 00:53:34slack instead of
- 00:53:36teams um there's just tons and tons of
- 00:53:38Integrations out there since this has
- 00:53:40been around for so long so this is one
- 00:53:44example this is a kind of a a device
- 00:53:47related
- 00:53:48response there's also things that you
- 00:53:51could do like we we mentioned earlier
- 00:53:53around disabling accounts resetting
- 00:53:55passwords
- 00:53:57um sending emails sending teams messages
- 00:54:01so really disguise the limit on what you
- 00:54:03can do here with u
- 00:54:05playbooks no it's it's it's really a
- 00:54:08great kind of walk through um I think
- 00:54:11what's what's great is that uh senel is
- 00:54:13pretty um affordable compared to third
- 00:54:16party Solutions where you have to buy a
- 00:54:17separate security
- 00:54:19orchestration you know service and try
- 00:54:21to integrate that plug that in this is
- 00:54:23all just
- 00:54:24natively you know inside of uh Sentinel
- 00:54:27so it's it's super clean right um so let
- 00:54:31me let me go ahead and kind of wrap it
- 00:54:33up a little bit here today and
- 00:54:36definitely want to you know thank
- 00:54:38everyone for attending if you again if
- 00:54:40you have any questions please shoot us
- 00:54:41an email and hope you all have a
- 00:54:43wonderful day
- Microsoft Sentinel
- SIEM
- XDR
- Automation
- Log Analytics
- KQL
- Data Connectors
- Incident Management
- Cybersecurity
- Threat Detection