As we know, each organization is unique and have different use cases and scenarios in mind when it come to security operations. Nevertheless we've identified several use cases that are common across many SOC teams.
Azure Sentinel now provides built-in watchlist templates, which you can customize for your environment and use during investigations.
After those watchlists are populated with data, you can correlate that data with analytics rules, view it in the entity pages and investigation graphs as insights, create custom uses such as to track VIP or sensitive users, and more.
Watchlist templates currently include:
VIP Users. A list of user accounts of employees that have high impact value in the organization.
Terminated Employees. A list of user accounts of employees that have been, or are about to be, terminated.
Service Accounts. A list of service accounts and their owners.
Identity Correlation. A list of related user accounts that belong to the same person.
High Value Assets. A list of devices, resources, or other assets that have critical value in the organization.
Network Mapping. A list of IP subnets and their respective organizational contexts.
Watchlists templates insights in entity pages
We've created the watchlists templates schemas to be super easy and extensible, in order for you to populate it with the relevant data. more information about using the watchlists templates can be found here.
Beside surfacing the watchlists templates data inside the entity pages, we're working on embedding this information in the UEBA anomalies, and the entity risk score which is planned next. Understanding if a user is a VIP/Terminated or an asset is an HVA is important to provide both context and security value for the analyst while investigating.
We Value Your Opinion!
Our goal is to make your life easier while you investigate security incidents. If you have any feedback – about the experience, the usage – or anything else,