Using Azure Sentinel with Azure App Gateway to Investigate Web Attacks – Part 5 Incidents

The previous blog post part 4, I have shown how to create Analytics rules that alert for SQL Injection attacks.

I will show the incidents that are generated from this rule to do further investigation. Your organization may have a cyber security team that will monitor, analyze and investigate incidents to evaluate threats. Incidents investigation and having the workflow to manage the lifecycle is one of the essential capabilities of a Security Incident Event Management (SIEM) system. As part of an investigation, it is assigned to an appropriate subject matter expert. And then determine the next steps, such as disregard due to a false-positive, contain the threat, quarantine, block the source of threat, document in knowledge base or more.

In the incidents blade, you can see a list of incidents generated by the analytics rule I have created.

  1. The incident item with an autogenerated incident ID. In this case 54 and some metadata properties.
  2. The ability to change the severity, change the status to ‘In Progress’, and assign to a specific individual. This a user account in the Azure AD directory.
  3. Clicking on View full details

The View full details shows 738 events and other details to help triage and understand in the incident.

By clicking into events in the two links marked with the red box, the log query will open up to see the records. One can alter the query to analyze the data further by querying for more fields, filtering and checking other date ranges. You can learn more about the Kusto query language reading https://docs.microsoft.com/en-us/azure/kusto/query/

As a next step as part of triaging incidents, the incident be updated in terms of its severity level, status and assigned owner.

Currently it is

And can be updated to

As the roy@roykim.ca user, I login into portal.azure.com and visit Azure Sentinel. To setup the permissions, I did the following

  1. In the resource group of the log analytics workspace (i.e. rkimOMS), for adding new role assignment with contributor role to roy@roykim.ca. This is so that this user can add the existing log analytics workspace to their Azure Sentinel as a one time step. Good practice to remove this role assignment afterwards for least privilege principles.
  2. In the log analytics workspace (i.e. rkimOMS), add new role assignment with Azure Sentinel Responder role to roy@roykim.ca to be able to read and update incidents.

For more information on Azure Sentinel permissions, read https://docs.microsoft.com/en-us/azure/sentinel/roles

This user can see as follows and then investigate and respond to the incidents assigned.

In clicking the details, the query is shown which is the same one used for the analytics rule. It shows the IP address for the client. I have redacted the IP in the screenshot for security reasons.

Knowing this IP address, the security analyst handling this incident may take further action by recommending IP restriction and denying this IP at the network firewall.

To close of this incident, I set the status as closed and add some comments.

I have shown end to end the life cycle of handling an Azure Sentinel incident.

Next we will looking at Hunting in Azure Sentinel in blog post Part 6.

3 thoughts on “Using Azure Sentinel with Azure App Gateway to Investigate Web Attacks – Part 5 Incidents

  1. Pingback: Using Azure Sentinel with Azure App Gateway to Investigate Web Attacks – Part 4 Analytics – Roy Kim on Azure, Office 365 and SharePoint

  2. Pingback: Using Azure Sentinel with Azure App Gateway to Investigate Web Attacks – Part 6 Hunting – Roy Kim on Azure, Office 365 and SharePoint

  3. Pingback: Using Azure Sentinel with Azure App Gateway to Investigate Web Attacks – Part 1 Intro – Roy Kim on Azure, Office 365 and SharePoint

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s