Lab: Explore Microsoft Sentinel
This lab maps to the following Learn content:
- Learning Path: Describe the capabilities of Microsoft security solutions
- Module: Describe the security capabilities of Microsoft Sentinel
- Unit: Describe threat detection and mitigation capabilities in Microsoft Sentinel
Lab scenario
In this lab, you’ll walk through the process of creating a Microsoft Sentinel instance. You’ll also set up the permissions to ensure access to the resources that will get deployed to support Microsoft Sentinel. Once this basic setup is done you’ll walk through the steps for connecting Microsoft Sentinel to your data sources, set up a workbook, and do a brief walk-through of some of key capabilities available in Microsoft Sentinel.
Estimated Time: 60 minutes
Task 1
Create a Microsoft Sentinel instance
-
You should be at the home page for Azure services. If you previously closed the browser, open Microsoft Edge. In the address bar, enter portal.azure.com, and sign in with your admin credentials.
-
In the blue search box on the top of the page, enter Microsoft Sentinel then select Microsoft Sentinel from the search results.
-
From the Microsoft Sentinel page, select Create Microsoft Sentinel.
-
From the Add Microsoft Sentinel to a workspace page, select Create a new workspace.
- From the basics tab of the Create Log Analytics workspace, enter the following:
- Subscription: leave the default, this is the Azure subscription provided by the Authorized Lab Hoster (ALH).
- Resource group: select SC900-Sentinel-RG. If this resource group is not listed create it by selecting Create new, enter SC900-Sentinel-RG, then select OK.
- Name: SC900-LogAnalytics-workspace.
- Region: East US (A different default region may be selected based on your location)
- Select Review + Create (no tags will be configured).
- Verify the information you entered then select Create.
- It may take a minute or two for the ne workspace to be listed, if you still don’t see it, select Refresh, then select Add.
-
Once the new workspace is added, the Microsoft Sentinel News & guides page will display, indicating that the Microsoft Sentinel free trial is activated. Select OK. - Keep this page open, as you’ll use it in the next task.
Task 2
With the Microsoft Sentinel instance created, it is important that users that will have responsibility to support Microsoft Sentinel have the necessary permissions. This is done by assigning the designated user the required role permissions. In this task, you’ll view the available, built-in Microsoft Sentinel roles.
-
In the blue search box, enter resource groups then select Resource groups from the search results.
-
From the Resource groups page, select the resource group that you created with Microsoft Sentinel, SC900-Sentinel-RG. Working at the resource group level will ensure that any role that is selected will apply to all the resources that are part of the Microsoft Sentinel instance that was created in the previous task.
-
From the SC900-Sentinel-RG page, select Access control (IAM) from the left navigation panel.
-
From the Access control page, select View my access. For the Azure subscription provided to you by the Authorized Lab Hoster, a role has been defined that will give you access to manage all necessary resources, as shown in the description. It is important, however, to understand the available Sentinel specific roles. Close the assignments window by selecting the X on the top-right corner of the window.
- From the Access control page, select the Roles tab on the top of the page/
- In the search box, enter Microsoft Sentinel to view the built-in roles associated with Microsoft Sentinel.
- From any of the roles listed, select view to the view the details of that role. As a best practice you should assign the least privilege required for the role.
- Close the window by selecting the X on the top-right corner of the window.
-
From the access control page, close the window by selecting the X on the top-right corner of the window.
-
From the top left corner of the window, just below the blue bar where it says Microsoft Azure, select Home to return to the Azure services home page.
- Keep the Azure tab open on your browser.
Task 3
The purpose of this task is to walk you through the steps involved in connecting to a data source. Many data connectors are deployed as part of a Microsoft Sentinel solution together with related content like analytics rules, workbooks and playbooks. The Microsoft Sentinel Content hub is the centralized location to discover and manage out-of-the-box (built-in) content. In this step, you’ll use the content hub to deploy the Microsoft Defender for Cloud solution for Microsoft Sentinel. This solution allows you to ingest Security alerts reported in Microsoft Defender for Cloud.
