What's New: PowerShell+Azure Sentinel notebooks to supercharge your hunting and investigations!

%3CLINGO-SUB%20id%3D%22lingo-sub-1720232%22%20slang%3D%22en-US%22%3EWhat's%20New%3A%20PowerShell%2BAzure%20Sentinel%20notebooks%20to%20supercharge%20your%20hunting%20and%20investigations!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1720232%22%20slang%3D%22en-US%22%3E%3CP%3EFor%20those%20that%20have%20wanted%20to%20get%20into%20the%20Azure%20Sentinel%20notebooks%2C%20but%20are%20more%20comfortable%20with%20PowerShell%20than%20Python%2C%20we%20have%20news%20for%20you.%26nbsp%3B%20Using%20the%20latest%20version%20of%20the%20Azure%20Sentinel%20notebooks%2C%20you%20can%20now%20enable%20PowerShell%20notebooks%20via%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3E.Net%20Interactive%20Public%20Preview%3C%2FSTRONG%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20get%20started%2C%20you%20will%20need%20to%20install%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22.Net%20Interactive%22%20href%3D%22https%3A%2F%2Fgithub.com%2Fdotnet%2Finteractive%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E.Net%20Interactive%20Public%20Preview%3C%2FA%3E%26nbsp%3Bon%20your%20notebook%20server%20and%20enable%20the%20PowerShell%20kernel.%26nbsp%3B%20This%20article%20also%20includes%20a%20companion%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22Azure%20Sentinel%20PowerShell%20notebook%22%20href%3D%22https%3A%2F%2Fnbviewer.jupyter.org%2Fgithub%2FAzure%2FAzure-Sentinel-Notebooks%2Fblob%2Fmaster%2FA%2520Getting%2520Started%2520Guide%2520For%2520PowerShell%2520AML%2520Notebooks.ipynb%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Sentinel%20PowerShell%20notebook%3C%2FA%3E%26nbsp%3Bto%20get%20you%20started%20and%20be%20sure%20to%20check%20out%20the%20Azure%20Sentinel%20notebook%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20title%3D%22official%20documentation%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fnotebooks%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eofficial%20documentation%3C%2FA%3E%26nbsp%3Bfor%20details%20on%20configuring%20the%20environment.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhat%20are%20PowerShell%20Jupyter%20notebooks%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20Jupyter%20notebook%20is%20an%20interactive%20open%20source%20programming%20tool%20for%20data%20analytics%20and%20visualizations.%20A%20notebook%20is%20divided%20into%20cells.%20Each%20cell%20is%20a%20section%20that%20can%20combine%20the%20programming%20code%20and%20its%20output%20along%20with%20markdown%2C%20graphs%2C%20comments%2C%20API%20results%2C%20and%20other%20powerful%20visuals.%20An%20analyst%20can%20traverse%20between%20cells%2C%20execute%20them%20individually%20and%20adjust%20them%20on%20the%20fly%20and%20re-run%20them%20if%20changes%20are%20required.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhy%20PowerShell%20Jupyter%20notebooks%20for%20threat%20hunting%20and%20investigation%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20interactive%20nature%20of%20notebooks%20results%20in%20iterative%20and%20rapid%20development%2C%20as%20well%20as%20code%20sharing%20and%20reuse%2C%20thus%20making%20notebooks%20an%20increasingly%20popular%20choice%20for%20data%20scientists%20and%20analysts.%20Notebooks%20have%20increasingly%20become%20adopted%20by%20security%20analysts%20to%20automate%20frequent%20mundane%20tasks%2C%20incorporate%20APIs%20and%20visualize%20and%20provide%20context%20for%20security%20datasets.%26nbsp%3B%20In%20addition%2C%20security%20analysts%20can%20share%20the%20code%2Flogic%20and%20outcome%20of%20a%20given%20hunt%20or%20investigation%20which%20can%20be%20run%20as-is%20or%20improved%20over%20time.%20Review%20this%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fmsticpy.readthedocs.io%2Fen%2Flatest%2Fgetting_started%2FJupyterAndSecurity.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Earticle%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Efor%20a%20more%20comprehensive%20list%20of%20capabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESince%20many%20security%20analysts%20are%20already%20comfortable%20with%20PowerShell%20and%20may%20already%20have%20several%20go-to%20scripts%20for%20their%20daily%20work%2C%20PowerShell%20Jupyter%20notebooks%20will%20help%20those%20users%20embrace%20Jupyter%20notebooks%20to%20supercharge%20their%20threat%20hunts%20and%20investigations!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fwhat-s-new-powershell-azure-sentinel-notebooks-to-supercharge%2Fba-p%2F1695969%22%20target%3D%22_self%22%3E%3CSTRONG%3ERead%20the%20full%20article%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1720232%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPowerShell%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Highlighted
Microsoft

For those that have wanted to get into the Azure Sentinel notebooks, but are more comfortable with PowerShell than Python, we have news for you.  Using the latest version of the Azure Sentinel notebooks, you can now enable PowerShell notebooks via .Net Interactive Public Preview.

 

To get started, you will need to install .Net Interactive Public Preview on your notebook server and enable the PowerShell kernel.  This article also includes a companion Azure Sentinel PowerShell notebook to get you started and be sure to check out the Azure Sentinel notebook official documentation for details on configuring the environment.

 

What are PowerShell Jupyter notebooks?

The Jupyter notebook is an interactive open source programming tool for data analytics and visualizations. A notebook is divided into cells. Each cell is a section that can combine the programming code and its output along with markdown, graphs, comments, API results, and other powerful visuals. An analyst can traverse between cells, execute them individually and adjust them on the fly and re-run them if changes are required.

 

Why PowerShell Jupyter notebooks for threat hunting and investigation?

The interactive nature of notebooks results in iterative and rapid development, as well as code sharing and reuse, thus making notebooks an increasingly popular choice for data scientists and analysts. Notebooks have increasingly become adopted by security analysts to automate frequent mundane tasks, incorporate APIs and visualize and provide context for security datasets.  In addition, security analysts can share the code/logic and outcome of a given hunt or investigation which can be run as-is or improved over time. Review this article for a more comprehensive list of capabilities.

 

Since many security analysts are already comfortable with PowerShell and may already have several go-to scripts for their daily work, PowerShell Jupyter notebooks will help those users embrace Jupyter notebooks to supercharge their threat hunts and investigations!

 

Read the full article

0 Replies