Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 83c149c

Browse files
committedMay 29, 2022
Proofing ArcSight section
1 parent cc371d4 commit 83c149c

File tree

7 files changed

+39
-31
lines changed

7 files changed

+39
-31
lines changed
 
Loading
Loading
Loading

‎articles/sentinel/migration-arcsight-automation.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ ms.date: 05/03/2022
99

1010
# Migrate ArcSight SOAR automation to Microsoft Sentinel
1111

12-
Microsoft Sentinel provides Security Orchestration, Automation, and Response (SOAR) capabilities with [automation rules](automate-incident-handling-with-automation-rules.md) to automate incident handling and response, and [playbooks](tutorial-respond-threats-playbook.md) to run predetermined sequences of actions to response and remediate threats. This article discusses how to identify SOAR use cases, and how to migrate your ArcSight SOAR automation to Microsoft Sentinel.
12+
Microsoft Sentinel provides Security Orchestration, Automation, and Response (SOAR) capabilities with [automation rules](automate-incident-handling-with-automation-rules.md) to automate incident handling and response, and [playbooks](tutorial-respond-threats-playbook.md) to run predetermined sequences of actions to respond to and remediate threats. This article discusses how to identify SOAR use cases, and how to migrate your ArcSight SOAR automation to Microsoft Sentinel.
1313

1414
Automation rules simplify complex workflows for your incident orchestration processes, and allow you to centrally manage your incident handling automation.
1515

1616
With automation rules, you can:
17-
- Perform simple automation tasks without necessarily using playbooks. For example, you can assign, tag, incidents, change status, and close incidents.
17+
- Perform simple automation tasks without necessarily using playbooks. For example, you can assign, tag incidents, change status, and close incidents.
1818
- Automate responses for multiple analytics rules at once.
1919
- Control the order of actions that are executed.
2020
- Run playbooks for those cases where more complex automation tasks are necessary.
@@ -37,10 +37,10 @@ This section shows how key SOAR concepts in ArcSight translate to Microsoft Sent
3737
|Step (in diagram) |ArcSight |Microsoft Sentinel |
3838
|---------|---------|---------|
3939
|1 |Ingest events into Enterprise Security Manager (ESM) and trigger correlation events. |Ingest events into the Log Analytics workspace. |
40-
|2 |Automatically filter alerts for case creation. |Use [analytics rules](detect-threats-built-in#use-built-in-analytics-rules.md) to trigger alerts. Enrich alerts using the [custom details feature](surface-custom-details-in-alerts.md) to create dynamic incident names. |
41-
|3 |Classify cases |Use [automation rules](automate-incident-handling-with-automation-rules.md). With automation rules, Microsoft Sentinel treats incidents according to the analytics rule that triggered the incident, and the incident properties that match defined criteria. |
42-
|4 |Consolidate cases |You can consolidate several alerts to a single incident according to properties such as matching entities, alert details, or creation timeframe, using the alert grouping feature. |
43-
|5 |Dispatch cases |Assign incidents to specific analysts using [an integration](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/automate-incident-assignment-with-shifts-for-teams/ba-p/2297549) between Microsoft Teams, Azure Logic Apps, and Microsoft Sentinel automation rules. |
40+
|2 |Automatically filter alerts for case creation. |Use [analytics rules](detect-threats-built-in.md#use-built-in-analytics-rules) to trigger alerts. Enrich alerts using the [custom details feature](surface-custom-details-in-alerts.md) to create dynamic incident names. |
41+
|3 |Classify cases. |Use [automation rules](automate-incident-handling-with-automation-rules.md). With automation rules, Microsoft Sentinel treats incidents according to the analytics rule that triggered the incident, and the incident properties that match defined criteria. |
42+
|4 |Consolidate cases. |You can consolidate several alerts to a single incident according to properties such as matching entities, alert details, or creation timeframe, using the alert grouping feature. |
43+
|5 |Dispatch cases. |Assign incidents to specific analysts using [an integration](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/automate-incident-assignment-with-shifts-for-teams/ba-p/2297549) between Microsoft Teams, Azure Logic Apps, and Microsoft Sentinel automation rules. |
4444

4545
## Map SOAR components
4646

@@ -62,10 +62,10 @@ While most of the playbooks that you use with Microsoft Sentinel are available i
6262
You typically build your custom logic app using the Azure Logic App Designer feature. The logic apps code is based on [Azure Resource Manager (ARM) templates](../azure-resource-manager/templates/overview.md), which facilitate development, deployment and portability of Azure Logic Apps across multiple environments. To convert your custom playbook into a portable ARM template, you can use the [ARM template generator](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/export-microsoft-sentinel-playbooks-or-azure-logic-apps-with/ba-p/3275898).
6363

