View on GitHub

Partner Crucible

This project aims to serve as an entry point into the wealth of information and services available to Canadian Microsoft partners. The Partner Crucible will curate links, models, and insights to ensure our partners have an overview and a quick path forward.

Security Solution Area - Sentinel

Sentinel

Purpose

A Collection of resources for building Sentinel and SOC demos. For a view of other solution areas, please see the Taxonomy.

To contribute to the PartnerCrucible, see Contributor’s Guide.

Industry

Source Description Notes
Magic Quadrant for Security Information and Event Management Updated Gatner Magic Quadrant for Security Information and Event Management (SIEM) Garter - May 2024
Microsoft named a Leader in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management We’re delighted to announce that Microsoft is named a Leader in the 2022 Gartner® Magic QuadrantTM for Security Information and Event Management and is positioned highest on the measure of Ability to Execute axis. Microsoft
Forrester names Microsoft a Leader in Q4 2022 Security Analytics Platforms Wave report Microsoft achieved the highest possible score in 17 different criteria, including partner ecosystem, innovation roadmap, product security, case management, and architecture. Forrester Wave
The Total Economic Impact Of Microsoft Azure Sentinel Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study. Using the methodology of the TEI framework, Forrester consultants evaluated the cost, benefits, and flexibility of Microsoft Sentinel and developed a framework that organizations can use to evaluate the potential financial impact on their organizations. Forrester 2024

Practices and Tools

Source Description Notes
Azure Sentinel Technical Playbook for MSSPs How to deploy Azure Sentinel as a managed security services provider March 2021
Microsoft Sentinel for MSSPs If you’re a managed security service provider (MSSP) and you’re using Azure Lighthouse to offer security operations center (SOC) services to your customers, you can manage your customers’ Microsoft Sentinel resources directly from your own Azure tenant, without having to connect to the customer’s tenant Microsoft Learn
Sentinel POC – Architecture and Recommendations for MSSPs This post is a part of series that covers various topics from the very basics, to ensure partners that may be familiar with other SIEMs, but that are not yet familiar with Azure can get all the information they need to be successful. My Faber Security
Microsoft Sentinel All-in-One Microsoft Sentinel All-in-One is aimed at helping customers and partners quickly set up a full-fledged Microsoft Sentinel environment that is ready to use by customers speeding up deployment and initial configuration tasks in few clicks, saving time and simplifying Microsoft Sentinel setup. Blogs
Microsoft Sentinel All-in-One - GitHub   GitHub
Centrally manage multiple Microsoft Sentinel workspaces with workspace manager This article takes you through provisioning and usage of workspace manager. Whether you’re a global enterprise or a Managed Security Services Provider (MSSP), workspace manager helps you operate at scale efficiently. Microsoft Learn
Protecting MSSP intellectual property in Microsoft Sentinel This article describes the methods that managed security service providers (MSSPs) can use to protect intellectual property they’ve developed in Microsoft Sentinel, such as Microsoft Sentinel analytics rules, hunting queries, playbooks, and workbooks Microsoft Learn
Sentinel Migration Guides These are detailed guides to migrate from ArcSight, QRadar and Splunk; migrate historical data, convert dashboards to workbooks and update SOC processes. Microsoft Learn
Splunk Migration The process of moving from Splunk to Microsoft Sentinel via the SIEM Migration experience has been enhanced with three key additions that help customers get more context aware translations of their detections from Splunk to Sentinel. These features let customers provide more contextual details about their Splunk environment & usage to the Microsoft Sentinel SIEM Migration translation engine so it can account for them when converting the detections from SPL to KQL. Tech Community
Azure Sentinel Tools Microsoft Sentinel API integrations, tools and deployment templates that can enable you to easily: connect your solutions with Microsoft Sentinel, deploy in Microsoft Sentinel, migrate to Microsoft Sentinel, work easily and connect to different products in Microsoft Sentinel GitHub
Azure Sentinel Playbook This repo contains sample security playbooks for security automation, orchestration and response (SOAR). Each folder contains a security playbook ARM template that uses Microsoft Sentinel trigger. GitHub
Overview of Advanced Hunting Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data.  
Microsoft Sentinel and Microsoft 365 Defender This repository contains out of the box detections, exploration queries, hunting queries, workbooks, playbooks and much more to help you get ramped up with Microsoft Sentinel and provide you security content to secure your environment and hunt for threats. The hunting queries also include Microsoft 365 Defender hunting queries for advanced hunting scenarios in both Microsoft 365 Defender and Microsoft Sentinel. GitHub
How to use Azure Sentinel for Incident Response Orchestration Microsoft Tech Community Article  
Automate tasks management to protect your organization against threats While tasks can be added manually from within the Sentinel console, playbooks, and automation rules can be used to automatically create tasks based on certain conditions. Tech Community
Connect your threat intelligence platform to Microsoft Sentinel with the upload indicators API This data connector uses the Sentinel upload indicators API to ingest threat intelligence indicators into Microsoft Sentinel. Microsoft Learn
Microsoft Sentinel Transformations Library This repository contains samples for multiple scenarios that are possible thanks to the new Log Analytics Custom Logs v2 and pipeline transformation features. GitHub
Microsoft Sentinel Triage Assistant (STAT) The Microsoft Sentinel Triage AssistanT (STAT) is a Logic Apps Custom Connector that calls on a library of Automation Modules that can be used from Incident based Microsoft Sentinel playbooks. This connector and modules simplify automation by moving complex automation tasks into these callable modules so they can be performed consistently and with ease from the Logic Apps Connector. GitHub
Bring your own Machine Learning (ML) into Microsoft Sentinel Machine Learning (ML) is one of the major underpinnings of Microsoft Sentinel, and one of the main attributes that set it apart. Microsoft Sentinel offers ML in several experiences: built-in to the Fusion correlation engine and Jupyter notebooks, and the newly available Build-Your-Own ML (BYO ML) platform ,,,
BYO-ML Github Build-Your-Own Machine Learning(BYO ML) package is provided by Azure Sentinel team to help organizations build or bring your own ML to tackle security problems specifically for your business. This folder contains the BYO ML package including the first ML algorithm Azure Sentinel team shares.
Discover the power of UEBA anomalies in Microsoft Sentinel Our mission in Microsoft Sentinel UEBA is to detect insider and unknown threats – so we surface those suspicious activities that won’t be detected by other platforms. Since we’re looking into and analyzing that grey area of activities - we’re able to provide insights on threats that might have been missed otherwise.
UEBA Reference This reference article lists the input data sources for the User and Entity Behavior Analytics service in Microsoft Sentinel. It also describes the enrichments that UEBA adds to entities, providing needed context to alerts and incidents. Azure docs
Using Cribl Stream to ingest logs into Microsoft Sentinel Microsoft and Cribl are working to drive accelerated SIEM migrations for customers looking to modernize their security operations (SecOps) with Microsoft Sentinel. Tech Community

