AZ‐500 Microsoft Azure Security Technologies Study Guide_13 - itnett/FTD02H-N GitHub Wiki

🛡️ Azure Sentinel: Threat Detection & Incident Response

🧠 What is Azure Sentinel?

Azure Sentinel is a cloud-native SIEM (Security Information and Event Management) that provides intelligent security analytics and threat detection across your entire enterprise.

🕵️ Key Features:

  • Threat Hunting 🔍: Proactively search for security threats using pre-built queries or custom Kusto Query Language (KQL).
  • Security Playbooks 📜: Automate responses to detected threats by integrating with Logic Apps.
  • Workbooks 📊: Use interactive dashboards to visualize security trends and data.

📋 Step-by-Step: Configuring Azure Sentinel

Step 1: Connect Data Sources

  • Integrate log data from Azure services like Azure AD, Security Center, and Azure Firewall.
  • Connect external sources such as Office 365, Microsoft Defender, or even third-party firewalls.

Step 2: Create Workbooks

  • 📊 Use workbooks to create visual dashboards that display security trends, incidents, and real-time analytics.
  • 📈 Pre-built workbooks are available for key Azure services like Azure AD and Azure Firewall.

Step 3: Automating Incident Response with Playbooks

  • 🔁 Create playbooks using Azure Logic Apps to automate responses when incidents are detected.
  • Example: Auto-blocking IPs after multiple failed sign-ins.

Step 4: Threat Hunting with KQL

  • Run queries in Azure Log Analytics using KQL