<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Atomic Entra | Discussing all things Microsoft Identity]]></title><description><![CDATA[Sharing my thoughts and experiences around the Microsoft Entra and Identity Architecture]]></description><link>https://blog.atomicentra.com</link><image><url>https://substackcdn.com/image/fetch/$s_!UMnx!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fbba78-bc52-4b95-958d-ad49f7a20c6f_1024x1024.png</url><title>Atomic Entra | Discussing all things Microsoft Identity</title><link>https://blog.atomicentra.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 11:15:43 GMT</lastBuildDate><atom:link href="https://blog.atomicentra.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Gabe Corsini]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[gabecorsini@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[gabecorsini@substack.com]]></itunes:email><itunes:name><![CDATA[Gabe Corsini]]></itunes:name></itunes:owner><itunes:author><![CDATA[Gabe Corsini]]></itunes:author><googleplay:owner><![CDATA[gabecorsini@substack.com]]></googleplay:owner><googleplay:email><![CDATA[gabecorsini@substack.com]]></googleplay:email><googleplay:author><![CDATA[Gabe Corsini]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Welcome to Atomic Entra!]]></title><description><![CDATA[On shifting my focus and the fear of "Rebranding"]]></description><link>https://blog.atomicentra.com/p/welcome-to-atomic-entra</link><guid isPermaLink="false">https://blog.atomicentra.com/p/welcome-to-atomic-entra</guid><dc:creator><![CDATA[Gabe Corsini]]></dc:creator><pubDate>Thu, 19 Mar 2026 19:06:41 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/23d52df4-49ba-4294-ab44-001c9482e8ce_2320x464.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8UVw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8UVw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 424w, https://substackcdn.com/image/fetch/$s_!8UVw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 848w, https://substackcdn.com/image/fetch/$s_!8UVw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 1272w, https://substackcdn.com/image/fetch/$s_!8UVw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8UVw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png" width="728" height="145.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:291,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:1391777,&quot;alt&quot;:&quot;Gemini made this. Sometimes it makes cool pictures.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.atomicentra.com/i/191494512?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="Gemini made this. Sometimes it makes cool pictures." title="Gemini made this. Sometimes it makes cool pictures." srcset="https://substackcdn.com/image/fetch/$s_!8UVw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 424w, https://substackcdn.com/image/fetch/$s_!8UVw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 848w, https://substackcdn.com/image/fetch/$s_!8UVw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 1272w, https://substackcdn.com/image/fetch/$s_!8UVw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5aa287e6-80a1-4ce7-89d7-3aae58b9063b_2320x464.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>When I initially started this blog, I wasn&#8217;t always 100% sure what I wanted to talk about. I was younger in my career, going through a lot of change in my personal life with career shifts and moving my family across the country, and generally interested in everything under the sun when it came to the Microsoft cloud ecosystem. At the time I put a lot of focus on Microsoft Sentinel and Microsoft XDR as those were the tools I was embedded in every day. I was a Solutions Engineer at a small MSP as well as one of our Security SMEs, supporting a highly regulated industry for a niche community (CMMC is a trigger word for me now). I was in a pivotal point of my career where I wanted to spend some time specializing, but wasn&#8217;t sure where I really wanted my focus to go. <br><br>Last year I shifted to a consultant role at a reputable firm and have spent some time re-exposing myself to all the possibilities in the Microsoft cloud ecosystem. With the latest changes in Identity Security and the mass exposure to Agentic AI solutions, Identity has become a topic I just can&#8217;t ignore. Zero trust adoption remains a critical pillar of adoption for any organization serious about transitioning to the cloud. Agents and workload identities continue to expand the attack surface of who (or what we need to protect). Architecting robust identity solutions will, in my opinion, be what fundamentally makes or breaks the security postures of all businesses as we enter into this new AI-driven landscape. </p><h2>Enter, Atomic Entra</h2><p>Atomic Entra is simply my way of saying that I want to share as much of what I know, and what I&#8217;m learning, in the Microsoft Identity ecosystem. With the fast evolution of Entra as the center of Microsoft&#8217;s identity universe, and the vast number of organizations reducing their reliance on the legacy architecture that is Active Directory, I have become increasingly fascinated and busy with the Identity problems of today. &#8220;Atomic&#8221; is, simply put, my way of saying that I want to keep it focused and try and make it simple for as many people as I can. Whether it&#8217;s a video on TikTok, a LinkedIn post, or this newsletter, I want to distill as much as I can into a format that allows anyone learning Entra or trying to improve their environment can take action on what I can share. </p><p>This doesn&#8217;t come without trepidation. I suffer from what I, kindly, refer to as &#8220;Shiny Object Syndrome.&#8221; For years I&#8217;ve hopped from cool thing to cool thing, never quite being able to answer the question of &#8220;What do I want to do when I grow up.