Foreword |
|
xi | |
Acknowledgments |
|
xiii | |
About the authors |
|
xv | |
Introduction |
|
xvii | |
|
Chapter 1 Security challenges for SecOps |
|
|
1 | (12) |
|
|
1 | (4) |
|
The history of a supply-chain attack |
|
|
5 | (1) |
|
Security Challenges for SecOps |
|
|
6 | (2) |
|
|
8 | (1) |
|
Finding the proverbial needle in the haystack |
|
|
8 | (1) |
|
|
9 | (3) |
|
Introducing Microsoft Sentinel |
|
|
12 | (1) |
|
|
12 | (1) |
|
Chapter 2 Introduction to Microsoft Sentinel |
|
|
13 | (18) |
|
|
13 | (2) |
|
|
15 | (2) |
|
Workspace design considerations |
|
|
17 | (1) |
|
|
18 | (1) |
|
Additional considerations |
|
|
18 | (1) |
|
Enabling Microsoft Sentinel |
|
|
19 | (3) |
|
Ingesting data from Microsoft solutions |
|
|
22 | (3) |
|
Connecting Microsoft Defender for Cloud |
|
|
25 | (1) |
|
Connecting to Azure Active Directory |
|
|
26 | (2) |
|
|
28 | (3) |
|
|
31 | (22) |
|
Why use analytics for security? |
|
|
31 | (1) |
|
Understanding analytic rules |
|
|
32 | (4) |
|
Configuring analytic rules |
|
|
36 | (8) |
|
|
44 | (2) |
|
|
46 | (4) |
|
Validating analytic rules |
|
|
50 | (3) |
|
Chapter 4 Incident management |
|
|
53 | (22) |
|
Understanding Microsoft Sentinel incidents |
|
|
53 | (1) |
|
Exploring and configuring the Incidents view |
|
|
54 | (5) |
|
|
59 | (1) |
|
|
60 | (2) |
|
Searching for specific incidents |
|
|
62 | (1) |
|
|
63 | (6) |
|
|
69 | (2) |
|
|
71 | (4) |
|
|
75 | (32) |
|
Understanding threat hunting |
|
|
75 | (1) |
|
Knowing your environment and data |
|
|
76 | (1) |
|
Threat hunting in Microsoft Sentinel |
|
|
76 | (3) |
|
Running your first hunting query |
|
|
79 | (2) |
|
Hunting hypothesis example |
|
|
81 | (10) |
|
|
91 | (3) |
|
Using Livestream with Azure Key Vault honeytokens |
|
|
94 | (3) |
|
Understanding cyberthreat intelligence |
|
|
97 | (1) |
|
Threat intelligence in Microsoft Sentinel |
|
|
97 | (1) |
|
Configuring the TAXII data connector |
|
|
98 | (2) |
|
Enabling the threat intelligence rules |
|
|
100 | (1) |
|
Creating a custom threat indicator |
|
|
101 | (3) |
|
Interactive TI and hunting dashboards |
|
|
104 | (3) |
|
|
107 | (20) |
|
Understanding Microsoft Sentinel Notebooks |
|
|
107 | (2) |
|
Configuring an AML workspace and compute |
|
|
109 | (7) |
|
Configuration steps to interact with your Microsoft Sentinel workspace |
|
|
116 | (2) |
|
|
118 | (3) |
|
Hunting and enrichment examples |
|
|
121 | (1) |
|
Sign-ins that did not pass the MFA challenge |
|
|
121 | (4) |
|
Creating interactive cells |
|
|
125 | (2) |
|
Chapter 7 Automating response |
|
|
127 | (24) |
|
|
127 | (1) |
|
Understanding automation rules |
|
|
128 | (1) |
|
Creating an automation rule |
|
|
128 | (2) |
|
Advanced automation with Playbooks |
|
|
130 | (16) |
|
|
146 | (5) |
|
Chapter 8 Data visualization |
|
|
151 | (12) |
|
Microsoft Sentinel Workbooks |
|
|
151 | (5) |
|
Creating custom Workbooks |
|
|
156 | (3) |
|
Creating visualizations in Power BI and Excel |
|
|
159 | (1) |
|
Creating visualizations in Power BI |
|
|
160 | (2) |
|
Exporting data to Microsoft Excel |
|
|
162 | (1) |
|
Chapter 9 Data connectors |
|
|
163 | (20) |
|
Understanding data connectors |
|
|
163 | (2) |
|
|
165 | (1) |
|
The Codeless Connector Platform |
|
|
166 | (1) |
|
Preparing for a new data connector |
|
|
166 | (1) |
|
Enabling and configuring a data connector |
|
|
167 | (3) |
|
The Microsoft 365 Defender connector |
|
|
170 | (1) |
|
Understanding the Amazon Web Services S3 connector |
|
|
171 | (1) |
|
The AWS S3 configuration process |
|
|
172 | (1) |
|
Data connector health monitoring |
|
|
173 | (2) |
|
The Microsoft SentinelHealth table |
|
|
175 | (2) |
|
|
177 | (6) |
|
Appendix A Introduction to Kusto Query Language |
|
|
183 | (16) |
|
|
183 | (3) |
|
|
186 | (1) |
|
Getting, limiting, sorting, and filtering data |
|
|
187 | (3) |
|
|
190 | (2) |
|
Adding and removing columns |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (1) |
|
|
196 | (1) |
|
Suggested learning resources |
|
|
197 | (2) |
|
Appendix B Microsoft Sentinel for managed security service providers |
|
|
199 | (16) |
|
Accessing the customer environment |
|
|
199 | (1) |
|
|
199 | (4) |
|
Azure Active Directory B2B |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
Security content management |
|
|
212 | (1) |
|
|
212 | (1) |
|
Microsoft Sentinel repositories |
|
|
213 | (2) |
Index |
|
215 | |