Use Case: Triage Incidents Based-on Enrichment from Threat Intelligence
Scenario
Steps
- Start with Security Copilot. Retrieve the latest assigned Microsoft Defender XDR incident and summarize the alerts associated with it.
Prompt used:
What is the latest active Defender incident assigned to me ? Summarize it, including the alerts associated with it.
- Focus in on specific entities to get more information about them.
Prompt used:
Elaborate on the details of this alert including the entities involved.
- Get more information to guide next steps. What type of actions might be next for someone with her credentials ?
Prompt used:
Tell me more about the user entity.
- Use a saved hunting query to correlate entities with Sentinel incidents.
Manually activate the suggested prompt for the Natural language to Sentinel KQL plugin to run the query.
- Pivot the investigation to the SAP incident associated with the user from the original alert.
Prompt used:
Elaborate on Sentinel incident and give details about the entities.
- Find out more about the IP address entity and examine how it was determined to be malicious. (if any).
Prompt used:
Give me more details about the IP address and why is it malicious ?
- Create a summary report.
Saved time in the escalation process with a summary for leadership and incident response teams.
Prompt used:
Write a report based on this investigation. Lead with your assessment of the original Defender incident and whether the threat of credential theft is real. Conclude your assessment on how that threat relates to the Sentinel incident regarding the file downloaded to a malicious IP.
- Pin the most useful prompts responses and edit the session name.
You have reached your goal and determined the assigned Microsoft Defender XDR incident is a real threat. By linking it to a Microsoft Sentinel incident involving an exfiltrated SAP file, you can prepare to collaborate with your escalation team.
Comments
Post a Comment