Perform Threat hunting in Azure Sentinel
CyberSecurity Threat Hunting
Other uses of the term hunting includes searching for threats with newly obtained indicators. If a new IP Address considered harmful is provided by a Threat Intelligence Feed, an analyst can then note the IP address to search the log to find if the new indicator was seen in the past. Azure Sentinel already provides hunting queries to facilitate this process.Next, you can hunt for more evidence-based threats from a current Incident or Alert as part of an Incident Analysis Process which is vital to explore the data based on the evidence found in a current incident. Both Azure Sentinel and Microsoft 365 Defender provides this type of hunting capability.
Using KQL queries to find threats is the only thing common in all these approaches. Microsoft Defender and Microsoft Defender Endpoint are more focused on indicator and analysis type of hunting while Azure Sentinel provides more features to manage the threat hunting process.
Proactive hunts
Process to hunt threats
- Setting up new monitoring.
- Improving our detection capabilities.
- What, How, and Why
- Input and Output
- How to replicate the hunt
- Next steps
Develop Threat Hunting Hypothesis
- Keep it achievable- Don't perform a hunt where you know you have no hope of finding results because you don't have the data available or have insufficient knowledge about the threat to understand how to find it.
- Keep the scope narrow- Avoid broad a hypothesis such as "I am going to hunt for strange log-ons". Such a hypothesis fails to define what the results could mean.
- Keep it time-bound- The time-bound is also used in documentation. If you time-bound your hunts there is a chance you will end up just repeating the same hunt on the same dataset. You will be able to say,"I did this hunt, at this time, covering this period". With this documented your team members will know what period was hunted for with this hypothesis.
- Keep it useful & efficient- A good SOC team typically has a good idea about where their coverage is good and where it is weaker as well as needs improvement. There is no point in hunting fro an advanced threat that targets an industry you are not in or a platform you are not using.
- Keep it related to the threat model that you are defending against- Otherwise, you may spend much time threat hunting for things that you will never find and which are not a threat.
You should not start your Threat Hunting journey going after the most advanced threats, but you should start with the basics and incrementally mature your organization's Threat Hunting capabilities. You should always start with a simple Hunt Hypothesis and then gradually increase your capabilities.
Comments
Post a Comment