&#8221; It wasn&#8217;t until I started giving myself the ability to focus my efforts on a single topic, and diving deeply into the weeds on certain problems, that I started to discover that answer. That commitment now, however, does give me pause as I also have to be able to admit that I didn&#8217;t have that drive and focus previously, and this could come off as &#8220;yet another pivot&#8221; or shiny object. I didn&#8217;t give myself the chance to dive deeply into any one thing. A large part of that, if I were to self-diagnose myself, was due to imposter syndrome and never quite believe that I had anything worth sharing. I aim to overcome this hurdle for myself, and finally give myself the space to share with whoever is willing to listen.</p><h2>What&#8217;s Next?</h2><p>I intend to, as I learn more and work to solve more Identity problems, share as much as I can with as wide of an audience as I can. Between my <a href="https://tiktok.com/@atomicentra">TikTok</a> account, <a href="https://linkedin.com/in/gabe-corsini">LinkedIn</a>, and this <a href="https://blog.atomicentra.com">newsletter</a>, my goal is simple:</p><p><em>Share knowledge about Microsoft Entra and work to solve the big identity problems.</em></p><p>I hope you&#8217;ll join me, and find something useful along the way. <br><br>Thanks for being here, and I look forward to sharing more soon!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Atomic Entra | Discussing all things Microsoft Identity! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[In-Depth Sentinel Part 1: What is it and Why use it?]]></title><description><![CDATA[Going Cloud Native with Microsoft's SIEM and SOAR Platforn]]></description><link>https://blog.atomicentra.com/p/in-depth-sentinel-part-1-what-is</link><guid isPermaLink="false">https://blog.atomicentra.com/p/in-depth-sentinel-part-1-what-is</guid><dc:creator><![CDATA[Gabe Corsini]]></dc:creator><pubDate>Tue, 02 Sep 2025 20:26:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Wk7b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>A quick note before we get started. It&#8217;s been a little over a year since my last article. A large part of my absence has been simply due to life and life changes. I purchased and moved my family into a new home. My previous job underwent many changes with my responsibilities shifting seemingly like the unpredictable nature of the wind. I left that job for a new role, a Microsoft Cloud Security consulting position at a reputable firm. Now I&#8217;m finally feeling like things have settled down to a degree where taking on some more writing might be feasible. I won&#8217;t attempt to convince you that this will be consistent and life won&#8217;t again interfere, but I will do my best to continue providing whatever I can so I can share my experiences with these amazing tools and techniques I&#8217;ve come to build a career around. <br><br>Enjoy, and thank you for reading. </em></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Wk7b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Wk7b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 424w, https://substackcdn.com/image/fetch/$s_!Wk7b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 848w, https://substackcdn.com/image/fetch/$s_!Wk7b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 1272w, https://substackcdn.com/image/fetch/$s_!Wk7b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Wk7b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png" width="1024" height="370" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:370,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:802148,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.corsec.io/i/172407496?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feba56962-6b95-4aae-961b-5655117a5143_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Wk7b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 424w, https://substackcdn.com/image/fetch/$s_!Wk7b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 848w, https://substackcdn.com/image/fetch/$s_!Wk7b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 1272w, https://substackcdn.com/image/fetch/$s_!Wk7b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13be8301-3584-4e3f-a4ec-df5f27ca378d_1024x370.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>When you ask ChatGPT for a cool banner for your article about Microsoft Sentinel and this is what it gives you&#8230;.</em></figcaption></figure></div><h3>What&#8217;s Microsoft Sentinel?</h3><p>As organizations the world over continue to increase their adoption of cloud services, it only makes sense that security event management would require a cloud native solution as well. While AWS has tools like CloudTrail, and GCP has Chronicle, Microsoft has brought their own solution to the table. Microsoft Sentinel is a cloud native Security Information and Event Management (SIEM) platform that can ingest log data from Microsoft 365, Azure Services, Cloud Service Providers like AWS and GCP, and on-premises severs to help organizations detect and respond to potential threats in your environment. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CorSec | Discussing Microsoft's Security Ecosystem! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Sentinel is packed to the brim with features like threat intelligence feeds, investigation graphs, MITRE ATT&amp;CK coverage, automation rules, prebuilt and custom analytics, workbooks for visualization and notebooks for analysis, and the list goes on. Being cloud native also means Sentinel is scalable, removing the requirement to scale the service yourself and letting Microsoft do the heavy lifting as your SOC and telemetry expand. There are even AI and machine learning features baked in to enrich alert data and aid in event correlation. </p><p>All that to say, Microsoft Sentinel is great on paper, and certainly an enticing option if you&#8217;re considering leaving your current SIEM for a more cloud-centric approach. But why might you actually consider using it? When does it make sense? Let&#8217;s talk about it. </p><h3>When and Why to use Microsoft Sentinel?