Threat Hunting with Azure Sentinel
Manage Azure Sentinel Threat-Hunting Queries
Hunt by using built-in queries
The Hunting page also provides a list of all hunting queries that can be saved by selecting the Favorites star icon for the query in the list.
Hunt for Threats by Using the MITRE ATT&CK Framework
- Initial access- Tactics that the adversary uses to gain entry to a network, by exploiting vulnerabilities or configuration weaknesses in public-facing systems. An example is targeted spear-phishing.
- Execution- Tactics that results in an adversary running their code on a target system. For example, a malicious hacker might run a PowerShell script to download more attacker tools and/or scan other systems.
- Persistence- Tactics that allow an adversary to maintain access to a target system, even after restarts and credential changes. An example of a persistence technique is an attacker who creates a scheduled task that run their code at a specific time or on restart.
- Privilege escalation- Tactics that an adversary uses to gain higher-level privileges on a system, such as local administrator or root.
- Defense evasion- Tactics that attackers use to avoid detection. Evasion tactics includes hiding malicious code within trusted processes and folders, encrypting or obfuscating adversary code, or disabling security software.
- Credential access- Tactics deployed on systems and networks to steal usernames as well as credentials for reuse.
- Discovery- Tactics that adversaries use to obtain information about systems and networks that they want to exploit or use for their tactical advantage.
- Lateral movement- Tactics that allows an attacker to move from one system to another within a network. Common techniques include pass-the-hash methods of authenticating users and abuse of the Remote Desktop Protocol.
- Collection- Tactics that an adversary uses to gather and consolidate the information they were targeting as part of their objectives.
- Command & control- Tactics that an attacker uses to communicate with a system under their control. One example is an attacker communicating with a system over an uncommon or high-numbered port to evade detection by security appliances or proxies.
- Exfiltration- Tactics used to move data from the compromised network to a system or network that's fully under control of an attacker.
- Impact- Tactics that an attacker uses to affect the availability of systems, networks, and data. Methods in this category include denial-of-service attacks and disk-wiping or data-wiping software.
Save Key Findings with Bookmarks
Hunt by using bookmarks
You can revisit your bookmarked data at any time on the Bookmarks tab of the Hunting page and can use filtering and search options to quickly find specific data for your current information. Alternatively, you can also review your bookmarked data directly in the HuntingBookmark table in your Log Analytics workspace.
Note- Bookmarked events contains standard event information but can be used in different ways throughout the Azure Sentinel interface.
Observe Threats Overtime with Livestream
Hunting livestream can be used to test queries against live events as they occur which offers interactive sessions that can notify you whenever the Azure Sentinel finds matching events for your query. You can use a livestream to:
- Test new queries against live events.
- Generate notifications for threats.
- Launch investigations.
Comments
Post a Comment