Security Incident Management in Azure Sentinel
Incident Management in Azure Sentinel
- detailed incident information,
- assign an incident owner,
- set and maintain incident severity,
- and manage incident status.
Explain Evidence & Entities
Various sources of security information are extensively used by Azure Sentinel to create incidents and as the lead system engineer at Contoso, there will always be a need to understand these sources to the best utilization of incident management in Azure Sentinel.
Incident Evidence
Incident evidence provides security event information and related Azure Sentinel assets that can identify threats in the Azure Sentinel environment. They can display how a threat has been identified in Azure Sentinel as well as link you back to the specific resources that can be used to increase your awareness of incident details.
Events
Events links you back to one or more events from the Log Analytics workspaces associated with Azure Sentinel. These workspaces are composed of thousands of events that are too many to manually parse. If a query returns the events which are attached to Azure Sentinel analytics rules, they can be easily attached to the generated incident for further review while also using the events to understand the scope and frequency of the incident before investigating further.
Alerts
Most of the incidents are generated because of an analytics rule alert, for examples detection of suspicious files, detection of suspicious user activities, and attempted elevation of privilege. Alerts can be generated by Analytics rules, are either based on KQL queries or direct connection to Microsoft Security solutions such as Azure Security Center or Microsoft Defender 365. If alert grouping is enabled, then Azure Sentinel can include any related alert evidence for incident.
Bookmarks
If you want to identify the events that you need to track or mark for later investigation while investigating an incident, then you can easily preserve the queries run in Log Analytics by choosing one or more events and designating them as bookmarks while also recording notes and tag them to better inform later threat-hunting processes. Bookmarks are available to both you and your teammates.
Incident Entities
- Account
- Host
- IP
- URL
- FileHash
Entities can help you identify all of the alerts associated with a specific user at Contoso, the user's host machine, and other hosts connected to the user.
Manage Incident Ownership, Status, & Severity
- Set and track the status of an incident from creation to resolution.
- Set and review severity.
- Assign and track ownership for the incident.
Ownership
Status
- True Positive: Suspicious activity
- Benign Positive: Suspicious but expected
- False Positive: Incorrect alert logic
- False Negative: Incorrect data
- Undetermined
Comments
Post a Comment