{"id":16774,"date":"2019-11-05T07:01:01","date_gmt":"2019-11-05T15:01:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/11\/05\/news-10513\/"},"modified":"2019-11-05T07:01:01","modified_gmt":"2019-11-05T15:01:01","slug":"news-10513","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/05\/news-10513\/","title":{"rendered":"Azure Sentinel updates: Improve your security operations with innovations from a cloud-native SIEM"},"content":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 14:00:41 +0000<\/strong><\/p>\n<p>Just a month ago, I communicated the details about <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fazure-sentinel-general-availability-a-modern-siem-reimagined-in-the-cloud%2F&amp;data=02%7C01%7Cv-elwolk%40microsoft.com%7C000f10d8bff9463971f608d75f0ac378%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637082372155003224&amp;sdata=Phjd9juoVvA789%2B424GCEA9Wo6da5pUBAA0IxyrAohE%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Azure Sentinel reaching general availability<\/a>. Since then, many customers have shared how Azure Sentinel has empowered their teams to be nimble and more efficient. ASOS, one of the largest online fashion retailers, is an excellent example of this. Using Azure Sentinel, ASOS has created a bird\u2019s-eye view of everything it needs to spot threats early, allowing it to safeguard its business and its customers proactively. As a result, it has cut issue resolution times in half.<\/p>\n<blockquote>\n<p>\u201cSentinel has helped improve the efficiency of our security operations by allowing us to quickly consolidate a large number of disparate security and contextual data sources.\u201d<br \/> \u2014George Mudie, Chief Information Security Officer, ASOS<\/p>\n<\/blockquote>\n<p>Learn more about how ASOS has <a href=\"https:\/\/aka.ms\/AA5yz8g\" target=\"_blank\" rel=\"noopener\">benefitted from Azure Sentinel<\/a>.<\/p>\n<p>I am thrilled to come back and share new features available in preview starting this week. These new features highlight continued innovation and progress towards our goal of empowering defenders to do more.<\/p>\n<div class=\"interruption interruption-image-type\">\n<div class=\"interruption-image-container\"> \t\t\t\t<img decoding=\"async\" class=\"interruption-image\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Azure-Sentinal.png\"> \t\t\t<\/div>\n<div class=\"interruption-content-wrap\">\n<h3 class=\"interruption-title\">Azure Sentinel<\/h3>\n<p class=\"interruption-text\">Intelligent security analytics for your entire enterprise.<\/p>\n<p> \t\t\t\t<a class=\"interruption-link c-glyph\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\"> \t\t\t\t\tLearn more\t\t\t\t<\/a> \t\t\t<\/div>\n<p><!-- .interruption-content-wrap --> \t\t<\/div>\n<p><!-- .interruption -->  \t\t <\/p>\n<h3>Collect data from more sources with built-in connectors<\/h3>\n<p>Azure Sentinel enables you to collect security data across different sources, including Azure, on-premises solutions, and across clouds. Many built-in connectors are available to simplify integration, and new ones are being added continually. Connectors recently introduced by Zscaler, F5, Barracuda, Citrix, ExtraHop, One Identity, and Trend Micro make it easy to collect relevant data and use built-in workbooks and queries to gain insight into data from these solutions. Read more information on the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-data-sources\" target=\"_blank\" rel=\"noopener\">Connect data sources<\/a> page.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90126 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-1.png\" alt=\"Screenshot showing Azure Sentinel data connectors.\" width=\"1431\" height=\"688\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-1.png 1431w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-1-300x144.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-1-768x369.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-1-1024x492.png 1024w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\" \/><\/a><\/p>\n<h3>Accelerate threat hunting with new capabilities<\/h3>\n<p>The work of threat hunters gets much easier with the addition of built-in hunting queries for Linux and network events. These queries, developed by Microsoft security researchers and community experts, provide a starting point to look for suspicious activity. You can customize hunting queries with the help of IntelliSense and bookmark interesting results for further investigation or sharing with fellow analysts. View the bookmarks alongside alerts in the Investigation graph and make them part of an incident.<\/p>\n<p>You can now receive an Azure notification when there are new results on a query using the hunting livestream. Promote the livestream query to an Analytic rule if you want to make it part of your incident response workflow.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-2.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90127 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-2.jpg\" alt=\"Image showing an Azure Sentinel threat hunting dash.\" width=\"1430\" height=\"774\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-2.jpg 1430w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-2-300x162.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-2-768x416.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-2-1024x554.jpg 1024w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/a><\/p>\n<p>In addition, you can now launch Azure Notebooks directly from Azure Sentinel, making it easy to create and execute Jupyter notebooks to analyze your data. Notebooks combine live code, graphics, visualizations, and text, making them a valuable tool for threat hunters. Choose from a built-in gallery of notebooks developed by Microsoft security researchers or import others from GitHub to get started. These notebooks are the same professional-strength hunting solutions Microsoft\u2019s threat hunters use every day.