Sentinel & SOAR: Part 1 (2024)

Sentinel & SOAR: Part 1 (2)

Hello there,

Welcome to part 1 of my multi-part series regarding Security Orchestration, Automation & Response (SOAR) within Sentinel. The goal of these blogs is to share the knowledge I’ve acquired over the past couple of years working with automation within Sentinel. I’m going to visit topics like the different identities you can use with playbooks, how to automate your playbook deployment from A to Z and how to properly monitor your automation stack. However, before we dive into the good stuff, we’ll need to bring everyone up-to-speed. That’s what this first blog is for: laying a foundation of knowledge upon which we’ll build in the next couple of blogs.

Most of you’ve probably heard the term SOAR in the hallways, but for those who’re unfamiliar: SOAR stands for Security Orchestration, Automation and Response. Let’s explore those terms a bit further:

· When thinking about orchestration, try to imagine an orchestra: a large collection of different instruments working together in harmony to produce a desired outcome. The same principle applies to security orchestration, the goal is to combine different tools and orchestrate them together in such a way to reach a desired outcome. An example might be to integrate a deception tool with Sentinel or integrating a ticketing system with Sentinel.

· Security automation is exactly what you think it is: automating processes which were previously done manually. These processes can be very simple, like tagging an incident or assigning an owner to an incident, or quite complex, like checking a specific URL and isolating a machine and disabling a user based on the outcome.

· Security response is the concept of providing the analyst with a single view containing all information, so that the analyst can easily plan, manage and respond based on the incident. We can achieve this by integrating different systems, automating incident enrichment and providing the analyst with the perfect tools to respond (playbooks).

Even though it might be quite the challenge to design and implement a proper SOAR approach (and procuring all the required skills within the team), the advantages make it worth the effort: Faster response times and less repetitive work for analysts, allowing them to spend time on incidents which truly matter.

Now that we’re all familiar with the theory it’s time to look at the actual application of those concepts within Sentinel. Sentinel has two components which together deliver the SOAR capabilities: Automation Rules and Playbooks.

· Automation Rules are the simplest and easiest to start with. Automation rules have a defined trigger, some if/and/or statements and then proceed to perform an action. Automation rules mainly have impact within Sentinel: changing properties of incidents like owners, tags, tasks, severities and statuses. However, Automation rules can also perform the action that is the gateway to having an impact outside of Sentinel: triggering Playbooks.

Sentinel & SOAR: Part 1 (3)

· A Playbook is a Logic App with a defined Sentinel trigger (incident, alert, entity). Being a Logic App, playbooks are capable of complex logic and operations which is outside the capabilities of Automation Rules. Playbooks can use loops, conditions, switches, manipulate data and interact with almost everything, as long as there’s an API to talk with.

Sentinel & SOAR: Part 1 (4)

It’s important to remember that you’re going to need both components to implement SOAR within Sentinel. Automation rules will be required to link analytic rules to playbooks, otherwise there’s no mechanism to trigger your playbooks automatically.

Now that we’ve had our introduction to the different components, we’re going to be playing around with them. Playbooks can be automatically triggered by automation rules, but it’s also possible to trigger playbooks manually from the incident page within Sentinel. This can be very handy for testing or when you’ve created a playbook for some action that you only want to run on-demand.

Imagine that you’re responding to an incident and you’ve concluded that the account is in fact compromised. You probably want to disable the user as quickly as possible. Luckily, you can use the example playbook we’ve showed above to do just that. Open up the incident actions and select “Run playbook (Preview)

Sentinel & SOAR: Part 1 (5)

After selecting the action, another panel will open up. Here you can select whichever playbook you want to run. We’re going to run our Disable-AzureADAccount playbook.

Sentinel & SOAR: Part 1 (6)

After clicking the Run button, a notification appears that the playbook is being triggered. Once the playbook has successfully triggered, another pop-up is displayed.

Sentinel & SOAR: Part 1 (7)

Heading over to the Playbook’s resource page, there’s a new entry in the run history. In this example everything went fine and the Playbook’s run has succeeded.

Sentinel & SOAR: Part 1 (8)

Heading over to the account in Azure AD, we’ll find that it has been successfully disabled, thus resolving the immediate threat in our fictional incident.

Sentinel & SOAR: Part 1 (9)

The example above is a very, very simple demonstration of automating processes within Sentinel, but it does show the value. Hopefully the example created more questions then answers, because it skips over a lot of important things.

In the next couple of blogs we’re going to dive into those questions in detail and highlight different elements of automation within Sentinel. Topics we’re going to visit include development of Playbooks, security of said Playbooks, the different identities usable within playbooks, their pro’s/con’s and monitoring your automation stack, thereby allowing for easy troubleshooting. Be sure to keep an eye out for the next entry in this series!

Sentinel & SOAR: Part 1 (2024)

FAQs

What is the difference between SIEM and SOAR? ›

While SIEM primarily focuses on collecting and analyzing security event data, SOAR extends these capabilities through automation, orchestration, and predefined incident response playbooks.

Is Sentinel a SOAR? ›

This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed. Microsoft Sentinel, in addition to being a SIEM system, is also a platform for security orchestration, automation, and response (SOAR).

What does a SOAR do? ›

SOAR stands for security orchestration, automation, and response. SOAR seeks to alleviate the strain on IT teams by incorporating automated responses to a variety of events. A SOAR system can also be programmed to custom-fit an organization's needs.

What is splunk SOAR? ›

Splunk Phantom, renamed to Splunk SOAR, is a security orchestration, automation, and response (SOAR) solution. Security automation involves machine-based execution of security actions to detect, investigate and remediate threats programmatically.

