Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Task 5.1: Explore an incident

In this task, you’ll explore an incident using the Sentinel Incidents blade.

The following document may help you understand incident investigation.


  1. If necessary, open Microsoft Edge, go to the Azure Portal, then sign in using these credentials:

       
    Username @lab.CloudPortalCredential(User1).Username
    Password @lab.CloudPortalCredential(User1).Password

    If you encounter the Welcome to Microsoft Azure screen, select Get started and then select Skip for the next two screens.

  2. In the Search bar of the Azure portal, type Microsoft Sentinel, then select Microsoft Sentinel.

  3. In the list of Microsoft Sentinel Workspaces, select the workspace named MSSen2Go*.

    select_mssen2go.png

  4. In the left menu, under Threat management, select Incidents.

  5. Review the list of incidents.

    The Analytics rules are generating alerts and incidents on the same specific log entry. Remember that this was done in the Query scheduling configuration to generate more alerts and incidents to be utilized in the lab.

  6. Select one of the Startup RegKey incidents.

  7. Review the incident details on the right blade that opened. Scroll down and select the View full details button.

    startup_regkey_incident.png

    If the “New incident experience” pop-up appears, follow the prompts by reading the information and selecting the Next button.

    If you encounter an “Unknown error 0” issue when viewing the full details, perform the following actions before continuing:

    • Refresh the Browser by pressing F5 or Ctrl-F5

    If refreshing the browser doesn’t correct the issue, attempt the following:

    • Delete the Startup RegKey rule from the Microsoft Sentinel - Analytics blade
    • Recreate the Startup RegKey using the instructions from Exercise 4 Task 1.

    delete_analytics_rule.png

  8. On the left blade of the incident, change the Status to Active.

    set_incident_active.png

  9. Scroll down to the Tags area, select + and enter RegKey and select OK.

    incident_tag.png

  10. Scroll down and in the Write a comment… box enter I will research this and select the > icon to submit the new comment.

    incident_comment.png

  11. Hide the left blade by selecting the « icon next to the owner.

    hide_blade.png

  12. Review the Incident timeline window. Select the Incident Actions button at top-right, and then select Run playbook.

    run_playbook.png

    The Run playbook on incident blade allows you to view and select the active playbooks and run them manually. Since you haven’t configured any playbooks as part of this lab you won’t see any listed here.

  13. Close the Run playbook on incident blade by selecting the X icon in the upper right.

    close_run_paybook_on_incident.png

  14. Review the Entities window. At least the Host entity that we mapped within the KQL query from the previous exercise should appear.

    If no entities are shown, refresh the page.

    entities_window.png

  15. To open the Incident tasks blade select the Tasks button from the command bar.

    incident_tasks_blade.png

  16. Select + Add task, in the Title box type Review who owns the machine and then select Save.

    incident_tasks_add.png

  17. Close the Incident tasks blade by selecting the X icon in the upper right.

  18. Select the Activity Log button from the command bar and review the actions you’ve taken during this exercise.

    incident_activity_log.png

  19. Close the Incident activity log blade by selecting Close at the lower right.

  20. From the almost hidden left blade, select the user icon named Unassigned. The new incident experience allows quick changes from here.

  21. Select Assign to me and then scroll down to select Apply to save the changes.

    incident_assign_to_me.png