M6: Watchlists
Last updated
Last updated
This module will show you how to use Microsoft Sentinel watchlists in event correlation and enrichment. Once created, you can use watchlists in your search, detection rules, threat hunting, and response playbooks.
This module assumes that you have completed Module 1, as the data and the artifacts that we will be using in this module need to be deployed on your Microsoft Sentinel instance.
You have received a message from the SOC manager, informing you about a penetration test exercise being performed over the next few weeks. Your manager also informs you that the SIEM is already seeing a bunch of incidents from IP addresses used by the penetration test team. These incidents all come from rule "High count of connections by client IP on many ports", which identifies when 30 or more ports are used for a given client IP in 10 minutes occurring on the IIS server. Your manager provides you this CSV file with the list of the IP addresses involved in the penetration exercise.
From Microsoft Sentinel portal, go to Watchlists menu and click Add new.
In the watchlist wizard enter the following and click Next: Source:
Name: PenTestsIPaddresses
Description: IP addresses used during penetration tests
Watchlist Alias: PenTestIPaddresses
SearchKey field: IPAddress
Download the CSV file to your desktop.
In the watchlist wizard, upload the file from your desktop, check the Results Preview and click Next: Review and Create.
Click Create to finish the wizard.
You are brought back to the Watchlists screen, where you see your newly created watchlist. The watchlst data takes about 1 minute to be available in the workspace. Wait until the Rows number changes from 0 to 6. Then click on View in Log Analytics.
You should see the following screen. From the same logs screen you can also run _GetWatchlistAlias, which will return all defined watchlists.
Go to Analytics, then Templates and search for "High count of connections". Select the "High count of connections by client IP on many ports" rule and click on Create rule.
In the Set rule logic step of the wizard, expand the query window.
Add the following KQL statement that brings the IPAddress field from the "PenTestsIPaddresses" watchlist: let PenTestIPaddresses = _GetWatchlist('PenTestIPaddresses') | project IPAddress;
Now add an additional where statement to discard records where the client IP address (cIP field) matches one of the IP addresses in the watchlist. The statement is: | where cIP !in (PenTestIPaddresses)
Continue through the wizard and save the modified rule.
You can now continue to Module 7 - Threat Intelligence