Best practices for Microsoft Sentinel (2024)

  • Article

Best practice guidance is provided throughout the technical documentation for Microsoft Sentinel. This article highlights some key guidance to use when deploying, managing, and using Microsoft Sentinel.

Important

Microsoft Sentinel is now generally available within the Microsoft unified security operations platform in the Microsoft Defender portal. For more information, see Microsoft Sentinel in the Microsoft Defender portal.

Setting up Microsoft Sentinel

Start with the deployment guide for Microsoft Sentinel. The deployment guide covers the high level steps to plan, deploy, and fine-tune your Microsoft Sentinel deployment. From that guide, select the provided links to find detailed guidance for each stage in your deployment.

Microsoft security service integrations

Microsoft Sentinel is empowered by the components that send data to your workspace, and is made stronger through integrations with other Microsoft services. Any logs ingested into products, such as Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, and Microsoft Defender for Identity, allow these services to create detections, and in turn provide those detections to Microsoft Sentinel. Logs can also be ingested directly into Microsoft Sentinel to provide a fuller picture for events and incidents.

For example, the following image shows how Microsoft Sentinel ingests data from other Microsoft services and multicloud and partner platforms to provide coverage for your environment:

Best practices for Microsoft Sentinel (1)

More than ingesting alerts and logs from other sources, Microsoft Sentinel also:

  • Uses the information it ingests with machine learning that allows for better event correlation, alert aggregation, anomaly detection, and more.
  • Builds and presents interactive visuals via workbooks, showing trends, related information, and key data used for both admin tasks and investigations.
  • Runs playbooks to act on alerts, gathering information, performing actions on items, and sending notifications to various platforms.
  • Integrates with partner platforms, such as ServiceNow and Jira, to provide essential services for SOC teams.
  • Ingests and fetches enrichment feeds from threat intelligence platforms to bring valuable data for investigating.

For more information about integrating data from other services or providers, see Microsoft Sentinel data connectors.

Consider onboarding Microsoft Sentinel to the Microsoft Defender portal to unify capabilities with Microsoft Defender XDR like incident management and advanced hunting. For more information, see the following articles:

  • Connect Microsoft Sentinel to Microsoft Defender XDR
  • Microsoft Sentinel in the Microsoft Defender portal

Incident management and response

The following image shows recommended steps in an incident management and response process.

Best practices for Microsoft Sentinel (2)

The following table provides high-level descriptions for how to use Microsoft Sentinel features for incident management and response. For more information, see Investigate incidents with Microsoft Sentinel.

CapabilityBest practice
IncidentsAny generated incidents are displayed on the Incidents page, which serves as the central location for triage and early investigation. The Incidents page lists the title, severity, and related alerts, logs, and any entities of interest. Incidents also provide a quick jump into collected logs and any tools related to the incident.
Investigation graphThe Incidents page works together with the Investigation graph, an interactive tool that allows users to explore and dive deep into an alert to show the full scope of an attack. Users can then construct a timeline of events and discover the extent of a threat chain.

Discover key entities, such as accounts, URLs, IP address, host names, activities, timeline, and more. Use this data to understand whether you have a false positive on hand, in which case you can close the incident directly.

If you discover that the incident is a true positive, take action directly from the Incidents page to investigate logs, entities, and explore the threat chain. After you identified the threat and created a plan of action, use other tools in Microsoft Sentinel and other Microsoft security services to continue investigating.

Information visualizationTo visualize and get analysis of what's happening on your environment, first, take a look at the Microsoft Sentinel overview dashboard to get an idea of the security posture of your organization. For more information, see Visualize collected data.

In addition to information and trends on the Microsoft Sentinel overview page, workbooks are valuable investigative tools. For example, use the Investigation Insights workbook to investigate specific incidents together with any associated entities and alerts. This workbook enables you to dive deeper into entities by showing related logs, actions, and alerts.

Threat huntingWhile investigating and searching for root causes, run built-in threat hunting queries and check results for any indicators of compromise. For more information, see Threat hunting in Microsoft Sentinel.

During an investigation, or after having taken steps to remediate and eradicate the threat, use livestream. Livestream allows you to monitor, in real time, whether there are any lingering malicious events, or if malicious events are still continuing.

Entity behaviorEntity behavior in Microsoft Sentinel allows users to review and investigate actions and alerts for specific entities, such as investigating accounts and host names. For more information, see:

- Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel
- Investigate incidents with UEBA data
- Microsoft Sentinel UEBA enrichments reference

WatchlistsUse a watchlist that combines data from ingested data and external sources, such as enrichment data. For example, create lists of IP address ranges used by your organization or recently terminated employees. Use watchlists with playbooks to gather enrichment data, such as adding malicious IP addresses to watchlists to use during detection, threat hunting, and investigations.

During an incident, use watchlists to contain investigation data, and then delete them when your investigation is done to ensure that sensitive data doesn't remain in view.

For more information, see Watchlists in Microsoft Sentinel.

Related content

  • Microsoft Sentinel operational guide
  • On-board Microsoft Sentinel
  • Deployment guide for Microsoft Sentinel
  • Protecting MSSP intellectual property in Microsoft Sentinel
Best practices for Microsoft Sentinel (2024)
Top Articles
Coaching en trading de haute performance
Bohemian Ethnic Style Long Earrings Women
Netronline Taxes
Tesla Supercharger La Crosse Photos
The 10 Best Restaurants In Freiburg Germany
Overnight Cleaner Jobs
craigslist: south coast jobs, apartments, for sale, services, community, and events
Back to basics: Understanding the carburetor and fixing it yourself - Hagerty Media
Meg 2: The Trench Showtimes Near Phoenix Theatres Laurel Park
CSC error CS0006: Metadata file 'SonarAnalyzer.dll' could not be found
Nieuwe en jong gebruikte campers
Syracuse Jr High Home Page
Wnem Radar
Directions To O'reilly's Near Me
D10 Wrestling Facebook
Interactive Maps: States where guns are sold online most
9044906381
Craigslist Panama City Fl
Sport-News heute – Schweiz & International | aktuell im Ticker
Craiglist Kpr
Urban Dictionary: hungolomghononoloughongous
Candy Land Santa Ana
Uta Kinesiology Advising
Quadcitiesdaily
Dallas Mavericks 110-120 Golden State Warriors: Thompson leads Warriors to Finals, summary score, stats, highlights | Game 5 Western Conference Finals
Imouto Wa Gal Kawaii - Episode 2
Elbert County Swap Shop
Egusd Lunch Menu
Mikayla Campinos: Unveiling The Truth Behind The Leaked Content
Medline Industries, LP hiring Warehouse Operator - Salt Lake City in Salt Lake City, UT | LinkedIn
Lindy Kendra Scott Obituary
How To Make Infinity On Calculator
Gasbuddy Lenoir Nc
Gerber Federal Credit
Yoshidakins
10 Most Ridiculously Expensive Haircuts Of All Time in 2024 - Financesonline.com
Usf Football Wiki
Page 5662 – Christianity Today
Alpha Asher Chapter 130
Koninklijk Theater Tuschinski
Temu Y2K
Skip The Games Grand Rapids Mi
Craigs List Palm Springs
18 terrible things that happened on Friday the 13th
Infinite Campus Farmingdale
Weather Underground Corvallis
Emulating Web Browser in a Dedicated Intermediary Box
My Eschedule Greatpeople Me
Unblocked Games 6X Snow Rider
Concentrix + Webhelp devient Concentrix
Craigslist Cars For Sale By Owner Memphis Tn
Marion City Wide Garage Sale 2023
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 5891

Rating: 4.4 / 5 (65 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.