Jaysec
Jaysec

Reputation: 37

Azure Sentinel referencing large sets of data

I've been trying to find the most effective (elegant) solution to achieve what I'm trying to do. I'd like to hear from the community, thank you.

Situation:

Issue:

Options considered:

  1. Ingest the reference table into the log analytics workspace, do a join/lookup to this custom reference table for enrichment
  2. Export the IP addresses from SigninLogs table to a blob storage, enrich the IP address using logicapps, and then put it back to a 'reference' blob storage. then read the 'reference' blob storage using 'externaldata' syntax.

Limitation Observed:

Upvotes: 0

Views: 748

Answers (2)

roflmaowpimp
roflmaowpimp

Reputation: 111

Since March 2022, you can upload large CSV files into a Sentinel Watchlist. This way, you can upload a complete GeoIP database and perform ipv4_lookups. This blog post explains you how to do this: https://cryptsus.com/blog/enrich-geolocation-sentinel-siem.html

Upvotes: 0

TheAlistairRoss
TheAlistairRoss

Reputation: 321

  1. Ingest the Data - As you've mentioned, ingest the data and join the tables. You would need to regularly ingest this though to ensure you can lookup the data within the desired time range (e.g. If you have an Analytics Rule, then this only looks up data for a 14 day period).
  2. Use a Playbook - If you want the Geo-IP lookup post incident, you can perform this with a Logic App
  3. Use Jupyter Notebooks - This have the flexibility to perform API calls against external locations and join the data to that hosted in Sentinel. An example notebook is the IP Explorer Notebook. Use Jupyter notebooks to hunt for security threats
  4. Threat Intelligence - Microsoft enriches all imported threat intelligence indicators with GeoLocation and WhoIs data, which is displayed together with other indicator details.

Upvotes: 1

Related Questions