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-3.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90128 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-3.png\" alt=\"Image showing Azure Sentinel notebooks, now in preview.\" width=\"1431\" height=\"486\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-3.png 1431w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-3-300x102.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-3-768x261.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-3-1024x348.png 1024w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\" \/><\/a><\/p>\n<h3>Connect threat intelligence sources using STIX\/TAXII<\/h3>\n<p>The existing Threat Intelligence Platforms data connector allows you to integrate threat indicators from a variety of sources for use with Azure Sentinel analytics, hunting, and workbooks. A new Threat Intelligence TAXII connector will add support for threat indicator feeds from open source threat intelligence (OSINT) and threat intelligence platforms supporting this standard protocol and STIX data format. Once your threat intelligence sources are connected, you can:<\/p>\n<ul>\n<li>Use built-in analytics or create your own rules to generate alerts and incidents when events match your threat indicators.<\/li>\n<li>Track the health of your threat intelligence pipeline and gain insights into alerts generated with threat intelligence using built-in threat intelligence workbooks.<\/li>\n<li>Correlate threat intelligence with event data via hunting queries to add contextual insights to your investigations.<\/li>\n<li>Investigate anomalies and hunt for malicious behaviors in Azure Notebooks.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-4.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90129 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-4.png\" alt=\"Screenshot showing Azure Sentinel data connectors.\" width=\"837\" height=\"588\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-4.png 837w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-4-300x211.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-4-768x540.png 768w\" sizes=\"auto, (max-width: 837px) 100vw, 837px\" \/><\/a><\/p>\n<h3>Tap into Microsoft threat intelligence<\/h3>\n<p>Microsoft has an unparalleled view of the evolving threat landscape informed by analyzing trillions of signals from its cloud customers, services, and infrastructure. And now, Azure Sentinel customers can begin to leverage this intelligence to detect threats in their data. The first of these built-in detections matches Microsoft URL threat intelligence with new CEF logs (for example, from Palo Alto Networks or Zscaler). Retrospective lookbacks that match URL threat intelligence with historical event data will also be coming soon.<\/p>\n<p>When a match is found, an alert is generated and an incident is created to enable further investigation. The matched indicator is also added to the Threat Intelligence Indicator table, which can be used just like any other indicator. Sign up for the <a href=\"https:\/\/aka.ms\/MicrosoftSecurityPreviewProgram\" target=\"_blank\" rel=\"noopener\">Microsoft Cloud + AI Security Preview Program<\/a> to enable these detections today, and keep an eye out for new matches coming soon.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-5.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90130 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-5.png\" alt=\"Image showing phishing threats detected by Azure Sentinel.\" width=\"1120\" height=\"152\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-5.png 1120w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-5-300x41.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-5-768x104.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-5-1024x139.png 1024w\" sizes=\"auto, (max-width: 1120px) 100vw, 1120px\" \/><\/a><\/p>\n<h3>Automatically detonate URLs to speed investigation<\/h3>\n<p>Azure Sentinel customers can now use the power of URL detonation to enrich alerts and discover threats related to malicious URLs. When creating scheduled alerts, any URL data in the query results can map to a new URL entity type. Whenever an alert containing a URL entity is generated, the mapped URL is automatically detonated, and the investigation graph is immediately enriched with the detonation results. A verdict, final URL, and screenshot (especially useful for identifying phishing) can be used to quickly assess a potential threat. As a quick tip, when ingesting data from an IDS or IPS, enable threat logging to log URL data. You can try this feature during the preview at no cost.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90131 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6.png\" alt=\"Image showing an investigation conducted using a Palo Alto Alert Rule.\" width=\"938\" height=\"526\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6.png 938w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6-300x168.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6-768x431.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6-687x385.png 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6-767x431.png 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/11\/Azure-Sentinel-updates-6-539x303.png 539w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/a><\/p>\n<h3>Integrate with ticketing and security management solutions<\/h3>\n<p>New Microsoft Graph Security API integrations enable you to sync alerts from Azure Sentinel, as well as other Microsoft solutions, with ticketing and security management solutions such as ServiceNow. You can learn more by reading the Microsoft Graph Security API <a href=\"https:\/\/aka.ms\/graphsecurityignite2019blogpost\" target=\"_blank\" rel=\"noopener\">overview page<\/a>.