Skip to content

Commit 15e11af

Browse files
authored
Merge pull request #245037 from cwatson-cat/deploymentguide
Sentinel - deployment guide
2 parents 161d690 + 530c102 commit 15e11af

20 files changed

+490
-236
lines changed

articles/lighthouse/how-to/manage-sentinel-workspaces.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -76,13 +76,13 @@ You can also deploy workbooks directly in an individual managed tenant for scena
7676

7777
## Run Log Analytics and hunting queries across Microsoft Sentinel workspaces
7878

79-
Create and save Log Analytics queries for threat detection centrally in the managing tenant, including [hunting queries](../../sentinel/extend-sentinel-across-workspaces-tenants.md#cross-workspace-hunting). These queries can be run across all of your customers' Microsoft Sentinel workspaces by using the Union operator and the [workspace() expression](../../azure-monitor/logs/workspace-expression.md).
79+
Create and save Log Analytics queries for threat detection centrally in the managing tenant, including [hunting queries](../../sentinel/extend-sentinel-across-workspaces-tenants.md#hunt-across-multiple-workspaces). These queries can be run across all of your customers' Microsoft Sentinel workspaces by using the Union operator and the [workspace() expression](../../azure-monitor/logs/workspace-expression.md).
8080

81-
For more information, see [Cross-workspace querying](../../sentinel/extend-sentinel-across-workspaces-tenants.md#cross-workspace-querying).
81+
For more information, see [Cross-workspace querying](../../sentinel/extend-sentinel-across-workspaces-tenants.md#query-multiple-workspaces).
8282

8383
## Use automation for cross-workspace management
8484

85-
You can use automation to manage multiple Microsoft Sentinel workspaces and configure [hunting queries](../../sentinel/hunting.md), playbooks, and workbooks. For more information, see [Cross-workspace management using automation](../../sentinel/extend-sentinel-across-workspaces-tenants.md#cross-workspace-management-using-automation).
85+
You can use automation to manage multiple Microsoft Sentinel workspaces and configure [hunting queries](../../sentinel/hunting.md), playbooks, and workbooks. For more information, see [Cross-workspace management using automation](../../sentinel/extend-sentinel-across-workspaces-tenants.md#manage-multiple-workspaces-using-automation).
8686