</h3><p>Organizations looking to either implement a SIEM for the first time or move away from their existing SIEM to something new can feel inundated by the number of choices that exist. A simple google search for &#8220;SIEM tools&#8221; would give you:</p><ul><li><p>Microsoft Sentinel (duh)</p></li><li><p>Splunk</p></li><li><p>Exabeam</p></li><li><p>CrowdStrike Next-Gen SIEM</p></li><li><p>Elastic SIEM</p></li><li><p>Google Chronicle</p></li><li><p>AWS CloudTrail and Guard Duty (I guess these together are kind of a SIEM solution? I can&#8217;t be sure&#8230;)</p></li><li><p>And on, and on, and on&#8230;.</p></li></ul><p>This list is only a fraction of the available offerings on the market today and if you were left to figure out which one you needed, you&#8217;d be reviewing offerings and doing demos for weeks. There also isn&#8217;t a one size fits all solution as every organization has different and unique requirements that will weigh heavily on their final decision. To help you determine if Microsoft Sentinel is a good choice for your organization, I&#8217;ve come up with a few criteria that might put Sentinel at the top of the list:</p><ol><li><p><strong>Your Organization heavily uses Microsoft 365 and Azure.</strong></p></li></ol><p>This one might seem obvious to most, and that&#8217;s probably a good thing. It goes without saying that if you&#8217;ve already heavily invested in M365 for collaboration, and are building your applications in Azure, that having Sentinel as your SIEM only makes sense. With all the first-party Data Connectors Microsoft has created for ingesting log data from Microsoft services, integration with Microsoft XDR, and Microsoft Automation, Sentinel is a great choice for organizations that are already deeply invested in Microsoft&#8217;s cloud.</p><ol start="2"><li><p><strong>You want your Cloud Provider to automatically scale your SIEM</strong></p></li></ol><p>While this feature may not be unique to Sentinel itself, it&#8217;s still a point in its favor. SIEM solutions that are running in on-premises environments will be entirely managed by the IT team, needing to eventually build multiple servers and manage vast amounts of storage. Solutions that are running in virtualized cloud solutions like AWS EC2 or Azure VMs still have similar issues, even if the virtual infrastructure is handled for you. Log Analytics Workspace, the underlying log management solution that Sentinel sits on top of, is a Platform-as-a-Service offering that removes the need for organizations to manage the infrastructure and scaling and instead lets your focus on collecting the log data your need and building alerts in Sentinel to identify threats. Don&#8217;t get me wrong, there&#8217;s still a cloud consumption cost associated with using Log Analytics and Sentinel, but the convenience of having a scalable SIEM that grows as you can make that tradeoff worthwhile. </p><ol start="3"><li><p><strong>You want a thriving marketplace of third-party connectors</strong></p></li></ol><p>Chances are, if your organization is a large one, Microsoft first-party connectors aren&#8217;t the only ones you need. Maybe you have on-premises firewalls to monitor. A Secure Web Gateway solution. Maybe you even want to monitor your other Cloud Service Provider accounts. Sentinel has you covered. With hundreds of connectors and various solutions supporting them, Sentinel can ingest information from a huge variety of sources, alert on activity, visualize the data with workbooks, and more. Can&#8217;t find a connector that suites your needs? Reach for Microsoft&#8217;s Codeless Connector Framework (CCF) and build the connector you need.</p><div><hr></div><h3>Microsoft Sentinel has a bright future</h3><p>Microsoft Sentinel has grown a lot over the years. I was first introduced to it in 2021 while still Active Duty in the Navy. We were migrating to the Navy away from our legacy on-premises infrastructure and into the cloud, desperately seeking a way to improve collaboration during the pandemic. With a large-scale migration like that comes a need to monitor for potential threats. When I got my hands on Sentinel back then, I got a glimpse into the promise that Microsoft was trying to make. Observe activity across all your environments, in near real time, and hunt threats in a solution that will grow with you. Now in 2025, Microsoft Sentinel continues to aid organizations in that same goal, with better tools and integrations, with advanced AI and machine learning, and so much more on the way.</p><div><hr></div><p>Thanks for tuning in! If this helped you out, let me know! In Part 2, we will be covering the different considerations organizations should make when deploying Sentinel for the first time. Hope to see you there!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CorSec | Discussing Microsoft's Security Ecosystem! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Microsoft Sentinel and Zero Trust]]></title><description><![CDATA["Never Trust. Always Verify."]]></description><link>https://blog.atomicentra.com/p/microsoft-sentinel-and-zero-trust</link><guid isPermaLink="false">https://blog.atomicentra.com/p/microsoft-sentinel-and-zero-trust</guid><dc:creator><![CDATA[Gabe Corsini]]></dc:creator><pubDate>Thu, 08 Aug 2024 19:10:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aotk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>**Quick personal note**: </strong>I normally try to get these posts out once a week, but there may be some delays for the rest of this month, so I apologize in advance. My Wife and I just closed on a new home last week and are in the process of getting ourselves packed up and moved in. Luckily, it&#8217;s a local move but doing it with two small children is no easy feat while still working full time. I appreciate the patience, and I promise there will be some more regular content soon!