Hi Craig, first of all, thank you so much for your videos, they really help me understand a lot on the SC-200 course and exam I am currently studying for! If I understand correctly, for parsers there are (generally speaking) the following types: _Im_<schema> = Built-in UNIFYING parser Im<schema> = Built-in WORKSPACE DEPLOYED parser _Im_<schema>_<source> = Built-in SOURCE-SPECIFIC parser vim<schema> = WORKSPACE-DEPLOYED SOURCE SPECIFIC parser A corresponding set of parsers that use _ASim_<schema> and ASim<Schema> are also available. It is not completely clear to me when to use these last parsers, actually. Could you (or someone else of course) help me out please? Thank you :)
@CraigCloudITPro3 ай бұрын
Hi Olaf, Thank you for your kind words! I’m glad my videos have been helpful to you in your SC-200 course and exam preparation. To clarify your understanding of parsers in Microsoft Sentinel: • Im: Built-in UNIFYING parser. • Im: Built-in WORKSPACE DEPLOYED parser. • Im_: Built-in SOURCE-SPECIFIC parser. • vim: WORKSPACE-DEPLOYED SOURCE SPECIFIC parser. When to use ASIM parsers: • Use ASim when you need a built-in unifying parser for a specific schema across different sources. This helps in normalizing data from various sources into a common schema. • Use ASim for workspace-deployed parsers that are customized for your specific environment and use cases. These are useful when you have specific log sources that require customized parsing rules. These ASIM parsers are especially valuable when dealing with complex environments with multiple data sources, as they help in unifying and simplifying the analysis process. I hope this helps! Let me know if you have any more questions.
@MultiRam735 ай бұрын
Hats off to you Craig! It was mindblowing the way you simplified the whole jargon, I feel so rich with the knowledge you shared here, I was so poor before this class
@CraigCloudITPro4 ай бұрын
@MultiRam73 thank you so much for your kind words :)
@plusvision1007 ай бұрын
Realy nice vicdeo, can you please share this ransomware so we can test this in my environment.
@CraigCloudITPro7 ай бұрын
Thank you for the nice comment. Unfortunately I cannot share the ransomware this would be highly unethical.
@danielk95408 ай бұрын
Hello thank you for the concise video. Where can I find/read more on the MS AI official framework around the 6 components shown ~@4:55?
@CraigCloudITPro8 ай бұрын
Thanks Daniel, if you search for Microsoft Responsible AI Standard, v2 you'll find plenty of documentation for this :)
@itexperience8 ай бұрын
@8:18 was pretty unexpected. But it did generate a smile on my face :)
@henryc754811 ай бұрын
you deserve more subs and views This one was JUICY
@CraigCloudITPro11 ай бұрын
HENRY! you legend! thank you so much man
@henryc754811 ай бұрын
@@CraigCloudITPro You are the legend, no one else is making content this useful for us guys trying to break in to the industry.
@robdewhurst988111 ай бұрын
Any danger of you showing how to technically respond to the issues using MS Sentinel?
@wearewhoweare6602 Жыл бұрын
Master i want to be your student 😂😂😂😂 before i lose it 😂😂😂😂
@CraigCloudITPro11 ай бұрын
😂🙈
@finlaycaven4683 Жыл бұрын
Promo`SM
@Cyber_Guy2 Жыл бұрын
This is awesome content. Great resource videos to share with our SOC team.
@CraigCloudITPro11 ай бұрын
Thank you mate
@CraigCloudITPro Жыл бұрын
@Progod, yes this is true, which is why i recommend using free enrichment for TI, using RDAP, Virus Total, RiskIQ etc, I'm hoping this bring the cost of Defender for TI down, because alot of my customers are just objecting it because of the costs
@human1822 Жыл бұрын
Craig, would you mind uploading a video to integrate Qualys into MS Sentinel? Or briefly explain the processes?
@CraigCloudITPro Жыл бұрын
Hi mate, I’ve not worked with qualys before, I just did a quick google and the process looks relatively straight forward, so there’s plenty of documentation for you online :)
@human1822 Жыл бұрын
Great job Craig.
