Use case: Incident response and remediation
About
Junior, entry-level, or Tier-1 analysts can benefit from Security Copilot's assistance in more effectively and efficiently evaluating as well as handling situations. This use case includes remediation and incident analysis.
Steps
- Let's assume, the high-severity event named Multistage incident including initial access and lateral movement on many endpoints reported by several sources correlates to 25 alarms from different Microsoft security solutions in a Microsoft Defender XDR incident queue. Four people, three devices, and one email account are all involved.
- To view the attack story, navigate to the incident page. A summary of the incident and a few actions under guided reaction are automatically generated at the Security Copilot pane on the right side of the attack tale.
- Read Security Copilot's summary to gain a general understanding of what happened. Choose Copy to clipboard from the options menu to copy the incident summary and then paste it into a different document. This is helpful for the required report because it is already arranged per attack phase and emphasizes the key elements of the attack. You would have to create the report from start if you didn't have Security Copilot.
- It is then simple to ascertain that there were several attacks involved in the complicated affair. Go through each attack phase as described in initial Access, Discovery, and Defense Evasion.
- Select Open in Security Copilot from the Copilot pane to ask about the attacks.
- After gaining information of the attack, return to Defender XDR and look at the suspected attack more closely. Ask the standalone Security Copilot, if its behavior is considered typical. With Security Copilot's response it can be confirmed whether it is a true security incident that needs further investigation by the Tier 2 team or not.
- To investigate the script, consult Security Copilot. It will identify the encoded command and decode it for you. The use of encoding to obfuscate the command could be a sign of malicious activity.
- You can revisit the Guided response in the Security Copilot pane on the incident page when you become more certain that this is a real security issue to figure out what you can do to stop or lessen the attack.
Conclusion
Making use of Security Copilot for analysts assigned to look into and fix significant incidents involving numerous alerts and entities, Copilot can offer a number of efficiency advantages. Understanding the attack overview, analyzing malicious scripts, contextualizing named attacks, and taking the required actions to eliminate the threat are all made easier with its assistance.
Comments
Post a Comment