</p><div><hr></div><p>In the last few years the term &#8220;Zero Trust&#8221; has been used to both define a new security strategy, and as a buzzword to sell more security products. Depending on which one you were marketed, your understanding and <em>trust </em>(see what I did there?) of the phrase could vary wildly. Our goal in today&#8217;s short article is simple:</p><ol><li><p>Define what Zero Trust means and discuss it&#8217;s purpose</p></li><li><p>Discuss how Microsoft Sentinel can support a Zero Trust strategy for an organization.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aotk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aotk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aotk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aotk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aotk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aotk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:166201,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aotk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aotk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aotk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aotk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff51cf94b-022b-4bf2-9166-61b87e796dfd_1024x1024.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">This is what Microsoft Copilot thinks Zero Trust looks like&#8230; Big grain of salt required.</figcaption></figure></div><h3>What is Zero Trust?</h3><p>Zero Trust, by definition, is not a product or a service. It&#8217;s a strategic security approach to designing and implementing a core set of principles in your environment. Those principles are:<br></p><ol><li><p><strong>Verify Explicitly: </strong>Just because I say who I say I am, or tell you I should be here, doesn&#8217;t make it true. Check my creds, cross-check your list, and <em>verify it&#8217;s true.</em></p></li><li><p><strong>Use least privileged access: </strong>No, you don&#8217;t need Global Administrator to reset a password. You get Password Administrator. Use the role that gives you the bare minimum required to do your job, and use Privileged Identity Management (PIM) for Just-in-Time (JIT) access </p></li><li><p><strong>Assume breach: </strong>Just because the alarm bells aren&#8217;t ringing and you&#8217;ve got a fancy new AI-empowered firewall doesn&#8217;t mean there isn&#8217;t someone snooping around. Use encryption, verify everything, don&#8217;t put all your eggs (or in this case, data or network segments) in one basket to be stolen all at once. </p></li></ol><p>This is why the tagline behind Zero Trust is &#8220;Never trust, always verify.&#8221; </p><h3>Where did it come from?</h3><p>The term &#8220;Zero Trust&#8221; was originally coined in 1994 by Stephen Paul Marsh in a doctoral these on computer security. Since that point the term morphed and evolved throughout the different eras of IT until 2018 when research conducted by the National Institute of Standards and Technology (NIST) and the National Cybersecurity Center of Excellence (NCCoE) led to the publication of the <a href="https://csrc.nist.gov/pubs/sp/800/207/final">NIST SP 800-207</a>, Zero Trust Architecture.</p><p>The publication defines Zero Trust as a collection of concepts that reduce uncertainty by enforcing per-request access decision in IT systems and networks that were already viewed as potentially compromised. This led to the concept of Zero Trust Architecture, which is a cybersecurity plan that include all three of the following elements:</p><ul><li><p>Enhanced identity governance and policy-based access controls.</p></li><li><p>Micro-segmentation</p></li><li><p>User overlay networks or <a href="https://cloudsecurityalliance.org/artifacts/software-defined-perimeter-zero-trust-specification-v2">software-defined perimeters</a></p></li></ul><h3>Okay, but how does Sentinel play a part in Zero Trust?</h3><p>Sentinel is Microsoft&#8217;s cloud native security information and event management (SIEM) and security orchestration, automation, and response (SOAR) product that allows organizations to receive and view security events and respond to those events in a variety of automated ways. As both a SIEM and a SOAR tool, Sentinel can support a Zero Trust Architecture in a variety of ways, but here&#8217;s a few that I find to be most significant:</p><ol><li><p><strong>&#8220;Assume Breach&#8221;</strong>: With a core tenant of ZT being the assumption that any organization&#8217;s IT could already be breached, Sentinel provides the tooling to continuously monitor your environment for malicious activity. With its plethora of 1st and 3rd party solutions and connectors, Sentinel can aggregate a huge amount of log data into meaningful alerts and incidents, giving SOC Analysts an opportunity to find threats in near real-time. </p></li><li><p><strong>Automation:</strong> The threat landscape for most organizations is only getting larger. From Internet of Things (IoT) to Bring-your-own-Device (BYOD), and an increasing number of 3rd party SaaS solutions for everything from Collaboration to Sales and Engineering to Marketing, the number of attack vectors a SOC Analyst has to be aware of quickly becomes daunting. With built-in automation in the form of Playbooks and Automation Rules, Sentinel gives Analysts and Hunters the power to handle known threats automatically, freeing them up to look for more obscure threats around critical systems.