8787
## Monitor security of Office 365 environments
8888

articles/sentinel/TOC.yml

Lines changed: 75 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,46 @@
1111
items:
1212
- name: Onboard to Microsoft Sentinel
1313
href: quickstart-onboard.md
14+
- name: Deploy
15+
items:
16+
- name: Plan and prepare
17+
items:
18+
- name: Overview and prerequisites
19+
href: prerequisites.md
20+
- name: Plan workspace architecture
21+
items:
22+
- name: Review best practices
23+
href: best-practices-workspace-architecture.md
24+
- name: Design workspace architecture
25+
href: design-your-workspace-architecture.md
26+
- name: Review sample workspace designs
27+
href: sample-workspace-designs.md
28+
- name: Prepare for multiple workspaces
29+
href: prepare-multiple-workspaces.md
30+
- name: Prioritize data connectors
31+
href: prioritize-data-connectors.md
32+
- name: Plan roles and permissions
33+
href: roles.md
34+
- name: Plan costs
35+
href: billing.md
36+
- name: Deploy
37+
items:
38+
- name: Overview
39+
href: deploy-overview.md
40+
- name: Enable Microsoft Sentinel and initial features and content
41+
href: enable-sentinel-features-content.md
42+
- name: Configure content
43+
href: configure-content.md
44+
- name: Set up multiple workspaces
45+
href: use-multiple-workspaces.md
46+
- name: Enable User and Entity Behavior Analytics (UEBA)
47+
href: enable-entity-behavior-analytics.md
48+
- name: Configure data retention and archive
49+
href: configure-data-retention-archive.md
50+
- name: Review and fine-tune
51+
items:
52+
- name: Review and fine-tune checklist
53+
href: review-fine-tune-overview.md
1454
- name: Tutorials
1555
items:
1656
- name: Forward syslog data to workspace
@@ -37,44 +77,26 @@
3777
href: ../defender-for-iot/organizations/iot-advanced-threat-monitoring.md?bc=%2fazure%2fsentinel%2fbreadcrumb%2ftoc.json&toc=%2fazure%2fsentinel%2fTOC.json
3878
- name: Concepts
3979
items:
40-
- name: Plan
41-
items:
42-
- name: Prerequisites
43-
href: prerequisites.md
80+
- name: Availability and support
81+
items:
4482
- name: Geographical availability and data residency
45-
href: geographical-availability-data-residency.md
46-
- name: Costs and billing
47-
items:
48-
- name: Plan costs
49-
href: billing.md
50-
- name: Monitor costs
51-
href: billing-monitor-costs.md
52-
- name: Reduce costs
53-
href: billing-reduce-costs.md
54-
- name: Best practices
55-
items:
56-
- name: Overview
57-
href: best-practices.md
58-
- name: Workspace architecture
59-
href: best-practices-workspace-architecture.md
60-
- name: Data collection
61-
href: best-practices-data.md
62-
- name: Partner integrations
63-
href: partner-integrations.md
64-
- name: Basic Logs
65-
href: basic-logs-use-cases.md
66-
- name: Auditing and health monitoring
67-
href: health-audit.md
68-
- name: Architecture
69-
items:
70-
- name: Roles and permissions
71-
href: roles.md
72-
- name: Extend Microsoft Sentinel across workspaces and tenants
73-
href: extend-sentinel-across-workspaces-tenants.md
74-
- name: Security baseline
75-
href: /security/benchmark/azure/baselines/sentinel-security-baseline?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
76-
- name: Support for data types in different clouds
77-
href: data-type-cloud-support.md
83+
href: geographical-availability-data-residency.md
84+
- name: Support for data types in different clouds
85+
href: data-type-cloud-support.md
86+
- name: Security baseline
87+
href: /security/benchmark/azure/baselines/sentinel-security-baseline?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
88+
- name: Best practices
89+
items:
90+
- name: Overview
91+
href: best-practices.md
92+
- name: Data collection
93+
href: best-practices-data.md
94+
- name: Partner integrations
95+
href: partner-integrations.md
96+
- name: Basic Logs
97+
href: basic-logs-use-cases.md
98+
- name: Auditing and health monitoring
99+
href: health-audit.md
78100
- name: Find solutions and content
79101
items:
80102
- name: About Sentinel content
@@ -186,15 +208,7 @@
186208
- name: Dynamics 365 Finance and Operations solution overview
187209
href: dynamics-365/dynamics-365-finance-operations-solution-overview.md
188210
- name: How-tos
189-
items:
190-
- name: Plan architecture
191-
items:
192-
- name: Overview
193-
href: design-your-workspace-architecture.md
194-
- name: Sample workspace designs
195-
href: sample-workspace-designs.md
196-
- name: Manage workspace access
197-
href: resource-context-rbac.md
211+
items:
198212
- name: Migrate to Microsoft Sentinel
199213
items:
200214
- name: Plan and design your migration
@@ -850,9 +864,7 @@
850864
- name: Handle ingestion delay in analytics rules
851865
href: ingestion-delay.md
852866
- name: Get fine-tuning recommendations
853-
href: detection-tuning.md
854-
- name: Enable User and Entity Behavior Analytics (UEBA)
855-
href: enable-entity-behavior-analytics.md
867+
href: detection-tuning.md
856868
- name: Work with out-of-the-box anomaly rules
857869
href: work-with-anomaly-rules.md
858870
- name: Configure multistage attack (Fusion) rules
@@ -939,8 +951,18 @@
939951
href: create-tasks-playbook.md
940952
- name: Manage Microsoft Sentinel
941953
items:
942-
- name: Manage multiple workspaces
943-
href: workspace-manager.md
954+
- name: Manage costs and billing
955+
items:
956+
- name: Monitor costs
957+
href: billing-monitor-costs.md
958+
- name: Reduce costs
959+
href: billing-reduce-costs.md
960+
- name: Manage multiple workspaces
961+
items:
962+
- name: Workspace manager
963+
href: workspace-manager.md
964+
- name: Extend across multiple workspaces
965+
href: extend-sentinel-across-workspaces-tenants.md
944966
- name: Microsoft Sentinel for MSSPs
945967
items:
946968
- name: Manage multiple tenants (MSSP)
@@ -949,6 +971,8 @@
949971
href: multiple-workspace-view.md
950972
- name: Manage your intellectual property in Microsoft Sentinel
951973
href: mssp-protect-intellectual-property.md
974+
- name: Manage workspace access
975+
href: resource-context-rbac.md
952976
- name: Switch to simplified pricing tiers
953977
href: enroll-simplified-pricing-tier.md
954978
- name: Set up customer-managed keys

articles/sentinel/best-practices-data.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,7 @@ This section reviews best practices for collecting data using Microsoft Sentinel
1313

