Azure Sentinel News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
Azure Sentinel News
No Result
View All Result
Home Security and Compliance

Shortcut Way to Enable Azure Sentinel Analytics Rules

Azure Sentinel News Editor by Azure Sentinel News Editor
December 30, 2020
in Security and Compliance
0
ForgeRock integrates with Microsoft, Auth0 launches marketplace to secure enterprise digital identity
4.6kViews
840 Shares Share on Facebook Share on Twitter

One of the things we’re not quite clear about in our documentation is that enabling Analytics Rules is part of the overall setup of Azure Sentinel. I can’t count the number of times I have worked with customers who have stood-up Azure Sentinel and enabled the Data Connectors they want, but then are left scratching their heads for what’s next. Enabling Analytics Rules is the next step and really should be part of the Data Connector enablement.

We’ve done a much better job recently by providing the ability to enable associated Analytics Rules within the Data Connectors pages themselves on the “Next Steps” tab (as shown below).

However, it’s still a tedious task to enable all applicable Analytics Rules. Even though we’ve added the “Create Rule” action button on the page, you still have to click through each provided Analytics Rule, which can take time. The Office 365 connector, for example, currently has 18 applicable Analytics Rules which can seem like a lifetime to ensure each is enabled. My hope is that eventually we’ll provide the ability to multi-select Analytics Rules and click one “Enable Rule(s)” action button to kick off the process. But, for now, you still have to enable each rule individually – which means being presented with the enablement step-through wizard.

Analytics Rule Wizard

The ability to click-through the Wizard steps allows you to adjust the logic, schedule, threshold, noise, etc. for the Analytics Rule. You should definitely go back through the Wizard for each Analytics Rule over time to adjust it to better first your organization’s security personality, but, truthfully, just enabling the Analytics Rule is the key to finalizing setup and causing Azure Sentinel to begin engaging, analyzing, and alerting on the data you are ingesting.

To do this, you don’t have to run through the entire Wizard. To simply enable the rule, skip to the end by the clicking directly on the Review and Create step and choosing Create. Once enabled, the UI will direct you back to the list of other applicable Analytics Rules so you can shortcut the process for each one..

Not as quick as it would be if multi-select and enable was an option, but definitely a lot quicker than stepping through the Wizard each time.

Reference: https://azurecloudai.blog/2020/07/07/shortcut-way-to-enable-azure-sentinel-analytics-rules/

Azure Sentinel News Editor

Azure Sentinel News Editor

Related Posts

Vectra AI and Microsoft partner on security integration
Security and Compliance

Replay Now Available – Microsoft Security Insights 036: Azure Sentinel with Rod Trent

February 8, 2021
What’s new: Microsoft Teams connector in Public Preview
Security and Compliance

eBook Available for Managing Azure Sentinel with PowerShell

January 6, 2021
Microsoft is quietly becoming a cybersecurity powerhouse
Security and Compliance

Official Azure Sentinel PowerShell Module Released

January 4, 2021
Next Post
Improve security with Azure Sentinel, a cloud-native SIEM and SOAR solution

Sharing Workbook Data Outside Azure Sentinel with Non-analysts

Open Systems Augments its Cybersecurity Capabilities With Acquisition of Leading Microsoft Azure Sentinel Expert

Pinning Entire Azure Sentinel Workbooks to Azure Dashboards

With new release, CrowdStrike targets Google Cloud, Azure and container adopters

Tips for Parsing Syslog to Azure Sentinel

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

  • 21.8M Fans
  • 81 Followers

Recommended

Microsoft is quietly becoming a cybersecurity powerhouse

Microsoft is quietly becoming a cybersecurity powerhouse

3 months ago
Microsoft announces Azure Sentinel SIEM general availability

Microsoft announces Azure Sentinel SIEM general availability

4 months ago
CRITICALSTART Adds Support for Microsoft Azure Sentinel to MDR Services

Compliance Reporting for Azure

3 months ago
Vectra AI and Microsoft partner on security integration

What’s New: Cross Workspace Hunting is now available!

3 months ago

Instagram

    Please install/update and activate JNews Instagram plugin.

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

Topics

anomaly automation Azure Azure DevOps Azure Security Center Azure Sentinel Azure Sentinel API Azure Sentinel Connector BlueVoyant Call cybersecurity Detection file GitHub Hunting Huntingy IAC incident response Incident Triage infrastructure as code Investigation jupyter LAQueryLogs MDR Microsoft microsoft 365 mssp Multitenancy Notebooks Pester Playbooks PowerShell python Records Security Sentinel Sharing SIEM signin Supply Chain teams Threat hunting Watchlists Workbooks XDR
No Result
View All Result

Highlights

New Items of Note on the Azure Sentinel GitHub Repo

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

New Search Capability for Azure Sentinel Incidents

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

Changes in How Running Hunting Queries Works in Azure Sentinel

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

Trending

What’s new: Microsoft Teams connector in Public Preview
IR

How to Generate Azure Sentinel Incidents for Testing

by Azure Sentinel News Editor
February 26, 2021
0

Do you want to generate an Incident in Azure Sentinel for testing/demoing? Here’s a couple easy ways...

What’s new: Microsoft Teams connector in Public Preview

Azure Sentinel Notebooks Loses It’s Preview Tag

February 25, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

February 22, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

New Items of Note on the Azure Sentinel GitHub Repo

February 18, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

February 17, 2021

We bring you the best, latest and perfect Azure Sentinel News, Magazine, Personal Blogs, etc. Visit our landing page to see all features & demos.
LEARN MORE »

Recent News

  • How to Generate Azure Sentinel Incidents for Testing February 26, 2021
  • Azure Sentinel Notebooks Loses It’s Preview Tag February 25, 2021
  • The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting February 22, 2021

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

[mc4wp_form]

Copyright © 2020 - Azure Sentinel News

No Result
View All Result
  • Home
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence

Copyright © 2020 Azure Sentinel News