</p></li><li><p><strong>Integrated Zero Trust Solutions: </strong>A little on the nose, but did you know that Sentinel has a native Zero Trust offering? The Zero Trust (TIC 3.0) solution provided by Microsoft helps organizations respond to Zero Trust principles and the Trusted Internet Connections (TIC) 3.0 initiative. While Zero Trust and TIC 3.0 aren&#8217;t the same, they share a lot of common themes. This solution helps teams from all parts of the organization gain visibility into how their architecture aligns with these two frameworks and provides recommendations for improving your alignment with Zero Trust and TIC 3.0. Make sure you check out the prerequisites so you get the most out of this solution!</p></li></ol><h3>Summary</h3><p>Zero Trust is a valuable framework for securing organizations against threats by adhering to the three core principles of:</p><ul><li><p>Verify Explicitly</p></li><li><p>Use Least Privileged Access</p></li><li><p>Assume Breach.</p></li></ul><p>By integrating Microsoft Sentinel into your Zero Trust architecture, organizations can improve their security posture through advanced threat detection, automated response, and comprehensive visibility. Sentinel&#8217;s capabilities align seamlessly with Zero Trust principles, providing a robust framework to protect against evolving cyber threats and ensuring a resilient security environment.</p><div><hr></div><h3>Thanks for reading!</h3><p>For those interested, I&#8217;ve put together a short survey so I can get an idea of what content my readers would like to see. If you have a few minutes to spare, I&#8217;d really love to hear from you!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UhVA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UhVA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 424w, https://substackcdn.com/image/fetch/$s_!UhVA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 848w, https://substackcdn.com/image/fetch/$s_!UhVA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 1272w, https://substackcdn.com/image/fetch/$s_!UhVA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UhVA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png" width="261" height="261" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:261,&quot;bytes&quot;:1351063,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UhVA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 424w, https://substackcdn.com/image/fetch/$s_!UhVA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 848w, https://substackcdn.com/image/fetch/$s_!UhVA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 1272w, https://substackcdn.com/image/fetch/$s_!UhVA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd40595d-da92-4bbb-8ab8-cca269bda9b5_1890x1890.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cor Security by Gabe Corsini! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Introduction to Microsoft Sentinel's User and Entity Behavior Analytics]]></title><description><![CDATA[IPs, Hosts, Users, oh my!]]></description><link>https://blog.atomicentra.com/p/introduction-to-microsoft-sentinels</link><guid isPermaLink="false">https://blog.atomicentra.com/p/introduction-to-microsoft-sentinels</guid><dc:creator><![CDATA[Gabe Corsini]]></dc:creator><pubDate>Thu, 25 Jul 2024 22:51:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Foz1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As SOC analysts work to defend their enterprises from a host of threats, one of the more difficult activities is understanding what is &#8220;normal.&#8221; Getting a sense of baseline activities across a variety of different business scenarios can be daunting, especially if your organization allows for a remote workforce and a variety of privileged functions across departments. What if Sentinel could help you with that by correlating logs and alerts from multiple data sources to establish a baseline on a per-entity basis?</p><h3>What is Sentinel&#8217;s User and Entity Behavior Analytics</h3><p>User and Entity Behavior Analytics (UEBA) allows Sentinel to collect logs and alerts from different data sources and build baseline profiles for entities within an organization. Entities can be IP addresses, host devices, users, and applications. Sentinel will analyze this data over time and leverage machine learning capabilities to identify anomalous activity. With all this data, Sentinel can help determine if an entity has been compromised and the blast radius of the compromise and its potential impact. This gives analysts easy prioritization when conducting an investigation or responding to an incident.</p><h3>How does UEBA Work?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Foz1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Foz1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 424w, https://substackcdn.com/image/fetch/$s_!Foz1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 848w, https://substackcdn.com/image/fetch/$s_!Foz1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 1272w, https://substackcdn.com/image/fetch/$s_!Foz1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Foz1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png" width="1456" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Entity behavior analytics architecture&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Entity behavior analytics architecture" title="Entity behavior analytics architecture" srcset="https://substackcdn.com/image/fetch/$s_!Foz1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 424w, https://substackcdn.com/image/fetch/$s_!Foz1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 848w, https://substackcdn.com/image/fetch/$s_!Foz1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 1272w, https://substackcdn.com/image/fetch/$s_!Foz1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a2671ed-0da3-4ecb-8a98-ebc64623663b_1650x702.