Beginner
4.8
2,847

Investigating and Handling Incidents in Microsoft Sentinel

Learn to handle incidents in Microsoft Sentinel by investigating suspicious activity, analyzing IP insights, and automating responses with custom rules.

Skills You'll Learn

Microsoft Sentinel
Lab preview
Ready
3
Modules
1 hour
Duration

Lab Modules

3 steps
Logging into Azure Account using Azure Portal
Initial Incident Investigation
Investigation with a Workbook

Lab Overview

Effective incident handling is a crucial skill for SOC analysts in mitigating potential security threats. In this lab, you'll explore Microsoft Sentinel's incident management capabilities by investigating and responding to a real-world scenario, "Sign-ins from IPs that attempt sign-ins to disabled accounts." This step-by-step walkthrough will guide you through initial incident triage and leveraging workbooks to uncover deeper insights into suspicious activity. You'll also create automation rules to reduce investigation noise and close incidents with appropriate classifications.

Objectives

Upon completion of this lab, you will be able to:

  • Investigate and triage security incidents in Microsoft Sentinel.
  • Enrich incidents with geolocation and additional contextual information.
  • Use workbooks to gain deeper insights into suspicious entities and activities.
  • Create automation rules to streamline incident handling and reduce repetitive investigations.
  • Close incidents with appropriate classifications to maintain accurate records.

Who is this Lab For?

This lab is designed for:

  • SOC Analysts seeking hands-on experience in managing incidents in Microsoft Sentinel.
  • Security Professionals interested in learning how to use Sentinel's playbooks, workbooks, and automation features effectively.
  • IT Professionals and Students looking to understand real-world security workflows and enhance their incident management skills.