-
From the Azure services home page, select Microsoft Sentinel, then select the instance you created, SC900-LogAnalytics-workspace.
-
From the left navigation panel, expand Content Management then select Content hub.
-
Take a moment to scroll down to see the long list of available solutions and the options to filter the list. For this task, your’re looking for Microsoft Defender for Cloud. Select it from the list. In the side window that opens, read the description then select Install. Once the installation is completed, the status column in the main window will show as installed.
-
Once again, select Microsoft Defender for Cloud from the list. From the window on the right, select Manage.
-
On the right side of the the Microsoft Defender for Cloud page is the description and notes associated with the solution from Content Hub and what is included as part of this solution. On the main window are the components of the solution. In this case there are two data connectors and one data rule. The orange triangle indicates that some configuration is needed. Select the box next to where it says Subscription-based Microsoft Defender for Cloud (Legacy). A window opens on the right side of the page. Select Open connector page.
-
Note the configuration instructions. Select the box next to the name of the subscription then select Connect. A pop-op window may appear indicating that only subscriptions you have Security Reader permissions on will start streaming Microsoft Defender for Cloud alerts. Select OK. The status will move to connected. The connector is now enabled, although it may take some time for the connector to show up in the data connectors page.
- Now view information about the analytics rule. From the top of the page (in the breadcrumb) select Microsoft Defender for Cloud. De-select the box next to where it says Microsoft Defender for Cloud, as you have already configured the connector (it may take some time for the warning icon to disappear). Select the box next to where it says, Detect CoreBackUp Deletion Activity from related security alerts. This brings up the Analytics Rules page. Again, select the Detect CoreBackUp Deletion Activity from related security alerts rule. A window that opens on the right, that provides information about the rule and what it does. Select Create rule.
- Although the details of the rule logic are beyond the scope of the fundamentals, go through each tab in the rule creation to view the type of information that can be configured
- When you reach the Review + create tab, select Save.
-
Return to the Sentinel page by selecting **Microsoft Sentinel Content hub** from the bread-crumb at the top of the page, above where it says Analytics rules. - Keep this page open, as you’ll use it in the next task.
Task 4
In this task, you’ll walk through some of the options available in Sentinel.
- From the left navigation panel, expand Threat management and explore the options listed in threat management.
- Select Incidents. Although no incidents are found, review the What is it? section.
- Select Hunting then review the information provided in the Hunts (Preview) tab.
- Select Notebooks and review the the What is it? section.
- Select Threat intelligence and review the information on the page.
- Select MITRE ATT&CK. MITRE ATT&CK is a publicly accessible knowledge base of tactics and techniques that are commonly used by attackers. With Microsoft Sentinel you can view the detections already active in your workspace, and those available for you to configure, to understand your organization’s security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework. Select any cell from the matrix and note the information available on the right side of the screen. Note: You may need to select the “«” at the far-right side of the window to see the information panel.
-
From the left navigation panel, expand Content Management, then select Community. The community page includes Cybersecurity insights and updates from Microsoft Research, a link to a list of Microsoft Sentinel Blogs, a link to Microsoft Sentinel Forums, links the the latest editions to the Microsoft Sentinel Hub, and more. Explore this at will.
- From the left navigation panel, expand Configuration and explore the options listed:
- select Analytics. There should be two active rules, one that is available by default and the rule you created in the previous task. Select the default rule Advanced Multistage Attack Detection. Review the detailed information. Note: You may need to select the “«” at the far-right side of the window to see the information panel.
- From the left navigation panel, select Automation. Here you can create simple automation rules, integrate with existing playbooks, or create new playbooks. Select + Create then select Automation rule. Note the window that opens on the right side of the screen and the options available to create conditions and actions. Select Cancel from the bottom of the screen.
-
Close the window by selecting the X on the top-right corner of the window.
-
From the top left corner of the window, in the blue banner, select Microsoft Azure to return to the home page of the Azure portal.
- Sign out and close all the open browser tabs.
Review
In this lV you walked through the steps for connecting Microsoft Sentinel to data sources, you set up a workbook, and walked several options available in Microsoft Sentinel.