Skip to content

Latest commit

 

History

History
114 lines (61 loc) · 6.84 KB

Module-4-Incident-Management.md

File metadata and controls

114 lines (61 loc) · 6.84 KB

Module 4 - Incident Managment

🎓 Level: 300 (Intermediate)

⌛ Estimated time to complete this lab: 30 minutes

This module guides you through the SOC Analyst experience using Azure Sentinel's incident management capabilities.

Prerequisites

This module assumes that you have completed Module 1, as the data and the artifacts that we will be using in this module need to be deployed on your Azure Sentinel instance.

Exercise 1: Review Azure Sentinel incident tools and capabilities

As a SOC analyst the entry point to consume Security incidents(tickets) in Sentinel is the Incident page.

  1. In the left navigation menu press on the incident and open the incident page. This page will show by default all the open incident in the last 24hr.

  2. When we want to change the time window, present only incident from specific severity or to see also closed incident, we can use the filters bar:

Select Microsoft incident creation rule

  1. On the incident page select the "Model Evasion in Critical ML model" incident. In the right pane you can see the incident preview with the high level information about the incident.

  2. As you are the SME SOC analyst that deal and investigate fraud tickets, you need to take ownership on this incident. On the right page change the unassigned to "Assign to me" and also change the status from New to active.

Select Microsoft incident creation rule

  1. Another way to consume incidents and also get high level view on the general SOC health is through the Security Operations Efficiency Workbook(we will have separated module on workbook)

We have 2 options to open the workbook:

  • Through the top navigation, this will open the workbook general view, where we see overall statistics on the incidents.

Select Microsoft incident creation rule

  • Through the incident itself, that will open the same workbook on a different tab, and present the information and lifecycle for the given incident.

Select Microsoft incident creation rule

  1. Review the dashbaord.

Exercise 2: Handling Incident "Sign-ins from IPs that attempt sign-ins to disabled accounts"

  1. Open Azure Sentiel incident page.
  2. Locate the incident "Sign-ins from IPs that attempt sign-ins to disabled accounts"
  3. Press on the incident and look on the right pane for the incident preview, please notice that in this pane we are surfacing the incident entities that belong to this incident.
  4. Take ownership on the incident and change its status to Active
  5. Navigate to incident full details by pressing View full details and execute playbook to bring Geo IP data (user will notice tags being added).
  6. Navigate to the Alerts tab and press the number of Events. This action will redirect you to Raw logs that will present the alert evidence to support the investigation

Select Microsoft incident creation rule

  1. In raw log search, expend the received event and review the column and data we received, this properties will help us to decide if this incident is correlated to other events.

Select Microsoft incident creation rule

  1. To get more context for this IP, we want to add GEO IP enrichment. In a real life SOC this operation will run automatically, but for this lab we want you to run it manually.
  • Navigate back to the incident full page to the alert tab and scroll to the right

Select Microsoft incident creation rule

  • To view the relevant automation that will assist us with the enrichment opertion, Press view playbook

Select Microsoft incident creation rule

  1. Locate the playbook Get-GeoFromIpAndTagIncident and press Run. If the playbook is configured correctly, it should finish in a couple of seconds.

  2. Navigate back to the main incident page and notice to new tags that added to the incident.

Select Microsoft incident creation rule

** Bonus : Open the resource group for Sentinel deployment, locate the playbook and look on the last playbook run to review the execution steps.

  1. As this enrichment information increases your concern, you want to check other traces of this IP in your network. For this investigation you want to use the investigation workbook.

  2. In the left navigation press Workbooks and select My Workbooks

Select Microsoft incident creation rule

  1. To open the Investigation Insights - sentinel-training-ws saved Workbook, in the right page press View saved workbook

  2. Validate that in the properties selector, your workspace is set on sentinel-training-ws and the subscription is the subscription that hosts your Azure Sentinel Lab.

Select Microsoft incident creation rule

  1. As the subject of the investigation is the suspicious IP from North Koriea. we want to see all the activity done by this IP so in the properties selector, switch on the investigate by to Entity.

  2. in the Investigate IP Address Tab, add the suspicious IP.

Select Microsoft incident creation rule

  1. Under the activity Detail we see many successful logins from this IP with the user Adele, and also some failed logins to disabled account from last day/hours

  2. We copy the User [email protected] and validate it in our internal HR system, from the information we collected its seems that Adele is part of the security Red team, and this suspicious is part of the exercise.

  3. As the red team exercise discovered by us, the SOC manager ask us to add this IP to the whitelisting IP's, that we will not trigger incident on it any more.

  4. On the main incident page, select the relevant incident and press Actions - > Create automation Rule

Select Microsoft incident creation rule

  1. In the new screen, we will see all the incident identifiers ( the IP, and the specific Analytics rule), as the Red Team exercise will finish in 48 hr., adapt the rule expiration till the end of the drill, and press Apply.

Select Microsoft incident creation rule

  1. As this incident concider as benign, we go back to the main incident page, and close the incident with the right classifiction.

Select Microsoft incident creation rule M5-close-incident

Congratulations, you have completed Module 4!. You can now continue to Module 5 - Hunting