Room Banner

MS Sentinel: Introduction

What is Microsoft Sentinel and how does it fit into the role of a Security Operations Analyst?

easy

45 min

Room progress ( 0% )

To access material, start machines and answer questions login.

Task 1Microsoft Security Operations Analyst

A Security Operations Center (SOC) is a centralized security unit with team(s) responsible for protecting the organization against security threats.

Security Operations Center Analyst, also known as a SOC Analyst, works in a SOC team to monitor, analyze, and respond to security issues as the front line of an organization's cyber defenses. Similarly, a Microsoft SOC Analyst has the same security goals as a SOC Analyst but with the additional distinction of working and specializing in Microsoft Security products.


The main goal is to reduce organizational risk. The mission statement would include the following points:

  • Remediate active attacks in the environment.
  • Advise on improvements to threat protection practices.
  • Refer violations of organizational policies to appropriate stakeholders.

Responsibilities

Monitoring SOC Level 1 Analyst
Triage SOC Level 1 Analyst
Incident ResponseSOC Level 2 Analyst
Threat Hunting SOC Level 2 Analyst
Advanced Threat Hunting SOC Level 3 Analyst
Threat Intelligence (TI) AnalysisSOC Level 3 Analyst
Vulnerability ManagementSOC Level 3 Analyst

Prerequisites

  • Understanding of Microsoft 365
  • Fundamental understanding of Microsoft Security, Compliance, and Identity products
  • Intermediate understanding of Microsoft Windows
  • Familiarity with Azure services - specifically Azure SQL Database and Azure Storage, Azure VMs, and Virtual Networking
  • Familiarity with scripting concepts

This role primarily investigates, responds to, and hunts for threats by using the following security products:

  • Microsoft Sentinel
  • Microsoft Defender for Cloud
  • Microsoft 365 Defender
  • and third-party security products

Throughout the Microsoft Sentinel module, we will dive deep into these security products and learn how they help SOC Analysts with their job tasks. Keeping this role definition in mind, let's see what Microsoft Sentinel is in the next task.

Answer the questions below
What security unit is responsible for protecting the organization against security threats?

Generally, which level of SOC Analyst is responsible for responding to incidents?

Besides monitoring, what else do SOC Level 1 Analysts spend the majority of their time with?

Before we can define what Microsoft Sentinel is, it is important to first define two concepts, namely SIEM and SOAR.

What Is SIEM?

SIEM stands for Security Information and Event Management. It is a comprehensive approach to security management that combines Security Information Management (SIM) and Security Event Management (SEM) into a single solution. The primary purpose of SIEM is to provide a holistic view of an organization's information security by collecting and analyzing log data from various sources across its IT infrastructure.

What Is SOAR?

SOAR stands for Security Orchestration, Automation, and Response. It is a set of technologies and practices designed to improve the efficiency and effectiveness of an organization's cyber security operations. SOAR platforms integrate security orchestration and automation to streamline and accelerate incident response processes.

What Is Microsoft Sentinel?

Given the above concept definitions, Microsoft Sentinel's own definition becomes a combination of the two. It is essentially a scalable, cloud-native solution that provides the following:

  • Security Information and Event Management (SIEM) functionality by:
    • Collecting and querying logs
    • Doing correlation or anomaly detection
    • Creating alerts and incidents based on findings
  • Security Orchestration, Automation, and Response (SOAR) functionality by:
    • Defining playbooks
    • Automating threat responses

Microsoft Sentinel also delivers security analytics and threat intelligence across the organization. It's a one-stop-shop and bird's-eye view solution for:

  • Attack detection
  • Threat visibility
  • Proactive hunting
  • Threat response

A circular image showcasing Microsoft Sentinel, a cloud-native SIEM+SOAR solution. At the center is a cloud icon with a shield labeled "Microsoft Sentinel." Surrounding it are four sections: "Collect security data" (computer screen), "Detect threats" (security camera), "Investigate incidents with AI" (laptop), and "Automate response" (gears).

Microsoft Sentinel performs the above actions and enables security operations by means of 4 main pillars:

  • Collect
  • Detect
  • Investigate
  • Respond

As we go through the rooms in this module, it will be clear which functionalities are SIEM and which ones are SOAR-related. For now, we can think of Microsoft Sentinel as a cloud-native SIEM+SOAR system for security operations.

Answer the questions below
Microsoft Sentinel is a combination of two security concepts, namely SIEM and which other one?

Creating security alerts and incidents is part of which security concept?

By means of how many pillars does Microsoft Sentinel help us to perform security operations?

To understand how Microsoft Sentinel does what it does, maybe it is better to go through the journey together with the logs. Without log data ingested from different data sources, there wouldn't be any correlation, alerting, threat intelligence, or response automation.

Phase 1: Collect

A camera lens with a central red dot and concentric circles, enclosed in a metallic ring. Four red corner brackets suggest focus. The word "Collect" is at the top in black on a green background, and "Visibility" is at the bottom in green on a dark background.

  • Data connectors: The first step is to ingest data into Microsoft Sentinel. This is exactly what data connectors are for. There are 100+ connectors to cover all various data sources and scenarios.
  • Log retention: Once the data has been ingested into Microsoft Sentinel, it must be stored for further correlation and analysis. This log storage mechanism is called Log Analytics workspaces. Data stored in these workspaces can be queried to gain further insights using Kusto Query Language (KQL).

