Azure Sentinel

Do you have an idea or suggestion based on your experience with Azure Sentinel? We would love to hear it! 

Please take a few minutes to submit your ideas or vote up an idea submitted by another customer. All of the feedback you share in these forums will be monitored and reviewed by the Microsoft engineering teams responsible for building Azure Sentinel. Remember that this site is only for feature suggestions and ideas!

For further reading on Azure Sentinel, see our documentation. For general discussion, use our discussion forum. For technical support, take advantage of these support options.
  1. Create a logic app trigger "When an Azure Sentinel Incident is Created"

    It would be great to have a trigger in the Azure Sentinel connector when a new Azure Sentinel incident is created.
    This way we could integrate and automate with the other Microsoft security products (MCAS,WDATP,Azure ATP, etc.) and also with an ITSM tool like Service Now.
    The idea is to have a playbook run automatically whenever a new incident is created in Sentinel to:
    - create an incident in Service Now
    - send an email notification
    further we could expand to automatically close the SNOW incident and the corresponding alert in whichever product (MCAS,WDATP, etc.) when the Azure Sentinel incident's…

    80 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  7 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. Allow custom flexible Security events filtering

    Security solution now allows filter security events: https://blogs.technet.microsoft.com/msoms/2016/11/08/filter-the-security-events-the-oms-security-collects/

    It will be good if this solution also support a "Custom" option to allow customers to specify what events to collect (in addition to pre-configured lists). Also it will be good if the customer supplied filter supports wildcards and RegEx support.

    66 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  13 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. Azure Sentinel in Azure Government

    Would love to have Azure Sentinel in Azure Government. Sentinel looks like an incredibly useful tool for us.

    45 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    started  ·  8 comments  ·  Flag idea as inappropriate…  ·  Admin →
  4. Single pane of glass

    Sentinel should enable the aggregation of ASC, WDATP, CloudApp Security and all other sources of information that are Azure / O365 native - this is required for Incident Responders and Threat Hunters to do our job

    43 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  3 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Could we have an Umbrella connector please.

    Getting logs from Cisco Umbrella would be great. They do allow outputting of logs to an AWS S3 instance and I believe they have an API as well.

    39 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  6. Add a connector for Carbon Black.

    Carbon Black is a popular end point security tool where a native connector would be very welcomed.

    27 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  7. Integration with M365 ATP & EOP

    It will be better if it is integrated with M365 ATP & EOP previously O 365 ATP so that we can get the data & reports here in single place

    26 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. kusto for incidents information

    I want incident information, including comments and status, be able to retrieved by kusto query in Sentinel.
    If this is possible I would be able to analyze the incident investigation.
    Thus, I can understand how long you need for what types of incident, and FP rate for certain incidents.
    Moreover when new alert happens, you could check similar incidents investigation data and more smoothly investigate for the new alert.

    23 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    planned  ·  1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  9. Full text search for incidents information

    Currently, you need to check each incidents to see comments, however it would be more convenient if you could search comments from the incident list page.

    20 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  3 comments  ·  Flag idea as inappropriate…  ·  Admin →
  10. Allow for selection of playbooks to multiple rules at the same time

    When i have a playbook that applies to all rules, such as email incident notification, currently I have to open each rule individually in the portal and select the playbook. I should be able to select the playbook and associate it with as many selected (or all) rules as I want in one operation.

    15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  11. Connector for Windows Defender

    Create a Windows Defender connector for Azure sentinel.

    15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  12. Pull logs from AWS S3

    Pull (and parse) custom logs from an AWS S3 bucket.
    There is a whole ecosystem of exchanging log data like that. Access should be governed by an AWS IAM Role and the logs should be json files in gzip archives.

    15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  13. Yara rules

    Sentinel should adopt Yara rules support to enable industry collaboration and improvement

    15 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  14. Linking Sophos Endpoint Protection With Azure Sentinel

    New data connector to link Sophos Endpoint Protection logs with Azure sentinel.

    12 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  15. Add TargetUser and TargetGroup from the SharePoint Sharing Schema to the Office 365 Data Connector

    The vital information TargetUserOrGroupType and TargetUserOrGroupName from the SharePoint Sharing schema referenced in the Office 365 Audit Logs here:

    https://docs.microsoft.com/en-us/office365/securitycompliance/use-sharing-auditing

    is missing from the data ingested by the Azure Sentinel Office 365 Data connector.

    The result is key information whom the information was shared with is missing and absent from Azure Sentinel and I am unable to determine if the information was shared with a Guest identity or a Member identity.

    Please consider updating the Data Connector to include this valuable activity information to assist with Data ex-filtration analysis.

    11 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  16. View incidents assigned to me only

    Hello, it would be nice to be able to filter the Owner column in Incidents so each SOC member could view only what was assigned to them. Right now I can only sort that column. Is this something in the roadmap or are there other ways people can be notified as soon as an incident is assigned to them?

    10 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  17. DNS Connectors

    Upon enabling the DNS connector it only sends particular event logs up to Sentinel. Is/there should be a way to customise the logs that the connectors capture, or further information on how they work and the logs they are setup to send to Sentinel by default.

    Please assist with getting DNS analytical logs for DNS onto Sentinel.

    10 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    under review  ·  0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  18. Connector Automation

    Some connectors require that you periodically check their connector page to see if any new subscriptions have been created and then the admin must manually connect those subscriptions (Ex: Azure Activity or Azure Security Center). If there was a way to say "Enable this connector for all subscriptions (current and future) under this Management Group" or even just a blanket "Enable this connector (current and future) wherever I'm authorized to" that would reduce the amount of time that Security Analysts/Engineers would have to focus making sure that they have the appropriate coverage and allow them to do stuff like hunting.

    9 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  19. Manually create an incident

    Sometimes we need to trigger an incident manually, to then "pull" events into it - not all incidents are automatically created by an alert.

    It would be great to have the ability to manually create an incident and "add" / "remove" notable events by hand / by query (as well as events from other non-Azure data sources)

    9 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Flag idea as inappropriate…  ·  Admin →
  20. Link to Incident in Playbooks

    We currently use Playbooks to send email notifications and/or create incidents in our ITSM system, but the details are sparse that are sent and I can not link directly to the Incident detail. The Incident URL (Case id) is available in the Incident Full Details blade, but not available to be added to the Playbooks.

    Incident Link Example:

    https://portal.azure.com/#asset/MicrosoftAzureSecurity_Insights/Incident//subscriptions/[Subscription]/resourceGroups/[resourcegroup]/providers/Microsoft.OperationalInsights/workspaces/[workspace]/providers/Microsoft.SecurityInsights/Cases/[Case id]

    7 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1 3 4 5
  • Don't see your idea?

Azure Sentinel

Categories

Feedback and Knowledge Base