@CraigCloudITPro Жыл бұрын
Thank you! 🙏🏼
@roso6326 Жыл бұрын
Nice video, where could we find the command line on 5:45?
@CraigCloudITPro Жыл бұрын
Get-NetTCPConnection -State Established | Select LocalAddress, LocalPort, OwningProcess, RemoteAddress, @{n="Path";e={(gps -Id $_.OwningProcess).Path}},@{n="Hash";e={(gps -Id $_.OwningProcess|gi|filehash).hash}}, @{n="User";e={(gps -Id $_.OwningProcess -IncludeUserName).UserName}}|sort|gu -AS | FT -no type information Hopefully this works for you :)
@roso6326 Жыл бұрын
@@CraigCloudITPro Perfect, thank you for taking the time to answer
@keerthicr3234 Жыл бұрын
how can I store Subscription Value under Variable in azure workbook
@CraigCloudITPro Жыл бұрын
I show this at 4:04 :) this can be used as a variable
@tusharkamlaskar31 Жыл бұрын
Hi Craig, what if we have single tenant and multiple subscriptions.. would single sentinel workspace work?
@CraigCloudITPro Жыл бұрын
Depends on your scenario, if you have data residency issues, security issues, multiple dependencies rely on the premise of that subject
@neadlead2621 Жыл бұрын
nice video , can you please provide the video
@CraigCloudITPro Жыл бұрын
What do you mean?
@jaypelletier8002 Жыл бұрын
Your videos are fantastic!! Thanks so much for sharing you have a true talent for making the complex simple, entertaining, and practical. Keep up the great work-- Cheers!!!
@CraigCloudITPro Жыл бұрын
Thank you jay!
@progod6017 Жыл бұрын
keep up the sentinel content!
@yaya2devops Жыл бұрын
what if i'm having a bunch of yaml files for each rule instead of a single JSON for all
@yaya2devops Жыл бұрын
That intro bro!
@CraigCloudITPro Жыл бұрын
Thank you man
@haseebmohd6063 Жыл бұрын
how do we work on phishing email incident in sentinel plz upload the video
@CraigCloudITPro Жыл бұрын
Hi, thanks for your comment, there are a lot of videos on phishing emails on Sentinel on KZbin :) if there is anything specific you cannot find, let me know and I’ll see what I can do
@milkteaboba3348 Жыл бұрын
How do you find hash values from AD joined devices? For some reason, I only see VMs like softbox but not any of the "hardbox" like actual endpoint that's joined to company intune.
@CraigCloudITPro Жыл бұрын
hi milkteaboba, what is the goal you're trying to achieve here? there are multiple ways to extract data from AD and deploying said data into TI, but i don't really understand your use case?
@bashrc-kq8nu Жыл бұрын
Super useful content, Thank you Craig!
@CraigCloudITPro Жыл бұрын
THANK YOU :)
@bashrc-kq8nu Жыл бұрын
@@CraigCloudITPro WELCOME :)
@Antonio-yc2kx Жыл бұрын
Your videos are really relaxing and a joy to follow. Grow your page easily = 'Promosm' .
@Maphew69 Жыл бұрын
Craig your channel is a diamond find! Thank you for all the content. Love Sentinel. Do you plan any log analytics management - strategies ?
@CraigCloudITPro Жыл бұрын
Hey Maphew! Thank you for the nice words! Is there anything in particular you are wanting to see?
@Gregwilson34682 жыл бұрын
Excellent overview, I work with both and your assessment of the setup time and operational effort is spot on. Sentinel is the superior product.
@CraigCloudITPro2 жыл бұрын
Thanks Gregory :)
@JohnConn32 жыл бұрын
Disclaimer - I am a Splunk Account Manager so keep that in mind while reading my comments. I find this comparision to be extremely misleading. You compare Sentinel to a Splunk BYOL (bring your own license)) Cloud deployment. To put this in Microsoft terms you are comparing O365 to Exhange running in Azure. Not a fair comparison. I would recommend a redo on this video comparing Sentinel to Splunk Cloud with Mission Control which is a more comparable deployment model. This is not an apples to apples comparision, it is more like an Apples to Walnuts......
@Gregwilson34682 жыл бұрын
Must hurt to work on an inferior product.