Phase 2: Detect

A section titled "Detect" with two icons: the left icon labeled "Analytics," featuring a blue grid with a circular graph, and the right icon labeled "Hunting," featuring blue binoculars.

  • Workbooks: Workbooks are essentially dashboards in Microsoft Sentinel used to visualize data. There are many built-in workbooks, and custom ones can also be created by utilizing KQL.
  • Analytics rules: What good is a bunch of logs and visualizations if we can't gain insights from them? That's why there are Analytics rules. Analytics rules provide proactive analytics so that SOC teams get notified when suspicious things happen. The output of running Analytics rules are security alerts and incidents.
  • Threat hunting: Reacting to security incidents only after they happen is not good enough. SOC analysts also need to perform proactive threat hunting. Microsoft Sentinel has over 200 built-in threat-hunting queries to support that needle-in-a-haystack job.

Phase 3: Investigate

A magnifying glass with a red crosshair over a green and yellow waveform, set against a dark blue gradient background. A green banner at the top reads "Investigate" in black text, while "Incidents" is displayed in green below the magnifying glass.

  • Incidents and investigations: Once Analytics rules detect suspicious activities, i.e., once an alert is triggered, security incidents are created for SOC analysts to triage and investigate. Typical incident management activities include:
    • Changing the incident status
    • Assigning to other analysts for further investigation
    • Mapping entities to the investigation
    • Investigating the incident timeline
    • Deep-dive into investigation details using investigation maps
    • Recording investigation comments

Phase 4: Respond

A gear icon with the words "Respond" and "Automation" above and below it, respectively. The background transitions from green at the top to dark blue at the bottom.

Let's first define the term alert fatigue. Alert fatigue occurs occurs when cyber security professionals are inundated with a high volume of security alerts, which leads to a diminished ability for SOC teams to react effectively to and investigate real threats.

  • Automation via playbooks: One of the main challenges of a SOC team is alert fatigue. To overcome alert fatigue, automation in security operations is a must. This is done by automated workflows, also known as playbooks, in response to events. By doing so, automated responses can be provided for:
    • Incident management
    • Enrichment
    • Investigation
    • Remediation

Referring to the definition of SOAR in Task 2, Respond is part of the SOAR (Security Orchestration, Automation, and Response) capabilities of Microsoft Sentinel.

After defining the four phases above (Collect, Detect, Investigate, and Respond), it should be clearer how Microsoft Sentinel helps SOC analysts perform their job tasks and which of these phases map to L1/L2 SOC analyst's responsibilities.

Answer the questions below
What is used to ingest data into Sentinel?

Where are the ingested logs stored for further correlation and analysis?

Workbooks are essentially _______ used for visualization.

When SOC teams are flooded with security alerts and incidents, this is called?

In Microsoft Sentinel, automation is done via automated workflows, known as?

The output of running Analytics rules includes security alerts and?

The short answer is: When there is a necessity to monitor cloud and on-premises infrastructures for security. Surely, many security products could be used for this purpose. However, where Microsoft Sentinel separates from the crowd is its ability to enable the majority of SOC teams' tasks from a single pane and with a 360-degree bird's-eye approach.

Microsoft Sentinel serves as a solution for conducting security operations across cloud and on-premises environments. Security operations encompass various tasks such as:

  • Visualizing log data
  • Detecting anomalies
  • Conducting threat hunting
  • Investigating security incidents
  • Implementing automated responses to alerts and incidents

Opt for Microsoft Sentinel if the organization aims to:

  • Gather event data from diverse data sources
  • Execute security operations on the collected data to pinpoint suspicious activities

Also, some of Microsoft Sentinel's additional features are:

  • Cloud-native SIEM - No need for server provisioning, facilitating seamless scalability
  • Easy integration with Azure services and its extensive range of connectors
  • Centralized monitoring
  • Automated incident response
  • Real-time advanced threat detection
  • Leveraging Microsoft's Research and Machine Learning capabilities
  • Support for hybrid cloud and on-premises environments

If the organization has requirements such as:

  • Support for data from multiple cloud environments
  • Features and functionality necessary for a Security Operations Center (SOC) without excessive administrative overhead

Microsoft Sentinel would be a great fit to address these requirements.

If the organization's objectives involve understanding the security posture, ensuring compliance with policies, and checking for security misconfigurations, you would use Microsoft Defender for Cloud (formerly known as Security Center) rather than mainly using Microsoft Sentinel. You could also use both in conjunction by ingesting Defender for Cloud alerts into Microsoft Sentinel, which would enhance the overall security framework.

Answer the questions below
Organizations use Microsoft Sentinel mainly because they need to _______ their cloud infrastructure.

With Microsoft Sentinel, there is no need for server provisioning. This means it is?

In this room, we have delved into an initial introduction to security operations as a whole, understanding the responsibilities of a SOC Analyst and some key prerequisites.

We also discussed some key concepts of Microsoft Sentinel, how it works, and how SOC Analysts can use it to improve their security posture.

After completing this Microsoft Sentinel introductory room, you should have learnt the following:

  • The roles of a SOC Analyst and the different levels
  • How Microsoft Sentinel works as a SIEM solution
  • The key features of Microsoft Sentinel
Answer the questions below

I understand how Microsoft Sentinel works!

Room Type

Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!

Users in Room

10,383

Created

157 days ago

Ready to learn Cyber Security? Create your free account today!

TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information contact us.

Read more