You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/log-plans.md
+42-19Lines changed: 42 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ There are two competing aspects of log collection and retention that are critica
16
16
17
17
These competing needs require a log management strategy that balances data accessibility, query performance, and storage costs.
18
18
19
-
This article discusses categories of data storage and accessibility, and describes the tools Microsoft Sentinel gives you to build a log management and retention strategy.
19
+
This article discusses categories of data and the retention states used to store and access your data. It also describes the log plans Microsoft Sentinel offers you to build a log management and retention strategy.
20
20
21
21
> [!IMPORTANT]
22
22
>
@@ -40,50 +40,73 @@ This category consists of logs that hold critical security value for your organi
40
40
41
41
-**On-demand hunting**. Complex queries are run on this data to execute interactive, high-performance hunting for security threats.
42
42
43
-
-**Correlation**. Data from these sources is correlated with data from other primary security data sources to detect threats and build attack stories
43
+
-**Correlation**. Data from these sources is correlated with data from other primary security data sources to detect threats and build attack stories.
44
44
45
45
-**Regular reporting**. Data from these sources is readily available for compiling into regular reports of the organization's security health, for both security and general decision makers.
46
46
47
47
-**Behavior analytics**. Data from these sources is used to build baseline behavior profiles for your users and devices, enabling you to identify outlying behaviors as suspicious.
48
48
49
49
Some examples of primary data sources include logs from antivirus or enterprise detection and response (EDR) systems, authentication logs, audit trails from cloud platforms, threat intelligence feeds, and alerts from external systems.
50
50
51
-
Logs containing primary security data should be stored using the **Analytics logs** plan. This plan keeps data in an **interactive retention** state for **90 days** by default, extensible for up to two years. In this state, your data can be queried in unlimited fashion and with high performance.
52
-
53
-
When the interactive retention period ends, data goes into a **long-term retention** state, remaining in its original table. Long-term retention is not defined by default, but you can define it to last up to 12 years. This state preserves your data for regulatory compliance or internal policy purposes. Data in this state can be queried in limited fashion and with much slower performance, but you can use a [**search job**](investigate-large-datasets.md) or [**restore**](restore.md) to pull out limited sets of data into interactive retention, where you can bring the full query capabilities to bear on it.
51
+
Logs containing primary security data should be stored using the [**Analytics logs**](#analytics-logs-plan) plan.
54
52
55
53
### Secondary security data
56
54
57
55
This category encompasses logs that have limited individual security value but are essential for providing a comprehensive view of a security incident or breach. Typically, these logs are high-volume and can be verbose. The security operations use cases for this data include the following:
58
56
59
57
-**Threat intelligence**. Primary data can be checked against lists of Indicators of Compromise (IoC) or Indicators of Attack (IoA) to quickly and easily detect threats.
60
58
61
-
-**Ad-hoc hunting/investigations**.
59
+
-**Ad-hoc hunting/investigations**. Data can be queried interactively for 30 days, facilitating crucial analysis for threat hunting and investigations.
62
60
63
-
-**Largescale searches**.
61
+
-**Large-scale searches**. Data can be ingested and searched in the background at petabyte scale, while being stored efficiently with minimal processing.
64
62
65
-
-**Summarization via summary rules**. Summarize high-volume logs into aggregate information and store the results as primary security data. To learn more about summary rules, see [Aggregate Microsoft Sentinel data with summary rules](summary-rules.md).
63
+
-**Summarization via summary rules**. Summarize high-volume logs into aggregate information and store the results as primary security data. To learn more about summary rules, see [Aggregate Microsoft Sentinel data with summary rules](../azure-monitor/logs/summary-rules.md).
66
64
67
65
Some examples of secondary data log sources are cloud storage access logs, NetFlow logs, TLS/SSL certificate logs, firewall logs, proxy logs, and IoT logs. To learn more about how each of these sources bring value to security detections without being needed all the time, see [Log sources to use for Auxiliary Logs ingestion](basic-logs-use-cases.md).
68
66
69
-
Logs containing secondary security data should be stored using the **Auxiliary logs** plan. This plan keeps data in an **interactive retention** state for **30 days**. In this state, your data can be queried with limited capabilities and with lower performance.
70
-
71
-
When the interactive retention period ends, data goes into a **long-term retention** state, remaining in its original table. Long-term retention in the auxiliary logs plan is similar to long-term retention in the analytics logs plan, except that the only option to rehydrate data is with a [**search job**](investigate-large-datasets.md). [Restore](restore.md) is not supported for auxiliary logs.
67
+
Logs containing secondary security data should be stored using the [**Auxiliary logs**](#auxiliary-logs-plan) plan.
72
68
73
69
## Log management plans
74
70
75
-
Microsoft Sentinel provides two different log storage plans, or types, to accommodate these categories of ingested data:
71
+
Microsoft Sentinel provides two different log storage plans, or types, to accommodate these categories of ingested data.
72
+
73
+
-[**Analytics logs** plan](#analytics-logs-plan)
74
+
-[**Auxiliary logs** plan](#auxiliary-logs-plan)
75
+
- A third plan, [**Basic logs**](#basic-logs-plan), is the predecessor of the auxiliary logs plan, and can be used as a substitute for it while the auxiliary logs plan remains in preview.
