Book Image

Learn Azure Sentinel

By : Richard Diver, Gary Bushey
Book Image

Learn Azure Sentinel

By: Richard Diver, Gary Bushey

Overview of this book

Azure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you’ll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You’ll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you’ll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you’ll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you’ll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues.
Table of Contents (22 chapters)
1
Section 1: Design and Implementation
4
Section 2: Data Connectors, Management, and Queries
9
Section 3: Security Threat Hunting
14
Section 4: Integration and Automation
17
Section 5: Operational Guidance

Chapter 5

  1. You need to filter the StormEvents table by all the states that are set to California (remember the case-sensitive versus not case-sensitive filters) and then get a count of those rows. You could cheat and look at the output of the first two lines of the following code in the ADE, but that isn’t really the best way to get the answer, which is 898:
    StormEvents
    | where State =~ “California”
    | summarize count()
  2. This entails looking at the StormEvents table and getting just one instance of each State. Use the distinct operator for this:
    StormEvents
    |  distinct State
  3. You will need to look at the DamageProperty field in the StormEvents table and make sure it is greater than 10,000 and less than 15,000:
    StormEvents
    | where DamageProperty >10000 and DamageProperty <15000
  4. You have three out of the four columns needed in the StormEvents table already. The fourth column, the one for the total amount of damage, can be created by adding the DamageProperty...