@ishtyleretienne362 жыл бұрын
😂😅
@OzYogz Жыл бұрын
Can you please post a video on Splunk Cloud with Mission Control that covers all those aspects of ingestion topology, storage, cost etc?
@matthewfranklin75412 жыл бұрын
I work with both Splunk and Sentinel and would consider myself vendor agnostic (worked with LogRythm, ArcSight and Elastic Stack too). There are a few comments I would like to make. 1. I agree Sentinel is very easy to initially set up vs Splunk / Splunk Cloud. Especially Microsoft and large vendor sources (Cisco, Fortinet, etc etc) 2. In addition to an ingest licence Splunk provide a compute based licence too. I would argue this is much easier to budget for vs ingest cost (even with Committment Tiers). I've worked with plenty of organisations (Universities for example) whose throughput massively changes from month to month 3. I would say Splunk is much more mature for non-Microsoft integrations - just look at the number of TAs available on Splunkbase. With Sentinel, you may need a developer (not a typical security engineer) to develop Function Apps to ingest into Custom Tables. 4. Skills. I would argue that Splunk, having been around 20 years, with a robust training offer - skills are much more common. Sentinel is new, and there isn't yet a specific training programme for this (Splunk Ninja Training is good though!) 5. Sentinel scheduled rules can only look back 14 days. 6. Mention of ADX for archiving. Actually Sentinel now has the very good Archive Tier. Splunk very similar (DDAA and DDSS). 7. Developing integrations for sources not yet available in Splunkbase (a rare thing) is super easy using Splunk's Add-on builder. I find with Sentinel you will need to employ someone comfortable with developing Python, Poweshell etc for developing Function Apps. These have to be maintained. Growing list of course open source on GitHub, but catching up. 8. Log source monitoring. Sentinel has some work to do to catch up with Splunk's "TrackMe" app which uses ML to detect outliers, throughput etc. 9. Licence. Sentinel is kinda similar to Splunk ES in the licence model. Sentinel (Splunk ES) is charged on the ingest volume on top of the ingest +storage cost of the underlying Log Analytics Workspace (Splunk Enterprise/Cloud) 10. Learning Microsoft KQL is required, much in the same way as the need to learn Splunk SPL. I like both, and coming from an Oracle background I kind of prefer the KQL language which is more similar and query optimisation is performed transparently. That said Splunk accelerated data is much much quicker. I also like Splunk's "schema on the fly" way of doing things. 11. A Splunk Deployment Server (or supported Ansible, Puppet, Chef, SCCM, ...) isn't mandatory, but useful for configuration of a large number of agents (if only collecting API sources, not needed for example). This is similar to Sentinel's data collection rules (DCR) now available with the AMA agent. Until AMA it hasn't been easily possible to fine tune what is collected (thinking the 4 built-in filters for Windows Security Event collection).
@carcamp54515 ай бұрын
Which one do you prefer learning in 2024 to get a job?
@matthewfranklin75415 ай бұрын
@@carcamp5451find your niche, don't go with the masses. I might suggest Google Chronicle
@TechForceCyber2 жыл бұрын
Good one, Craig.
@CraigCloudITPro2 жыл бұрын
Thanks matey :)
@okomu.gabriel73572 жыл бұрын
this is a very useful and helpful video, currently doing my MSc dissertation research on how sentinel can help mitigate ransomware attack. This video has come to the rescue; I will surely reference your work. Thank you
@CraigCloudITPro2 жыл бұрын
Thank you!
@bhavinibharti18892 жыл бұрын
Please come up with "how to crack Sentinel interview?"
@CraigCloudITPro2 жыл бұрын
That would be difficult, there are many topics and a lot of integrations for Sentinel
@bhavinibharti18892 жыл бұрын
This was very helpful 😊
@CraigCloudITPro2 жыл бұрын
Thank you
@andersondesouza20132 жыл бұрын
Great content! I'm using it to ignite my career transition. Don't stop hacking!
@CraigCloudITPro2 жыл бұрын
Thank you!
@Aghiad872 жыл бұрын
Good content. The volume was a little low. Thanks!
