Advanced Threat Hunting in Microsoft Sentinel

Lab Steps

lock
Logging in to the Microsoft Azure Portal
lock
Running Custom Queries to Hunt for Threats
lock
Generating Incident from the Sentinel Query Bookmarks

Ready for the real environment experience?

DifficultyIntermediate
Time Limit1h
Students148
Ratings
4.6/5
starstarstarstarstar-half

Description

Microsoft Sentinel (previously, Azure Sentinel) is a cloud-based SIEM (security information event management) solution that offers advanced intelligence tools across the organizations to secure the cloud and on-premises resources. The core offering of the Azure Sentinel revolves around collecting data at scale while detecting the threat in real-time using artificial intelligence to hunt the suspicious activities, ultimately performing actions to either remediate based on the preconfigured actions or provide a response plan to the security teams in an organization.

Threat Hunting is part of the security operation lifecycle that focus on proactively capturing threats, investigating existing threat using queries, and performing changes to adapt to reduce the previous security incidents by enhancing the analytics and threat capture monitors. The pre-created queries provided by Microsoft are grouped by MITRE ATT&CK framework and tactics that let you easily use and repurpose the queries based on your organization's needs.

In this hands-on lab, you will understand how to use the Hunting dashboard to capture threats, create bookmarks and generate incidents in Microsoft Sentinel.

Learning Objectives

Upon completion of this intermediate-level lab, you will be able to:

  • Use Hunting service in Microsoft Sentinel
  • Understand Custom Queries and collect results queries
  • Understand and create Bookmarks for query results
  • Promote bookmarks to create Incidents in Microsoft Sentinel

Intended Audience

  • Candidates for Azure Security Engineer (AZ-500)
  • Cloud Architects
  • Data Engineers
  • DevOps Engineers
  • Software Engineers

Prerequisites

Familiarity with the following will be beneficial but is not required:

  • Azure Log Analytics
  • Azure Sentinel

The following content can be used to fulfill the prerequisite:

Updates

October 3rd, 2022 - Updated screenshots and instructions due to UI changes

Environment before
PREVIEW
arrow_forward
Environment after
PREVIEW
About the Author
Students7428
Labs65
Courses1
Learning paths2

Parveen is an Azure advocate with previous experience in the professional consulting services industries. He specializes in infrastructure and DevOps with a wide range of knowledge in security and access management. He is also an Azure Certified - DevOps Engineer Expert, Security Engineer, Developer Associate, Administrator Associate, CompTIA Certified - Network+, Security+, and AWS Cloud Practitioner.
Parveen enjoys writing about cloud technologies and sharing the knowledge with the community to help students upskill in the cloud.