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Diagram courtesy of Microsoft Learn: <a href="https://learn.microsoft.com/en-us/azure/sentinel/identify-threats-with-entity-behavior-analytics#ueba-analytics-architecture">Advanced threat detection with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel | Microsoft Learn</a></figcaption></figure></div><p>Let&#8217;s break down how the UEBA works from front to back.</p><ol><li><p><strong>Data Collection</strong>: Microsoft Sentinel collects data from various sources, including logs, events, and threat intelligence feeds. UEBA can also collect from Third-party systems and clouds such as on-premises firewalls, AWS, GCP, or Intrusion Detection Systems.</p></li><li><p><strong>Data Processing</strong>: The collected data is processed and normalized to extract relevant entities (e.g., users, devices) and events (e.g., logins, file access). Event correlation and aggregation starts happening at this stage.</p></li><li><p><strong>Behavioral Profiling and Anomaly Detection</strong>: The UEBA engine creates behavioral profiles for each user and entity, capturing their normal behavior patterns. Sentinel leverages machine learning algorithms help identify these patterns against threat intelligence sources and the entity profile, looking for anomalies amongst entity-related data such as location and time period.</p></li><li><p><strong>Risk Scoring</strong>: The UEBA engine assigns a risk score to each user and entity based on their behavior, taking into account factors like anomaly detection, threat intelligence, and user attributes. Risk scoring is continuously updated as new data is ingested and processed.</p></li><li><p><strong>Alerting and Investigation</strong>: When a user or entity exceeds a predefined risk threshold, Microsoft Sentinel generates an alert, allowing security analysts to investigate and respond to potential security threats.</p></li></ol><h3>How do I turn it on and use it?</h3><p>Activating the UEBA features is really straight forward. </p><p><strong>First, some prerequisites:</strong></p><ol><li><p>A Sentinel Workspace &#128526;</p></li><li><p>Global Admin or Security Admin Entra ID Roles</p></li><li><p>Microsoft Sentinel Contributor or Log Analytics Contributor Azure roles</p></li></ol><p><strong>Second, how to turn it on:</strong></p><ol><li><p>Login to the <a href="https://portal.azure.com/">Azure Portal</a></p></li><li><p>In the search bar at the top, Search for and click on Sentinel, then select your workspace.</p></li><li><p>From the Sentinel main page, select &#8220;Settings&#8221; in the Configuration section on the left-hand flyout.</p><ol><li><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FZ51!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FZ51!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 424w, https://substackcdn.com/image/fetch/$s_!FZ51!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 848w, https://substackcdn.com/image/fetch/$s_!FZ51!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 1272w, https://substackcdn.com/image/fetch/$s_!FZ51!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FZ51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png" width="1456" height="814" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:814,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102442,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FZ51!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 424w, https://substackcdn.com/image/fetch/$s_!FZ51!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 848w, https://substackcdn.com/image/fetch/$s_!FZ51!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 1272w, https://substackcdn.com/image/fetch/$s_!FZ51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7a05c1d-e53e-4bc8-b242-bac47b330fe4_1566x875.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ol></li><li><p>Inside the &#8220;Settings&#8221; window, select the &#8220;Settings&#8221; tab and click &#8220;Set UEBA&#8221; under &#8220;Entity Behavior Analytics&#8221;</p><ol><li><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bi1M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bi1M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 424w, https://substackcdn.com/image/fetch/$s_!bi1M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 848w, https://substackcdn.com/image/fetch/$s_!bi1M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 1272w, https://substackcdn.com/image/fetch/$s_!bi1M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bi1M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png" width="1384" height="898" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:898,&quot;width&quot;:1384,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:132308,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bi1M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 424w, https://substackcdn.com/image/fetch/$s_!bi1M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 848w, https://substackcdn.com/image/fetch/$s_!bi1M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 1272w, https://substackcdn.com/image/fetch/$s_!bi1M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d948adf-6438-4728-8889-cfa935cfccfe_1384x898.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ol></li><li><p>In the &#8220;Entity behavior configuration&#8221; menu, flip the &#8220;Turn on UEBA feature&#8221; to &#8220;On&#8221;</p><ol><li><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yPTw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yPTw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 424w, https://substackcdn.com/image/fetch/$s_!yPTw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 848w, https://substackcdn.com/image/fetch/$s_!yPTw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 1272w, https://substackcdn.com/image/fetch/$s_!yPTw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yPTw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png" width="1036" height="699" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:699,&quot;width&quot;:1036,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:46387,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yPTw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 424w, https://substackcdn.com/image/fetch/$s_!yPTw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 848w, https://substackcdn.com/image/fetch/$s_!yPTw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 1272w, https://substackcdn.com/image/fetch/$s_!yPTw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e587bf9-786c-47e3-8aed-03e7f5100c33_1036x699.