Investigating and Handling Incidents in Microsoft Sentinel
Learn to handle incidents in Microsoft Sentinel by investigating suspicious activity, analyzing IP insights, and automating responses with custom rules.
Skills You'll Learn

Lab Modules
Lab Overview
Effective incident handling is a crucial skill for SOC analysts in mitigating potential security threats. In this lab, you'll explore Microsoft Sentinel's incident management capabilities by investigating and responding to a real-world scenario, "Sign-ins from IPs that attempt sign-ins to disabled accounts." This step-by-step walkthrough will guide you through initial incident triage and leveraging workbooks to uncover deeper insights into suspicious activity. You'll also create automation rules to reduce investigation noise and close incidents with appropriate classifications.
Objectives
Upon completion of this lab, you will be able to:
- Investigate and triage security incidents in Microsoft Sentinel.
- Enrich incidents with geolocation and additional contextual information.
- Use workbooks to gain deeper insights into suspicious entities and activities.
- Create automation rules to streamline incident handling and reduce repetitive investigations.
- Close incidents with appropriate classifications to maintain accurate records.
Who is this Lab For?
This lab is designed for:
- SOC Analysts seeking hands-on experience in managing incidents in Microsoft Sentinel.
- Security Professionals interested in learning how to use Sentinel's playbooks, workbooks, and automation features effectively.
- IT Professionals and Students looking to understand real-world security workflows and enhance their incident management skills.