Training

Source Description Notes
Microsoft Sentinel Black Belt New for 2022, our Cloud Security Private Community Digital Badge program has introduced a new L5 Microsoft Sentinel Black Belt Digital Badge for you to earn and display proudly to show your prowess as a Microsoft recognized expert and contributor to the product.
Sentinel Ninja October 2024: This Ninja updated - Ninja Training program — a structured and in-depth journey (level 400) into the platform’s capabilities. Tech Community
The Art and Science of Threat Hunting From Microsoft Security Experts and Microsoft Detection and Response Team (DART) September 2022

Sentinel Demo References

Source Description Notes
Microsoft 365 Defender - Demo Hero Environment - M365 Defender (Protection, Detection, Alerts vs Incidents)
-Defender for Cloud (Alerts, Security Posture, Cloud Protection)
-Microsoft Sentinel for multiple data sources Analytic Rules (Scheduled, ML, Anomaly, Fusion)
-Threat Vulnerability Management
-Integration with Microsoft Endpoint Management for patch and configuration management
-Automatic remediations from M365 Defender
-Playbooks from Microsoft Sentinel
Read-Only environment
Azure Sentinel To-Go (Part1) A Lab w/ Prerecorded Data and a Custom Logs Pipe via ARM Templates
Cost Worthy Azure Sentinel Demo Steps to Create a Cost Worthy Azure Sentinel Demo/Testing Environment
Microsoft Sentinel Training Lab This solution ingests sample data into your Microsoft Sentinel workspace which will trigger incidents that allow you to explore Microsoft Sentinel features without Additional effort
Integrate Azure Data Explorer for long-term log retention Storing logs in Azure Data Explorer reduces costs while retains your ability to query your data, and is especially useful as your data grows. Microsoft Learn