Dashboards
33 TopicsAzure Sentinel how to clear Threat Intelligence Indicator table
Is there a way to do a bulk delete of all indicators? I have the DShieldScanningIPs source with over 100 thousand IP and I'd like to delete them all but it appears I can only delete 100 of them at a time. This will take a while.5.3KViews0likes4CommentsAzure Sentinel Workbook & Azure Dashboard Sharing to external B2B guest users
Hi, I am trying to share Azure Sentinel Workbooks (custom) & as well as Azure Dashboards to external guest users i.e. Azure B2B user accounts but not able to share it. I get error even after of assigning appropriate RBAC roles (mostly tried Azure Log analytics Reader, Azure Sentinel Reader & Reader) at different levels. Please note: This sharing is for external B2B users. Appreciate your response. Thanks.Solved4.3KViews0likes6CommentsKQL to count current enabled, disabled analytic rules
Hi, Would like some help in an KQL query to count the number of enabled and disabled analytic rules for entry into a workbook. Plus a simple count of connected data connectors so the number reflects the overview number and not all the enabled data types. Many thanks, Tim3.1KViews0likes1CommentSentinel Creating Multiple AlertIDs/IncidentNumbers for Multiple Events
Hey there, This one is really giving me hard times as I can't quite understand why or how to fix this. In Sentinel, we run a log search in the LAW, and we get a full list of SecurityIncidents using the below. SecurityIncident | where TimeGenerated > ago(30d) This is fine. It gives us a fill list of all SecurityIncidents in the last 30 days. However, it brings up a total of 1000 incidents, when we've only seen 325. The remaining 675 are all duplicated in some way. Either duplicate AlertID or Incident Numbers. This really messes with my reports, as I us these to get understanding on how many incidents we see. But it's nearly impossible when the values are skewed before I even get them out of Sentinel. With that being said, I've tried to use the following KQL to get more defined metrics, but this still doesn't work. SecurityIncident | where TimeGenerated > ago(30d) | summarize any(IncidentName) by Title, Description, ClosedTime,Status,TimeGenerated,IncidentNumber The Distinct operator also doesn't seemingly work, unless I'm using it in the wrong way. Any help would be greatly appreciated, as I am really struggling with this one! Kind Regards., C.Solved2.3KViews0likes3CommentsSentinel Issues and out of service sometimes
Hello, Sometimes we have a problem with sentinel data retrieving, no statistic are shown in overview and the taps is just loading, for example logs, the pages are just loading, it's not internet issue, as we testing from different networks. For example yesterday, there are some analytics we are working in that for testing, the used KQL query of that rule is retrieving data in logs, but when apply it in analytic rule, there are no result, and it's delayed to up of 2h. Our LAW location is in West Europe Is it a global issue?Solved2.2KViews0likes1CommentFill zero in the table for timechart
Hi, I would like to create a timechart for high daily number of incident in the past 7-day. However, not everyday has high incident. How could I fill the 0 into the result if that day has no high incident? I had the similar ticket before: https://techcommunity.microsoft.com/t5/microsoft-sentinel/barchart-when-the-returned-result-is-zero/m-p/3219799#M9144 I am not sure if i need to create the dynamic object for the past 7-day. Thanks. SecurityIncident | where Severity == "High" | summarize StartTime = startofday(min(TimeGenerated)), count() by Severity, IncidentNumber | summarize count() by bin(StartTime,1d)2.2KViews0likes4CommentsFirewalls Integration with Sentinel
Hello, We have integrated F5 (WAF Firewall) and Palo Alto firewall with Microsoft Sentinel, using CEF Collector, the Logs received in the server of CEF collector are have all the values of events as we see using tcpdump to capture that logs, but when trying to see that logs in CommonSecurityLogs table, there are some fields missing like ExternalId of event linked with Firewall, which is important for referencing the event in Sentinel with event in Firewall. Is there any method to fetch these missing field, i'm thinking the out of box connector using logic app can implement this, but i want to ask if there is another method for that. Thank you1.7KViews0likes2Comments