6464
Use these resources for cases where you need to build your own playbooks either from scratch or from existing templates.
65-
- [Automate incident handling in Azure Sentinel](automate-incident-handling-with-automation-rules.md)
66-
- [Automate threat response with playbooks in Azure Sentinel](automate-responses-with-playbooks.md)
67-
- [Tutorial: Use playbooks with automation rules in Azure Sentinel](tutorial-respond-threats-playbook.md)
68-
- [How to use Azure Sentinel for Incident Response, Orchestration and Automation](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/how-to-use-azure-sentinel-for-incident-response-orchestration/ba-p/2242397)
65+
- [Automate incident handling in Microsoft Sentinel](automate-incident-handling-with-automation-rules.md)
66+
- [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md)
67+
- [Tutorial: Use playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md)
68+
- [How to use Microsoft Sentinel for Incident Response, Orchestration and Automation](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/how-to-use-azure-sentinel-for-incident-response-orchestration/ba-p/2242397)
6969
- [Adaptive Cards to enhance incident response in Microsoft Sentinel](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/using-microsoft-teams-adaptive-cards-to-enhance-incident/ba-p/3330941)
7070

7171
## SOAR post migration best practices
@@ -75,4 +75,11 @@ Here are best practices you should take into account after your SOAR migration:
7575
- After you migrate your playbooks, test the playbooks extensively to ensure that the migrated actions work as expected.
7676
- Periodically review your automations to explore ways to further simplify or enhance your SOAR. Microsoft Sentinel constantly adds new connectors and actions that can help you to further simplify or increase the effectiveness of your current response implementations.
7777
- Monitor the performance of your playbooks using the [Playbooks health monitoring workbook](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-monitoring-your-logic-apps-playbooks-in-azure/ba-p/1873211).
78-
- Use managed identities and service principals to authenticate against various Azure services within your Logic Apps, store the secrets in Azure Key Vault, and obscure the flow execution output. we also recommend that you [monitor the activities of these service principals](https://techcommunity.microsoft.com/t5/azure-sentinel/non-interactive-logins-minimizing-the-blind-spot/ba-p/2287932).
78+
- Use managed identities and service principals to authenticate against various Azure services within your Logic Apps, store the secrets in Azure Key Vault, and obscure the flow execution output. we also recommend that you [monitor the activities of these service principals](https://techcommunity.microsoft.com/t5/azure-sentinel/non-interactive-logins-minimizing-the-blind-spot/ba-p/2287932).
79+
80+
## Next steps
81+
82+
In this article, you learned how to map your SOAR automation from ArcSight to Microsoft Sentinel.
83+
84+
> [!div class="nextstepaction"]
85+
> [Export your historical data](migration-arcsight-historical-data.md)

‎articles/sentinel/migration-arcsight-detection-rules.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ Order the filters by starting with the `where` statement that filters out the mo
225225

226226
Here is a sample ArcSight rule that defines a condition against a set of base events, using the `Matching Event` statement.
227227

228-
:::image type="content" source="media/migration-arcsight-detection-rules/rule-5-sample.png" alt-text="Diagram illustrating a sample correlation rule (matching)." lightbox="media/migration-arcsight-detection-rules/rule-5-sample.png":::
228+
:::image type="content" source="media/migration-arcsight-detection-rules/rule-5-sample.png" alt-text="Diagram illustrating a sample correlation rule (matching).":::
229229

230230
### Correlation (matching) example: KQL
231231

@@ -250,7 +250,7 @@ Best practices:
250250

251251
Here is a sample ArcSight rule that defines a condition against a set of base events, using the `Matching Event` statement, and uses the `Wait time` filter condition.
252252

253-
:::image type="content" source="media/migration-arcsight-detection-rules/rule-6-sample.png" alt-text="Diagram illustrating a sample correlation rule (time window)." lightbox="media/migration-arcsight-detection-rules/rule-6-sample.png":::
253+
:::image type="content" source="media/migration-arcsight-detection-rules/rule-6-sample.png" alt-text="Diagram illustrating a sample correlation rule (time window).":::
254254

255255
### Correlation (time window) example: KQL
256256

@@ -292,7 +292,7 @@ event2_UPN=UserPrincipalName,
292292

293293
Here is a sample ArcSight rule with aggregation settings: three matches within ten minutes.
294294

295-
:::image type="content" source="media/migration-arcsight-detection-rules/rule-7-sample.png" alt-text="Diagram illustrating a sample aggregation rule." lightbox="media/migration-arcsight-detection-rules/rule-7-sample.png":::
295+
:::image type="content" source="media/migration-arcsight-detection-rules/rule-7-sample.png" alt-text="Diagram illustrating a sample aggregation rule.":::
296296

297297
### Aggregation example example: KQL
298298

@@ -301,4 +301,11 @@ SecurityEvent
301301
| summarize Count = count() by SubjectUserName,
302302
SubjectDomainName
303303
| where Count >3
304-
```
304+
```
305+
306+
## Next steps
307+
308+
In this article, you learned how to map your migration rules from ArcSight to Microsoft Sentinel.
309+
310+
> [!div class="nextstepaction"]
311+
> [Migrate your SOAR automation](migration-arcsight-automation.md)