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ol></li><li><p>Make sure you select the directory service you want to sync entities from. I use Microsoft Entra ID for my tenant.</p></li><li><p>Next, select the data sources you want to enable behavior analytics with. Right now, I just have Audit and Sign-in logs while I continue to configure other features in this Tenant.</p></li></ol><p>Done! UEBA is active and ready to start building those entity profiles!</p><h3>Checking out your UEBA Data</h3><p>Once UEBA is active, you might want to visualize your data and alerts. Right now, there are two main ways that I do that.</p><p><strong>Entity Behavior Dashboard: </strong>The &#8220;Entity Behavior&#8221; menu in the Threat Management section of Sentinel is a built-in dashboard that will give you a way to search for entities and provides a breakdown of alerts by entity type. The best part of the is dashboard is that it can be extended with &#8220;Enrichment Widgets&#8221;, which provides access to supported third-party APIs that can enrich entity data in your environment. Currently available out of the box is VirusTotal, Recorded Future, Anomali, and AbuseIPDB.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vUdf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vUdf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 424w, https://substackcdn.com/image/fetch/$s_!vUdf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 848w, https://substackcdn.com/image/fetch/$s_!vUdf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!vUdf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vUdf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png" width="1294" height="1074" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1074,&quot;width&quot;:1294,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:72800,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vUdf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 424w, https://substackcdn.com/image/fetch/$s_!vUdf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 848w, https://substackcdn.com/image/fetch/$s_!vUdf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!vUdf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ff91c76-ac86-4e46-94e5-0c0f57ce7160_1294x1074.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">My Entity Behavior page is pretty bland and only has data from the Sentinel Training Lab for now.</figcaption></figure></div><p><strong>UEBA Workbook from the Content Hub: </strong>Within the content hub inside Sentinel, you can install the &#8220;User and Entity Behavior Analytics&#8221; workbook. This provides a template Workbook that can help you visualize your UEBA data using KQL queries in a single page. The benefit with the workbook is that, because each section is backed by code, you can modify the Workbook to better display the data that is important to you!</p><h3>Summary</h3><p>In short, User and Entity Behavior Analytics (UEBA) compiles data from multiple sources to create baseline profiles for entities in your organization. Entities can include IP address, host devices, users, and applications. These profiles are created by combining entity related behavior with machine learning models to create a baseline, allow sentinel to allocate a risk score to behaviors that don&#8217;t meet the baseline. This provides SOC Analysts and Threat Hunters with an advanced toolset to monitor entities against their baselines and catch potentially malicious activity before an incident takes place!</p><h3>Resources</h3><p><a href="https://learn.microsoft.com/en-us/azure/sentinel/identify-threats-with-entity-behavior-analytics">Advanced threat detection with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel | Microsoft Learn</a></p><p><a href="https://learn.microsoft.com/en-us/azure/sentinel/enable-entity-behavior-analytics?tabs=azure">Enable entity behavior analytics to detect advanced threats | Microsoft Learn</a></p><p><a href="https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/unleash-the-full-potential-of-user-and-entity-behavior-analytics/ba-p/4031570">New updated version of the User and Entitity Behavior Analytics workbook (microsoft.com)</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cor Security by Gabe Corsini! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[PowerShell and the Microsoft Graph Security API]]></title><description><![CDATA[A brief introduction to the power of PowerShell in Security]]></description><link>https://blog.atomicentra.com/p/powershell-and-the-microsoft-graph</link><guid isPermaLink="false">https://blog.atomicentra.com/p/powershell-and-the-microsoft-graph</guid><dc:creator><![CDATA[Gabe Corsini]]></dc:creator><pubDate>Thu, 18 Jul 2024 21:58:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6b529ad-9168-46b3-a80b-9b596f8c7168_934x934.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As the nature of security operations continues to evolve, so must the tools and the practitioners. With a wide array of new shiny tools on the market, and the continual addition of new programming and query languages hitting the metaphorical shelves at the speed of light, it&#8217;s easy to become disenchanted with the environments we know and trust. This is especially true for those of us who have been embedded in the Microsoft ecosystem for a long time and have migrated into more security-focused roles. Let this serve as a reminder that sometimes the tools we know, and love, can be just as effective as the newer and &#8220;more modern&#8221; solutions. </p><h2>What is Microsoft Graph Security API?