<\/p>\n<h3>Get started with Azure Sentinel and the new features<\/h3>\n<p>It\u2019s easy to get started. You can access the latest public preview features in the Azure Sentinel dashboard today. If you\u2019re not using Azure Sentinel, we welcome you to <a href=\"https:\/\/aka.ms\/microsoftazuresentinel\" target=\"_blank\" rel=\"noopener\">start a trial<\/a>.<\/p>\n<p>We collaborated with strategic partners to help you quickly design, implement, and operationalize your security operations using Azure Sentinel.<\/p>\n<p>Partners including Accenture, Avanade, Ascent, DXC Technology, EY Global, KPMG, Infosys, Insight, Optiv, PwC, Trustwave, and Wipro are now offering a variety of services from architecture, deployment, and consultancy to a fully managed security service.<\/p>\n<p>We have a lot of information available to help you, from great documentation to connecting with us via Yammer and email.<\/p>\n<ul>\n<li>Keep up to date by following the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Azure-Sentinel\/bg-p\/AzureSentinelBlog\" target=\"_blank\" rel=\"noopener\">Tech Community blog<\/a>.<\/li>\n<li>Join our <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Azure-Sentinel\/bd-p\/AzureSentinel\" target=\"_blank\" rel=\"noopener\">Tech Community<\/a>.<\/li>\n<li>Send us an email with feedback and suggestions.<\/li>\n<li>Become an <a href=\"http:\/\/aka.ms\/azuresentinelthreathunters\" target=\"_blank\" rel=\"noopener\">Azure Sentinel threat hunter<\/a>.<\/li>\n<\/ul>\n<h3>Visit us at Microsoft Ignite 2019<\/h3>\n<p>I will be joining many of our team members at <a href=\"https:\/\/www.microsoft.com\/en-us\/ignite\" target=\"_blank\" rel=\"noopener\">Microsoft Ignite<\/a>. Please stop by the Azure Sentinel booth. We would love to meet you.<\/p>\n<p>You can also get more information on SIEM strategies and Azure Sentinel in many of the sessions at Ignite:<\/p>\n<ul>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/79780?source=sessions\" target=\"_blank\" rel=\"noopener\">TK03\u2014Microsoft&#8217;s roadmap for security, compliance, and identity<\/a><\/li>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/81278?source=sessions\" target=\"_blank\" rel=\"noopener\">BRK011\u2014Microsoft security for your entire environment<\/a><\/li>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/79817?source=sessions\" target=\"_blank\" rel=\"noopener\">SEC150\u2014Modernize your SIEM in the cloud with Azure Sentinel<\/a><\/li>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/84140?source=sessions\" target=\"_blank\" rel=\"noopener\">BRK3236\u2014Get instant value from your SIEM: Best practices for Azure Sentinel<\/a><\/li>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/83949?source=sessions\" target=\"_blank\" rel=\"noopener\">THR2174\u2014Using Azure Sentinel to supercharge your threat hunting<\/a><\/li>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/83948?source=sessions\" target=\"_blank\" rel=\"noopener\">THR2159\u2014Threat Hunting in the Cloud with Azure Sentinel and Jupyter Notebooks<\/a><\/li>\n<li><a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/84512?source=sessions\" target=\"_blank\" rel=\"noopener\">Hands-on workshop WRK3033R2\u2014Investigate and respond to events with Azure Sentinel<\/a><\/li>\n<\/ul>\n<p>Looking forward to meeting you all at Ignite!<\/p>\n<div class=\"interruption interruption-icon-type\">\n<div class=\"interruption-icon-container\"> \t\t\t\t<img decoding=\"async\" class=\"interruption-icon\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Ignite-icon.png\"> \t\t\t<\/div>\n<div class=\"interruption-content-wrap\">\n<h3 class=\"interruption-title\">Microsoft Ignite<\/h3>\n<p class=\"interruption-text\">Join us online November 4\u20138, 2019 to livestream keynotes, watch selected sessions on-demand, and more.<\/p>\n<p> \t\t\t\t<a class=\"interruption-link c-glyph\" href=\"https:\/\/www.microsoft.com\/en-us\/ignite\"> \t\t\t\t\tLearn more\t\t\t\t<\/a> \t\t\t<\/div>\n<p><!-- .interruption-content-wrap --> \t\t<\/div>\n<p><!-- .interruption -->  \t\t <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/11\/05\/azure-sentinel-updates-improve-your-security-operations-with-innovations-from-a-cloud-native-siem\/\">Azure Sentinel updates: Improve your security operations with innovations from a cloud-native SIEM<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/11\/05\/azure-sentinel-updates-improve-your-security-operations-with-innovations-from-a-cloud-native-siem\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Tue, 05 Nov 2019 14:00:41 +0000<\/strong><\/p>\n<p>Learn about all the new features and enhancements introduced in Azure Sentinel, Microsoft\u2019s cloud-native SIEM solution, during Ignite 2019.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/11\/05\/azure-sentinel-updates-improve-your-security-operations-with-innovations-from-a-cloud-native-siem\/\">Azure Sentinel updates: Improve your security operations with innovations from a cloud-native SIEM<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21500,21498,22453],"class_list":["post-16774","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-azure-security","tag-microsoft-graph-security-api","tag-microsoft-security-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16774"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16774\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16774"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}