What Is Azure Sentinel - Microsoft Docs
What Is Azure Sentinel - Microsoft Docs
This service supports Azure Lighthouse, which lets service providers sign in to their
own tenant to manage subscriptions and resource groups that customers have
delegated.
Workbooks
After you connected your data sources to Azure Sentinel, you can monitor the data
using the Azure Sentinel integration with Azure Monitor Workbooks, which provides
versatility in creating custom workbooks. While Workbooks are displayed differently in
Azure Sentinel, it may be useful for you to see how to Create interactive reports with
Azure Monitor Workbooks. Azure Sentinel allows you to create custom workbooks
across your data, and also comes with built-in workbook templates to allow you to
quickly gain insights across your data as soon as you connect a data source.
Analytics
To help you reduce noise and minimize the number of alerts you have to review and
investigate, Azure Sentinel uses analytics to correlate alerts into incidents. Incidents are
groups of related alerts that together create an actionable possible-threat that you can
investigate and resolve. Use the built-in correlation rules as-is, or use them as a starting
point to build your own. Azure Sentinel also provides machine learning rules to map
your network behavior and then look for anomalies across your resources. These
analytics connect the dots, by combining low fidelity alerts about different entities into
potential high-fidelity security incidents.
Investigation
Currently in preview, Azure Sentinel deep investigation tools help you to understand the
scope and find the root cause, of a potential security threat. You can choose an entity on
the interactive graph to ask interesting questions for a specific entity, and drill down into
that entity and its connections to get to the root cause of the threat.
Hunting
Use Azure Sentinel's powerful hunting search-and-query tools, based on the MITRE
framework, which enable you to proactively hunt for security threats across your
organization’s data sources, before an alert is triggered. After you discover which
hunting query provides high-value insights into possible attacks, you can also create
custom detection rules based on your query, and surface those insights as alerts to your
security incident responders. While hunting, you can create bookmarks for interesting
events, enabling you to return to them later, share them with others, and group them
with other correlating events to create a compelling incident for investigation.
Community
The Azure Sentinel community is a powerful resource for threat detection and
automation. Our Microsoft security analysts constantly create and add new workbooks,
playbooks, hunting queries, and more, posting them to the community for you to use in
your environment. You can download sample content from the private community
GitHub repository to create custom workbooks, hunting queries, notebooks, and
playbooks for Azure Sentinel.
Next steps
To get started with Azure Sentinel, you need a subscription to Microsoft Azure. If
you do not have a subscription, you can sign up for a free trial.
Learn how to onboard your data to Azure Sentinel, and get visibility into your data,
and potential threats.