AZ‐500 Microsoft Azure Security Technologies Study Guide_13 - itnett/FTD02H-N GitHub Wiki
🛡️ Azure Sentinel: Threat Detection & Incident Response
🧠 What is Azure Sentinel?
Azure Sentinel is a cloud-native SIEM (Security Information and Event Management) that provides intelligent security analytics and threat detection across your entire enterprise.
🕵️ Key Features:
- Threat Hunting 🔍: Proactively search for security threats using pre-built queries or custom Kusto Query Language (KQL).
- Security Playbooks 📜: Automate responses to detected threats by integrating with Logic Apps.
- Workbooks 📊: Use interactive dashboards to visualize security trends and data.
📋 Step-by-Step: Configuring Azure Sentinel
Step 1: Connect Data Sources
- Integrate log data from Azure services like Azure AD, Security Center, and Azure Firewall.
- Connect external sources such as Office 365, Microsoft Defender, or even third-party firewalls.
Step 2: Create Workbooks
- 📊 Use workbooks to create visual dashboards that display security trends, incidents, and real-time analytics.
- 📈 Pre-built workbooks are available for key Azure services like Azure AD and Azure Firewall.
Step 3: Automating Incident Response with Playbooks
- 🔁 Create playbooks using Azure Logic Apps to automate responses when incidents are detected.
- Example: Auto-blocking IPs after multiple failed sign-ins.
Step 4: Threat Hunting with KQL
- Run queries in Azure Log Analytics using KQL