Create detections and perform investigations using Microsoft Sentinel
Intro
Detection are super important when it comes to investigating threats to give you insights to act upon.
Deploy Sentinel using an arm template

The things to note here:
Set your subscription
Create a new resource group
Choose your closest region (to be your data center)
Set a name
Go to the data connectors to link to Sentinel
Microsoft Sentinel Analytics helps you detect, investigate, and remediate cybersecurity threats.
Basically, this is the rules set for your automated detections.
Types of analytics rules
Still within the same area:
Anomaly
Fusion
Microsoft security
Machine learning (ML) behavior analytics
Scheduled alerts
NRT (Near Real Time) rules
Threat Intelligence
Fusion - By default, Fusion detection is enabled in Microsoft Sentinel. Microsoft is constantly updating Fusion detection scenarios for threat detection.
Scheduled Analytic rules provide the highest level of customization.
Microsoft security template rules can create incidents based on all alerts generated in Microsoft Defender for Cloud.
Scheduled rules and Microsoft Security, you can view or edit the query, filters, and includes and excludes used in the threat detection. By selecting the Create rule button, you can define the analytics rule logic using a wizard that helps you customize a rule from the selected template.
For Fusion and ML behavior analytics templates, you can only enable or disable them as active rules.
Automated response
On the Automated response tab, you can define automation rules. If you select Add new, the Create new automation rule pane opens.
Creating a custom rule from a scheduled query rule type provides you with the highest level of customization.
Take note here of the different tabs int he wizard when creating the rule.

Automation and Playbooks
Automation rules allow users to centrally manage the automation of incident handling.
Automation is used for the handling of the incident response ticket. e.g assign to x user.
A playbook is a collection of response and remediation actions and logic that can be run from Microsoft Sentinel as a routine. A playbook can help automate and orchestrate your threat response.
Playbooks are generally used for more complex tasks.
Playbooks are created with Logic Apps.
Analytics rules to generate alerts in Microsoft Sentinel
Incident evidence and entities
Incident Evidence
Events
Alerts
Bookmarks
Incident Entities
Events link you back to one or more specific events from the Log Analytics workspace associated with Microsoft Sentinel.
Insights will display Entity Behavior information.
Last updated