1414
## Prioritize your data connectors
1515

16-
If it's unclear to you which data connectors will best serve your environment, start by enabling all [free data connectors](billing.md#free-data-sources).
17-
18-
The free data connectors will start showing value from Microsoft Sentinel as soon as possible, while you continue to plan other data connectors and budgets.
19-
20-
For your [partner](data-connectors-reference.md) and [custom](create-custom-connector.md) data connectors, start by setting up [Syslog](connect-syslog.md) and [CEF](connect-common-event-format.md) connectors, with the highest priority first, as well as any Linux-based devices.
21-
22-
If your data ingestion becomes too expensive, too quickly, stop or filter the logs forwarded using the [Azure Monitor Agent](../azure-monitor/agents/azure-monitor-agent-overview.md).
23-
24-
> [!TIP]
25-
> Custom data connectors enable you to ingest data into Microsoft Sentinel from data sources not currently supported by built-in functionality, such as via agent, Logstash, or API. For more information, see [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md).
26-
>
16+
Learn how to [prioritize your data connectors](prioritize-data-connectors.md) as part of the Microsoft Sentinel deployment process.
2717

2818
## Filter your logs before ingestion
2919

@@ -46,30 +36,30 @@ Filter your logs using one of the following methods:
4636
Standard configuration for data collection may not work well for your organization, due to various challenges. The following tables describe common challenges or requirements, and possible solutions and considerations.
4737

4838
> [!NOTE]
49-
> Many solutions listed below require a custom data connector. For more information, see [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md).
39+
> Many solutions listed in the following sections require a custom data connector. For more information, see [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md).
5040
>
5141
5242
### On-premises Windows log collection
5343

5444

5545
|Challenge / Requirement |Possible solutions |Considerations |
5646
|---------|---------|---------|
57-
|**Requires log filtering** | Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features are not supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, you'll need to make updates in resources such as threat hunting queries and analytics rules |
47+
|**Requires log filtering** | Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features aren't supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, make updates in resources such as threat hunting queries and analytics rules |
5848
|**Agent cannot be installed** |Use Windows Event Forwarding, supported with the [Azure Monitor Agent](connect-windows-security-events.md#connector-options) | Using Windows Event forwarding lowers load-balancing events per second from the Windows Event Collector, from 10,000 events to 500-1000 events.|
5949
|**Servers do not connect to the internet** | Use the [Log Analytics gateway](../azure-monitor/agents/gateway.md) | Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
6050
|**Requires tagging and enrichment at ingestion** |Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support RBAC for custom tables <br><br>Microsoft Sentinel doesn’t support row-level RBAC <br><br>**Tip**: You may want to adopt cross workspace design and functionality for Microsoft Sentinel. |
6151
|**Requires splitting operation and security logs** | Use the [Microsoft Monitor Agent or Azure Monitor Agent](connect-windows-security-events.md) multi-home functionality | Multi-home functionality requires more deployment overhead for the agent. |
62-
|**Requires custom logs** | Collect files from specific folder paths <br><br>Use API ingestion <br><br>Use PowerShell <br><br>Use Logstash | You may have issues filtering your logs. <br><br>Custom methods are not supported. <br><br>Custom connectors may require developer skills. |
52+
|**Requires custom logs** | Collect files from specific folder paths <br><br>Use API ingestion <br><br>Use PowerShell <br><br>Use Logstash | You may have issues filtering your logs. <br><br>Custom methods aren't supported. <br><br>Custom connectors may require developer skills. |
6353

6454

6555
### On-premises Linux log collection
6656

6757
|Challenge / Requirement |Possible solutions |Considerations |
6858
|---------|---------|---------|
69-
|**Requires log filtering** | Use Syslog-NG <br><br>Use Rsyslog <br><br>Use FluentD configuration for the agent <br><br> Use the Azure Monitor Agent/Microsoft Monitoring Agent <br><br> Use Logstash | Some Linux distributions may not be supported by the agent. <br> <br>Using Syslog or FluentD requires developer knowledge. <br><br>For more information, see [Connect to Windows servers to collect security events](connect-windows-security-events.md) and [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md). |
59+
|**Requires log filtering** | Use Syslog-NG <br><br>Use Rsyslog <br><br>Use FluentD configuration for the agent <br><br> Use the Azure Monitor Agent/Microsoft Monitoring Agent <br><br> Use Logstash | Some Linux distributions might not be supported by the agent. <br> <br>Using Syslog or FluentD requires developer knowledge. <br><br>For more information, see [Connect to Windows servers to collect security events](connect-windows-security-events.md) and [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md). |
7060
|**Agent cannot be installed** | Use a Syslog forwarder, such as (syslog-ng or rsyslog. | |
7161
|**Servers do not connect to the internet** | Use the [Log Analytics gateway](../azure-monitor/agents/gateway.md) | Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
72-
|**Requires tagging and enrichment at ingestion** | Use Logstash for enrichment, or custom methods, such as API or EventHubs. | You may have extra effort required for filtering. |
62+
|**Requires tagging and enrichment at ingestion** | Use Logstash for enrichment, or custom methods, such as API or Event Hubs. | You may have extra effort required for filtering. |
7363
|**Requires splitting operation and security logs** | Use the [Azure Monitor Agent](connect-windows-security-events.md) with the multi-homing configuration. | |
7464
|**Requires custom logs** | Create a custom collector using the Microsoft Monitoring (Log Analytics) agent. | |
7565