76
+
77
+
**Each of these plans preserves data in two different states:**
78
+
79
+
- The **interactive retention** state is the initial state into which the data is ingested. This state allows different levels of access to the data, depending on the plan, and costs for this state vary widely, depending on the plan.
80
+
- The **long-term retention** state preserves older data in its original tables for up to 12 years, at **extremely low cost**, regardless of the plan.
81
+
82
+
To learn more about retention states, see [Manage data retention in a Log Analytics workspace](../azure-monitor/logs/data-retention-configure.md).
83
+
84
+
### Analytics logs plan
85
+
86
+
**Analytics logs** are designed to store primary security data and make it easily and constantly accessible at high performance.
87
+
88
+
This plan keeps data in the **interactive retention** state for **90 days** by default, extensible for up to two years. This interactive state, while expensive, allows you to query your data in unlimited fashion, with high performance, at no charge per query.
89
+
90
+
When the interactive retention period ends, data goes into the **long-term retention** state, while remaining in its original table. The long-term retention period is not defined by default, but you can define it to last up to 12 years. This retention state preserves your data at extremely low cost, for regulatory compliance or internal policy purposes. You can access the data in this state only by using a [**search job**](investigate-large-datasets.md) or [**restore**](restore.md) to pull out limited sets of data into a new table in interactive retention, where you can bring the full query capabilities to bear on it.
91
+
92
+
### Auxiliary logs plan
93
+
94
+
**Auxiliary logs** are designed to store secondary security data at very low cost for long periods of time, while still allowing for limited accessibility.
95
+
96
+
This plan keeps data in the **interactive retention** state for **30 days**. In the Auxiliary plan, this state has very low retention costs as compared to the Analytics plan. However, the query capabilities are limited: queries are charged per gigabyte of data scanned and are limited to a single table, and performance is significantly lower.
97
+
98
+
When the interactive retention period ends, data goes into the **long-term retention** state, remaining in its original table. Long-term retention in the auxiliary logs plan is similar to long-term retention in the analytics logs plan, except that the only option to access the data is with a [**search job**](investigate-large-datasets.md). [Restore](restore.md) is not supported for the auxiliary logs plan.
76
99
77
-
-**Analytics logs** are designed to store primary security data and make it easily and constantly accessible at high performance.
100
+
The following diagram summarizes and compares these two log management plans.
78
101
79
-
-**Auxiliary logs** are designed to store secondary security data at very low cost for long periods of time, while still allowing for limited accessibility.
102
+
:::image type="content" border=false source="media/log-plans/analytics-auxiliary-log-plans.png" alt-text="Diagram of available log plans in Microsoft Sentinel.":::
80
103
81
-
There is a third plan, known as **Basic logs**, that provides similar functionality to auxiliary logs, but at a higher cost (though not as high as analytics logs). While the auxiliary logs plan remains in preview, basic logs can be an option for long-term, low-cost retention if your organization doesn't use preview features.
104
+
### Basic logsplan
82
105
83
-
:::image type="content" source="media/log-plans/analytics-auxiliary-log-plans.png" alt-text="Diagram of available log plans in Microsoft Sentinel.":::
106
+
There is a third plan, known as **Basic logs**, that provides similar functionality to the auxiliary logs plan, but at a higher interactive retention cost (though not as high as the analytics logs plan). While the auxiliary logs plan remains in preview, basic logs can be an option for long-term, low-cost retention if your organization doesn't use preview features. To learn more about the basic logs plan, see [Table plans](../azure-monitor/logs/data-platform-logs.md#table-plans) in the Azure Monitor documentation.
84
107
85
-
## Next steps
108
+
## Related content
86
109
87
-
- For a more in-depth comparison of log data plans, and more general information about log types, see [Select a table plan based on data usage in a Log Analytics workspace](../azure-monitor/logs/logs-table-plans.md).
110
+
- For a more in-depth comparison of log data plans, and more general information about log types, see [Azure Monitor Logs overview | Table plans](../azure-monitor/logs/data-platform-logs.md#table-plans).
88
111
89
-
- To understand more about retention periods—which exist across plans—see [Data retention and archive in Azure Monitor Logs](../azure-monitor/logs/data-retention-archive.md).
112
+
- To understand more about retention periods—which exist across plans—see [Manage data retention in a Log Analytics workspace](../azure-monitor/logs/data-retention-configure.md).
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,8 @@ The new **Auxiliary logs** retention plan for Log Analytics tables allows you to
38
38
39
39
To learn more about Auxiliary logs and compare with Analytics logs, see [Log retention plans in Microsoft Sentinel](log-plans.md).
40
40
41
+
For more in-depth information about the different log management plans, see [**Table plans**](../azure-monitor/logs/data-platform-logs.md#table-plans) in the [Azure Monitor Logs overview](../azure-monitor/logs/data-platform-logs.md) article from the Azure Monitor documentation.
42
+
41
43
## June 2024
42
44
43
45
-[Codeless Connector Platform now generally available](#codeless-connector-platform-now-generally-available)
0 commit comments