Skip to content

Deploying hunting workbooks

Edoardo Gerosa edited this page Jul 11, 2020 · 20 revisions

Within Sentinel, workbooks are made available as a means to build richer and more interactive dashboards over log analytics workspaces. Workbooks can be used to build more powerful dashboards with better drill-down capabilities without having to leverage the full-power and granularity offered by Jupyter notebooks.

It is recommended to read the official Microsoft documentation to get an understanding of how workbooks function.

Overview

The hunting folder contains a Sysmon threat hunting workbook inspired by Olaf Hartong's Splunk ThreatHunting App.

The current threat hunting workbook release contains the following tabs:

To deploy the included hunting workbooks follow the below steps:

NOTE: If you have already deployed Sentinel-ATT&CK by following the getting started guide you can skip the below steps as the Sysmon threat hunting workbook will have already be deployed.

Required: First make sure you have configured the required whitelisting functions in your Sentinel environment and that you understand how to use Sentinel-ATT&CK whitelists

  1. Sign into your Azure portal
  2. Head to the Sentinel blade and then click on workbooks under the Threat Management menu
  3. Download or copy to clipboard the Sysmon threat hunting workbook JSON provided
  4. Click Add Workbooks
  5. Click the edit button
  6. Click on the advanced editor button "</>"
  7. Within the Gallery Template copy-paste the Sysmon threat hunting workbook json
  8. Click Apply
  9. Click on the Save button

A GIF outlining the process above can be seen at the link below:

View GIF