@CraigCloudITPro2 жыл бұрын
I’m working on increasing volume, thank you
@Dips_M2 жыл бұрын
These videos are awesome! Far more informative/engaging than the official MS ones, thank you!
@CraigCloudITPro2 жыл бұрын
Thank you @Dips_M that means a lot :)
@tiphotisted2 жыл бұрын
Hey Craig, really good video. For writing analytic rules in Sentinel, I was wondering if you knew of a place of reference to go to in order to check for an extensive list of names of programs, extensions, directories and other indicators to put in KQL queries for the contains, !contains, has, !has, and so on fields for different types of analytic rules we may be writing. Basically for the filtering part of any analytics rule.
@CraigCloudITPro2 жыл бұрын
Hey @tiphotisted, you can use the ones from the KQL Microsoft Docs site, they come under the data explorer section I believe :)
@poppasensei24272 жыл бұрын
Great thanks!!
@iambest76662 жыл бұрын
Thanks for the video.. It was very informative... I just want to know if we use Azure Blob storage for data retention you said we cant use KQL queries.. but can we connect Blob storage to sentinel using data connector and run KQL on that data..? Thanks in advance..
@CraigCloudITPro2 жыл бұрын
Hi IAm, you won’t be able to use the SAME queries as if the data were in Sentinel, it’s more difficult and tedious to navigate inside each data folder in a blob storage :)
@maxwilliamson98892 жыл бұрын
Enjoyed this video. Hope you keep posting more stuff so i can continue sharpening my skills
@CraigCloudITPro2 жыл бұрын
Thank you for your nice words Shmaxy, hit that subscribe button to be notified of new content :-)
@simple-security2 жыл бұрын
I'm happy to say ADX is no longer needed for Sentinel. Long live the archive feature! kzbin.info/www/bejne/sGqrdX-Lf9yiZ6M
@TheManTone2 жыл бұрын
Hell Yeah × ∞ Is that enough Hell Yeahs? :D
@CraigCloudITPro2 жыл бұрын
More hell yeahs required to achieve maximum level 😆
@Knalkop1232 жыл бұрын
@@CraigCloudITPro Hell yeah
@David-du2fd2 жыл бұрын
Thanks 👍
@CraigCloudITPro2 жыл бұрын
You’re welcome
@TheManTone2 жыл бұрын
8:32am, whiskey in hand, ready to get pretty damn juicy
@CraigCloudITPro2 жыл бұрын
😂😂😂 what kind of whiskey 🧐🥃
@vrajsoni76102 жыл бұрын
Can you please tell the command to upload a JSON file instead of a csv. Thanks
@CraigCloudITPro2 жыл бұрын
Hello, so the command let I used was Upload-AzMonitorLog, this is only for CSV, you’ll need to create your own to parse and send json data to Sentinel
@outlandexplore2 жыл бұрын
I told my nan
@CraigCloudITPro2 жыл бұрын
What did she think? 😂😂😂
@outlandexplore2 жыл бұрын
@@CraigCloudITPro she now works at Oracle as a Security Engineer
@CraigCloudITPro2 жыл бұрын
😂😂😂😂
@TheManTone2 жыл бұрын
Thank you for this! Excellent job!
@CraigCloudITPro2 жыл бұрын
Thank you Antone :)
@TheManTone2 жыл бұрын
Excellent content sir. Thanks again!
@CraigCloudITPro2 жыл бұрын
Thank you Antone :) again hehe
@TheManTone2 жыл бұрын
Dude, you have no idea how much you've helped me by making this video. Preciecly what I have been asked to do as a project at work. Thank you so much!
@CraigCloudITPro2 жыл бұрын
I’m glad I could help Antone :) thanks for watching, I hope you subscribed and told your friends :-D
@JackSmith-oy7rx2 жыл бұрын
at 16.59 for the log analytics query logs table, do you mean the Activity log for the LA resource?
@CraigCloudITPro2 жыл бұрын
Hey Jack, so the LA query logs table is for SOC users that are running queries inside the specified Log Analytics Workspace
@CraigCloudITPro2 жыл бұрын
You can audit activities with Azure Activity of course, but the LA query logs is specified at which table and queries were ran, I hope that helps :)