</h2><p>The Microsoft Graph Security API is a pivotal element in Microsoft&#8217;s security architecture. It provides a unified interface and schema to integrate with security solutions from Microsoft and ecosystem partners. This empowers organizations to streamline security operations and better defend against increasing cyber threats. The API consolidates and correlates security alerts from multiple sources, automates security tasks, and provides visibility into security data to enable proactive risk management.</p><h2>How do you access the Microsoft Graph Security API?</h2><p>Connecting to the Microsoft Graph Security API requires a few steps:</p><ol><li><p><strong>Register Your Application:</strong> Begin by registering your application with the Microsoft identity platform to obtain an Application ID</p></li><li><p><strong>Configure Permissions:</strong> Assign the necessary permissions to your application in the Azure portal. This typically involves selecting the appropriate API permissions for Microsoft Graph</p></li><li><p><strong>Grant Admin Consent:</strong> An administrator must grant consent for the permissions requested by your application. This step is crucial for the application to access the Microsoft Graph Security API</p></li><li><p><strong>Obtain an Access Token:</strong> Use OAuth 2.0 to acquire an access token from the Microsoft identity platform. This token will be used to authenticate API calls</p></li><li><p><strong>Make API Calls:</strong> With the access token, your application can make authenticated calls to the Microsoft Graph Security API and access the required security data</p></li></ol><p>For more specific details on how to connect, check out <a href="https://learn.microsoft.com/en-us/graph/security-authorization#grant-permissions-to-an-application">this document</a> from Microsoft.</p><h2>How can we leverage PowerShell with the Microsoft Graph Security API?</h2><p>PowerShell, as a first-class citizen of the Microsoft ecosystem, is a fantastic tool to leverage the Microsoft Graph Security API. PowerShell is usually pre-installed on all Windows workstations without the need for additional configuration, and has the capability to make HTTP requests against REST endpoints like the Graph API without needing any additional modules!</p><p>Check out this example of connecting to the Graph Security API and querying the endpoint to get a list of alerts:</p><pre><code># Authenticate and connect to the Microsoft Graph Security API
$tenantId = "&lt;Your-Tenant-ID&gt;"
$appId = "&lt;Your-App-ID&gt;"
$appSecret = "&lt;Your-App-Secret&gt;"
$resource = "https://graph.microsoft.com"
$tokenEndpoint = "https://login.microsoftonline.com/$tenantId/oauth2/token"
$body = "resource=$resource&amp;client_id=$appId&amp;client_secret=$appSecret&amp;grant_type=client_credentials"
$oauth = Invoke-RestMethod -Method Post -Uri $tokenEndpoint -Body $body -ContentType "application/x-www-form-urlencoded"

# Set the header with the access token
$headers = @{'Authorization' = "Bearer $($oauth.access_token)"}

# Query the Microsoft Graph Security API for alerts
$alertsUrl = "https://graph.microsoft.com/v1.0/security/alerts"
$alerts = Invoke-RestMethod -Uri $alertsUrl -Headers $headers -Method Get

# Output the list of alerts
$alerts.value</code></pre><p><strong>Note: </strong>Be sure to customize the above script template with your tenant&#8217;s specific information.</p><h2>The Point</h2><p>PowerShell, having been around for nearly 2 decades, can look like an outdated tool at first glance. But don&#8217;t be fooled! With the updates that have been brought to PowerShell in recent years, the introduction of Graph API, and its tight integration with Azure and M365, PowerShell for Security in a Microsoft environment is still an excellent choice for automation, data enrichment, and administration across the board. If you want to learn more, check out some of the links in the resources section to get started with PowerShell, Microsoft Graph API, and Microsoft Graph Security API.</p><h3>Resources</h3><ul><li><p><a href="https://learn.microsoft.com/en-us/graph/overview?context=graph%2Fapi%2F1.0&amp;view=graph-rest-1.0">Microsoft Graph overview - Microsoft Graph | Microsoft Learn</a></p></li><li><p><a href="https://learn.microsoft.com/en-us/graph/api/resources/security-api-overview?view=graph-rest-1.0">Use the Microsoft Graph security API - Microsoft Graph v1.0 | Microsoft Learn</a></p></li><li><p><a href="https://learn.microsoft.com/en-us/training/paths/get-started-windows-powershell/">Get started with Windows PowerShell - Training | Microsoft Learn</a></p></li><li><p><a href="https://learn.microsoft.com/en-us/training/paths/powershell/">Automate administrative tasks by using PowerShell - Training | Microsoft Learn</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cor Security by Gabe Corsini! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is Atomic Entra | Discussing all things Microsoft Identity.]]></description><link>https://blog.atomicentra.com/p/coming-soon</link><guid isPermaLink="false">https://blog.atomicentra.com/p/coming-soon</guid><dc:creator><![CDATA[Gabe Corsini]]></dc:creator><pubDate>Wed, 17 Jul 2024 03:34:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UMnx!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F80fbba78-bc52-4b95-958d-ad49f7a20c6f_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is Atomic Entra | Discussing all things Microsoft Identity.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://blog.atomicentra.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://blog.atomicentra.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>