Forum Discussion
New Blog Post | Visualize User & App Access Connections in Azure using Jupyter Notebooks in Sentinel
My name is TJ Dolan, I am a founder of Senserva, a Microsoft focused security solutions vendor. We create innovative security data driven solutions with the goal of making both cloud administrators and security experts life’s a little easier via the automation of critical and often time-consuming tasks.
As the leader of the Senserva product development efforts, I am always pushing us to learn and do new things as we work to help users of Microsoft Sentinel and Azure in general.
I jumped when I saw a post from Rod Trent that talked about a Microsoft Sentinel Hackathon using Sentinel Notebooks. We had been working with KQL and Sentinel Workbooks but we struggled with not having a procedural computer language and our queries where getting more and more complex. I knew right away Notebooks would solve this problem, and maybe, just maybe, we would win the Hackathon to boot.
While we did not win that the main Hackathon prize, we won an even bigger one. We started using Azure Notebooks and we quickly were creating great reports, pulling the same data from the Log Analytics Workspace as we have always done. Soon our entire team was learning and using Notebooks. Now it is how we do our deep user interfaces. Queries are great for getting a lot of different data quickly, and Notebooks show it easily. For the complicated tasks we want to solve for our customers, our driving goal, we needed Notebooks.