Is Splunk a SIEM or SOAR? ›

Splunk is a big data solution that provides security information and event management (SIEM) capabilities.

Can SOAR work without SIEM? ›

Even in organizations that have a SIEM, their SOAR tool will aggregate alerts from EDR, email protection, cloud security tools, and others—along with receiving incidents that are manually reported. SOAR can work perfectly well without a SIEM because many common use-cases begin from these other alert sources.

What problems does a SOAR solve? ›

SOAR solutions help streamline the process cybersecurity by integrating various processes that detect, analyze and respond to threats. By having data from multiple sources in one place, cyber security teams become faster and more effective in terms of eliminating threats.

Why is SOAR needed? ›

Companies and organizations find value in SOAR because it minimizes the impact of security incidents of all types, while maximizing the value of existing security investments, and reduces the risk of legal liability and business downtime overall.

What are the three reasons SOAR is used? ›

Question 3: Why is SOAR used? To synchronize tools, accelerate response times, reduce alert fatigue, and compensate for the skill shortage gap. To collaborate with other analysts during investigations. To analyze workload, organize an analysts tasks, and allow teams to respond using their own processes.

What is the old name of Splunk SOAR? ›

Splunk Phantom is a Security Orchestration, Automation, and Response (SOAR) system.

Does CrowdStrike have a SOAR? ›

CrowdStrike Falcon® Fusion SOAR, the native security orchestration automation and response (SOAR) capabilities of the CrowdStrike Falcon® platform, frees up valuable time for security analysts and makes investigation and response processes more efficient and effective.

How to configure Splunk SOAR? ›

Install Splunk App for SOAR
  1. Check prerequisites for.
  2. Install Splunk App for SOAR on Splunk Enterprise.
  3. Install Splunk App for SOAR on Splunk Cloud Platform.
  4. Assign roles for Splunk App for SOAR.
  5. Prepare to configure services for.
  6. Connect Splunk App for SOAR to Splunk SOAR.
Mar 5, 2024

What is the primary difference between SIEM and SOAR quizlet? ›

What is the primary difference between SIEM and SOAR? SIEM (Security Information and Event Monitoring Response) can automate security monitoring. SOAR (Security Orchestration Automation) can orchestrate automated responses to an incident according to related workflow.

What is the difference between SIEM SOAR and UEBA? ›

Key Differences Between SIEM, UEBA, and SOAR

While SIEM technology is designed to store the data for a longer duration in a readable format and provides access to report or investigate on them an on-demand basis, SOAR technology works on the processed data or incidents.

What is a SIEM example? ›

SIEM tools parse and enrich raw entries with contextual information to make it readable for humans to analyze. For example, SIEMs break down data into digestible information such as timestamps, event types, source IP addresses, usernames, geolocation data, user context, and more.

What is the difference between SIEM and vulnerability management? ›

Many have heard of SIEM tools but might not discern their differences from Vulnerability Management Tools. While SIEM focuses on real-time monitoring and threat detection, Vulnerability Management Tools concentrate on identifying system weaknesses proactively.

Top Articles
Fixed and Variable Rate Loans: Which Is Better?
Top Bank of America Shareholders
Dragon Age Inquisition War Table Operations and Missions Guide
Joi Databas
What Auto Parts Stores Are Open
Delectable Birthday Dyes
Steve Strange - From Punk To New Romantic
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
What is IXL and How Does it Work?
A Fashion Lover's Guide To Copenhagen
Infinite Campus Parent Portal Hall County
Belle Delphine Boobs
Spartanburg County Detention Facility - Annex I
272482061
Water Days For Modesto Ca
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Shasta County Most Wanted 2022
Copart Atlanta South Ga
Nordstrom Rack Glendale Photos
Satisfactory: How to Make Efficient Factories (Tips, Tricks, & Strategies)
Rural King Credit Card Minimum Credit Score
Busted Newspaper Fauquier County Va
How your diet could help combat climate change in 2019 | CNN
Hannaford To-Go: Grocery Curbside Pickup
Craigs List Tallahassee
Nsa Panama City Mwr
What Is The Lineup For Nascar Race Today
Danielle Ranslow Obituary
Phoenixdabarbie
Marlene2295
Trust/Family Bank Contingency Plan
Bad Business Private Server Commands
Pnc Bank Routing Number Cincinnati
Babbychula
Goodwill Thrift Store & Donation Center Marietta Photos
Best Weapons For Psyker Darktide
Trivago Myrtle Beach Hotels
Ashoke K Maitra. Adviser to CMD's. Received Lifetime Achievement Award in HRD on LinkedIn: #hr #hrd #coaching #mentoring #career #jobs #mba #mbafreshers #sales…
Metro Pcs Forest City Iowa
511Pa
Craigslist en Santa Cruz, California: Tu Guía Definitiva para Comprar, Vender e Intercambiar - First Republic Craigslist
Pa Legion Baseball
Executive Lounge - Alle Informationen zu der Lounge | reisetopia Basics
Ladyva Is She Married
Differential Diagnosis
Myrtle Beach Craigs List
Random Animal Hybrid Generator Wheel
Benjamin Franklin - Printer, Junto, Experiments on Electricity
Tyrone Dave Chappelle Show Gif
Jasgotgass2
Famous Dave's BBQ Catering, BBQ Catering Packages, Handcrafted Catering, Famous Dave's | Famous Dave's BBQ Restaurant
Gainswave Review Forum
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 5989

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.