threat hunting
35 TopicsAzure Sentinel To-Go (Part1): A Lab w/ Prerecorded Data 😈 & a Custom Logs Pipe via ARM Templates 🚀
In this post, I show you how to use ARM templates to deploy an Azure Sentinel solution and ingest pre-recorded datasets via a python script, Azure Event Hubs and a Logstash pipeline.68KViews20likes25CommentsSecurity Investigation with Azure Sentinel and Jupyter Notebooks – Part 1
This is first of a three-part series about using Jupyter notebooks in Azure Sentinel to trace the path of a security breach in a organization's network. It is accompanied by the notebook and Python code.29KViews8likes2CommentsDetect Network beaconing via Intra-Request time delta patterns in Azure Sentinel
This article will discuss the use case of detecting network beaconing via intra-request time delta patterns using KQL (Kusto query language) in Azure Sentinel. The logic or technique of the use-case was originally discussed at threat hunting project here and also blogged with the open source network analytics tool (flare) implementation by huntoperator here. Implementing this technique natively using KQL allows defenders to quickly apply it over multiple network data sources and easily set up alerts within Azure Sentinel.23KViews4likes3CommentsExport Historical Log Data from Microsoft Sentinel
Big data security analytics and ML requires data ETL that is both flexible and highly performant and scalable. In this blog, we'll show you how to orchestrate the export of Sentinel logs directly from our new Sentinel notebook, making data ready for use in big data security analytics with Azure Synapse.22KViews1like5CommentsAnomaly detection and Explanation with Isolation Forest and SHAP using Microsoft Sentinel Notebooks
In this blog, we will demonstrate how you can identify anomalous Windows logon sessions using an Isolation Forest algorithm with an Azure ML studio notebook connected to a Microsoft Sentinel workspace. Furthermore, we will use SHAP (Shapley Additive exPlanations) library to explain the output generated by model and provide reasoning for the anomalies to accelerate investigation process for SOC Analysts, rather than manually investigating cause of the anomalous score by black box model.21KViews3likes1CommentWhat's new: Earn your Microsoft Sentinel Black Belt Digital Badge!
Our Cloud Security Private Community Digital Badge program has introduced a new L5 Microsoft Sentinel Black Belt Digital Badge for you to earn and display proudly to show your prowess as a Microsoft recognized expert.20KViews12likes10Comments