Segregating and Identifying Alerts in Sentinel Workspace

Someiah C S 80 Reputation points
2024-07-03T04:32:08.67+00:00

I am seeking a method to segregate alerts in a Sentinel workspace to facilitate easier identification and prioritization. For instance, if we have multiple clients' logs in a single workspace, we need a way to identify and segregate alerts based on the client.

Is tagging an alert based on the Resource Group (RG) the best approach? If so, how can we achieve and implement this?

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,051 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Andrew Blumhardt 9,841 Reputation points Microsoft Employee
    2024-07-03T12:22:55.9866667+00:00

    If these clients are individual customers you may want to keep them in separate Sentinel instances for a variety of reasons. For example, billing, privacy, and the difficulty of separating clients later. Sentinel has many features to support an MSP model. https://aka.ms/mssentinelmssp.

    I agree that tagging combined with filters or workbooks would be the best way to segment. I would start by trying automation rules first since this is the easiest to manage and at no additional cost. For example, if there is an identifiable naming standard for resource names. If the automation rule filters are insufficient your next option is a logic app. There you can use KQL or recourse graph queries to identify the client. It may not be easy or possible to attribute every alert to a client.

    Start with the device or host entity. The logic app would be an incident trigger, followed by get host, then lookup the client identifier, and the add the tag. Other entity types will be harder and some alerts may not have entities. You might add a task to verify/manually add a tag to fill the gap.