‎articles/sentinel/migration-arcsight-historical-data.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,33 +5,32 @@ author: limwainstein
55
ms.author: lwainstein
66
ms.topic: how-to
77
ms.date: 05/03/2022
8-
ms.custom: ignite-fall-2021
98
---
109

1110
# Export historical data from ArcSight
1211

1312
This article describes how to export your historical data from ArcSight. After you complete the steps in this article, you can [select a target platform](migration-ingestion-target-platform.md) to host the exported data, and then [select an ingestion tool](migration-ingestion-tool.md) to migrate the data.
1413

15-
:::image type="content" source="media/migration-export-ingest/export-data.png" alt-text="Diagram illustrating steps involved in export and ingestion." lightbox="media/migration-export-ingest/export-data.png":::
14+
:::image type="content" source="media/migration-export-ingest/export-data.png" alt-text="Diagram illustrating steps involved in export and ingestion.":::
1615

1716
You can export data from ArcSight in several ways. Your selection of an export method depends on the data volumes and the deployed ArcSight environment. You can export the logs to a local folder on the ArcSight server or to another server accessible by ArcSight.
1817

1918
To export the data, use one of the following methods:
20-
- [ArcSight Event Data Transfer Tool](#arcsight-event-data-transfer-tool-arcsight-esm-version-7x): Use this option for large volumes of data, namely terabytes (TB).
19+
- [ArcSight Event Data Transfer Tool](#arcsight-event-data-transfer-tool): Use this option for large volumes of data, namely terabytes (TB).
2120
- [lacat tool](#lacat-utility): Use for volumes of data smaller than a TB.
2221

23-
## ArcSight Event Data Transfer tool (ArcSight ESM version 7.x)
22+
## ArcSight Event Data Transfer tool
2423

25-
Use the Event Data Transfer tool to export data from ArcSight Enterprise Security Manager (ESM). To export data from ArcSight Logger, use the [lacat utility](#lacat-utility).
24+
Use the Event Data Transfer tool to export data from ArcSight Enterprise Security Manager (ESM) version 7.x. To export data from ArcSight Logger, use the [lacat utility](#lacat-utility).
2625

27-
The tool you retrieves event data from ESM, which allows you to combine analysis with unstructured data, in addition to the CEF data. The Event Data Transfer tool exports ESM events in three formats: CEF, CV, and key-value pairs.
26+
The Event Data Transfer tool retrieves event data from ESM, which allows you to combine analysis with unstructured data, in addition to the CEF data. The Event Data Transfer tool exports ESM events in three formats: CEF, CSV, and key-value pairs.
2827

2928
To export data using the Event Data Transfer tool:
3029

3130
1. [Install and configure the Event Transfer Tool](https://www.microfocus.com/documentation/arcsight/arcsight-esm-7.6/ESM_AdminGuide/#ESM_AdminGuide/EventDataTransfer/EventDataTransfer.htm).
3231
1. Configure the logs export to use a CSV format. For example, this command exports data recorded between 15:45 and 16:45 on May 4, 2016 to a CSV file:
3332

34-
```bash
33+
```
3534
arcsight event_transfer -dtype File -dpath <***path***> -format csv -start "05/04/2016 15:45:00" -end "05/04/2016 16:45:00"
3635
```
3736
## lacat utility
@@ -41,7 +40,7 @@ Use the lacat utility to export data from ArcSight Logger. This is a simple util
4140
To export data with the lacat utility:
4241
4342
1. [Download the lacat utility](https://github.com/hpsec/lacat).
44-
1. Follow the examples in the [lacat repository](https://github.com/hpsec/lacat) on how to run the script.
43+
1. Follow the examples in the lacat repository on how to run the script.
4544
4645
## Next steps
4746

‎articles/sentinel/migration-track.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -189,11 +189,6 @@ To assist with the deployment and migration process, the workbook includes tips
189189

190190
In this article, you learned how to track your migration with the **Microsoft Sentinel Deployment and Migration** workbook.
191191

192-
> [!div class="nextstepaction"]
193-
> [Migrate ArcSight detection rules](migration-arcsight-detection-rules.md)
194-
195-
> [!div class="nextstepaction"]
196-
> [Migrate Splunk detection rules](migration-splunk-detection-rules.md)
197-
198-
> [!div class="nextstepaction"]
199-
> [Migrate QRadar detection rules](migration-qradar-detection-rules.md)
192+
- [Migrate ArcSight detection rules](migration-arcsight-detection-rules.md)
193+
- [Migrate Splunk detection rules](migration-splunk-detection-rules.md)
194+
- [Migrate QRadar detection rules](migration-qradar-detection-rules.md)

0 commit comments

Comments
 (0)
Please sign in to comment.