@@ -103,7 +93,7 @@ If you need to collect Microsoft Office data, outside of the standard connector
10393
|**Filter logs from other platforms** | Use Logstash <br><br>Use the Azure Monitor Agent / Microsoft Monitoring (Log Analytics) agent | Custom collection has extra ingestion costs. <br><br>You may have a challenge of collecting all Windows events vs only security events. |
10494
|**Agent cannot be used** | Use Windows Event Forwarding | You may need to load balance efforts across your resources. |
10595
|**Servers are in air-gapped network** | Use the [Log Analytics gateway](../azure-monitor/agents/gateway.md) | Configuring a proxy to your agent requires firewall rules to allow the Gateway to work. |
106-
|**RBAC, tagging, and enrichment at ingestion** | Create custom collection via Logstash or the Log Analytics API. | RBAC is not supported for custom tables <br><br>Row-level RBAC is not supported for any tables. |
96+
|**RBAC, tagging, and enrichment at ingestion** | Create custom collection via Logstash or the Log Analytics API. | RBAC isn't supported for custom tables <br><br>Row-level RBAC isn't supported for any tables. |
10797

10898

10999
## Next steps

articles/sentinel/best-practices-workspace-architecture.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about best practices for designing your Microsoft Sentinel wo
44
author: limwainstein
55
ms.author: lwainstein
66
ms.topic: conceptual
7-
ms.date: 01/09/2023
7+
ms.date: 06/28/2023
88
---
99

1010
# Microsoft Sentinel workspace architecture best practices
@@ -138,7 +138,7 @@ Don't apply a resource lock to a Log Analytics workspace you'll use for Microsof
138138

139139
If you do need to work with multiple workspaces, simplify your incident management and investigation by [condensing and listing all incidents from each Microsoft Sentinel instance in a single location](multiple-workspace-view.md).
140140

141-
To reference data that's held in other Microsoft Sentinel workspaces, such as in [cross-workspace workbooks](extend-sentinel-across-workspaces-tenants.md#cross-workspace-workbooks), use [cross-workspace queries](extend-sentinel-across-workspaces-tenants.md).
141+
To reference data that's held in other Microsoft Sentinel workspaces, such as in [cross-workspace workbooks](extend-sentinel-across-workspaces-tenants.md#use-cross-workspace-workbooks), use [cross-workspace queries](extend-sentinel-across-workspaces-tenants.md#query-multiple-workspaces).
142142

143143
The best time to use cross-workspace queries is when valuable information is stored in a different workspace, subscription or tenant, and can provide value to your current action. For example, the following code shows a sample cross-workspace query:
144144

@@ -152,12 +152,8 @@ union Update, workspace("contosoretail-it").Update, workspace("WORKSPACE ID").Up
152152
For more information, see [Extend Microsoft Sentinel across workspaces and tenants](extend-sentinel-across-workspaces-tenants.md).
153153

154154
## Next steps
155-
> [!div class="nextstepaction"]
156-
> >[Design your Microsoft Sentinel workspace architecture](design-your-workspace-architecture.md)
157-
> [!div class="nextstepaction"]
158-
> >[Microsoft Sentinel sample workspace designs](sample-workspace-designs.md)
159-
> [!div class="nextstepaction"]
160-
> >[On-board Microsoft Sentinel](quickstart-onboard.md)
161-
> [!div class="nextstepaction"]
162-
> >[Get visibility into alerts](get-visibility.md)
163155

156+
In this article, you learned about key decision factors to help you determine the right workspace architecture for your organizations.
157+
158+
> [!div class="nextstepaction"]
159+
> >[Design your Microsoft Sentinel workspace architecture](design-your-workspace-architecture.md)

0 commit comments

Comments
 (0)