Microsoft Sentinel Incident Investigation and Incident Management

preview_player
Показать описание
After you connected your data sources to Microsoft Sentinel, you want to be notified when something suspicious happens. To enable you to do this, Microsoft Sentinel lets you create advanced analytics rules that generate incidents that you can assign and investigate.

Investigate incidents
Use the investigation graph

An incident can include multiple alerts. It's an aggregation of all the relevant evidence for a specific investigation. An incident is created based on analytics rules that you created in the Analytics page. The properties related to the alerts, such as severity and status, are set at the incident level. After you let Microsoft Sentinel know what kinds of threats you're looking for and how to find them, you can monitor detected threats by investigating incidents.

Рекомендации по теме
Комментарии
Автор

How do you block, Sandbox, or Isolate devices or Networks?

ravbhuva
Автор

I really appreciate your work, Bro. I could not thank you enough for your video. You really make it Very simple and easy to understand.
I just want to wish you all success and achievements.
Keep Up!! The good work.
Thanks☺

frezerdugasa
Автор

How to Identify the Incident is a "True Positive or false Positive" and can you explain one true positive case Incident. It will helpfull

RawiChadulla