You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/configure-data-connector.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,6 +61,20 @@ After you or someone in your organization installs the solution that includes th
61
61
62
62
:::image type="content" source="media/configure-data-connector/connected-data-connector.png" alt-text="Screenshot of a data connector page with status connected and graph that shows the data received.":::
63
63
64
+
## Find your data
65
+
66
+
After you enable the connector successfully, the connector begins to stream data to the table schemas related to the data types you configurated.
67
+
68
+
To view the data:
69
+
70
+
#### [Azure portal](#tab/azure-portal-1)
71
+
72
+
Query the tables in the Microsoft Sentinel workspace linked to your Microsoft Sentinel workspace.
73
+
74
+
#### [Defender portal](#tab/defender-portal-1)
75
+
76
+
See [Where to find your Microsoft Sentinel data in Microsoft Defender portal](/defender-xdr/advanced-hunting-microsoft-defender#where-to-find-your-microsoft-sentinel-data).
77
+
64
78
## Find support for a data connector
65
79
66
80
Both Microsoft and other organizations author Microsoft Sentinel data connectors. Find the support contact from data connector page in Microsoft Sentinel.
|[**Audit logs**](../active-directory/reports-monitoring/concept-audit-logs.md)| System activity related to user and group management, managed applications, and directory activities. |[AuditLogs](/azure/azure-monitor/reference/tables/auditlogs)|
25
-
|[**Sign-in logs**](../active-directory/reports-monitorig/concept-all-sign-ins.md)| Interactive user sign-ins where a user provides an authentication factor. |[SigninLogs](/azure/azure-monitor/reference/tables/signinlogs)|
26
-
|[**Non-interactive user sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#non-interactive-user-sign-ins)(**PREVIEW**) | Sign-ins performed by a client on behalf of a user without any interaction or authentication factor from the user. |[AADNonInteractiveUserSignInLogs](/azure/azure-monitor/reference/tables/aadnoninteractiveusersigninlogs)|
25
+
|[**Sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md)| Interactive user sign-ins where a user provides an authentication factor. |[SigninLogs](/azure/azure-monitor/reference/tables/signinlogs)|
26
+
|[**Non-interactive user sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#non-interactive-user-sign-ins)(**PREVIEW**) | Sign-ins performed by a client on behalf of a user without any interaction or authentication factor from the user. |[AADNonInteractiveUserSignInLogs](/azure/azure-monitor/reference/tables/aadnoninteractiveusersigninlogs)|
27
27
|[**Service principal sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#service-principal-sign-ins) (**PREVIEW**) | Sign-ins by apps and service principals that don't involve any user. In these sign-ins, the app or service provides a credential on its own behalf to authenticate or access resources. |[AADServicePrincipalSignInLogs](/azure/azure-monitor/reference/tables/aadserviceprincipalsigninlogs)|
28
28
|[**Managed Identity sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md#managed-identity-for-azure-resources-sign-ins) (**PREVIEW**) | Sign-ins by Azure resources that have secrets managed by Azure. For more information, see [What are managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md). |[AADManagedIdentitySignInLogs](/azure/azure-monitor/reference/tables/aadmanagedidentitysigninlogs)|
29
29
|[**AD FS sign-in logs**](/entra/identity/monitoring-health/concept-usage-insights-report#ad-fs-application-activity)| Sign-ins performed through Active Directory Federation Services (AD FS). |[ADFSSignInLogs](/azure/azure-monitor/reference/tables/adfssigninlogs)|
30
-
|[**Enriched Office 365 audit logs**](/entra/global-secure-access/how-to-vie✅w-enriched-logs)| Security events related to Microsoft 365 apps. |[EnrichedOffice365AuditLogs](/azure/azure-monitor/reference/tables/enrichedmicrosoft365auditlogs)|
30
+
|[**Enriched Office 365 audit logs**](/entra/global-secure-access/how-to-view-enriched-logs)| Security events related to Microsoft 365 apps. |[EnrichedOffice365AuditLogs](/azure/azure-monitor/reference/tables/enrichedmicrosoft365auditlogs)|
31
31
|[**Provisioning logs**](../active-directory/reports-monitoring/concept-provisioning-logs.md) (**PREVIEW**) | System activity information about users, groups, and roles provisioned by the Microsoft Entra provisioning service. |[AADProvisioningLogs](/azure/azure-monitor/reference/tables/aadprovisioninglogs)|
32
-
|[**Microsoft Graph activity logs**](/graph/microsoft-graph-activity-logs-overview| HTTP requests accessing your tenant’s resources through the Microsoft Graph API. |[MicrosoftGraphActivityLogs](/azure/azure-monitor/reference/tables/microsoftgraphactivitylogs)|
32
+
|[**Microsoft Graph activity logs**](/graph/microsoft-graph-activity-logs-overview)| HTTP requests accessing your tenant’s resources through the Microsoft Graph API. |[MicrosoftGraphActivityLogs](/azure/azure-monitor/reference/tables/microsoftgraphactivitylogs)|
33
33
|[**Network access traffic logs**](/entra/global-secure-access/how-to-view-traffic-logs)| Network access traffic and activities. |[NetworkAccessTraffic](/azure/azure-monitor/reference/tables/networkaccesstraffic)|
34
34
|[**Remote network health logs**](/entra/global-secure-access/how-to-remote-network-health-logs?tabs=microsoft-entra-admin-center)| Insights into the health of remote networks. |[RemoteNetworkHealthLogs](/azure/azure-monitor/reference/tables/remotenetworkhealthlogs)|
35
35
|[**User risk events**](/entra/id-protection/howto-identity-protection-investigate-risk?branch=main#risk-detections-report)| User risk events generated by Microsoft Entra ID Protection. |[AADUserRiskEvents](/azure/azure-monitor/reference/tables/aaduserriskevents)|
@@ -38,7 +38,7 @@ This table lists the logs you can send from Microsoft Entra ID to Microsoft Sent
38
38
|[**Service principal risk events**](/entra/id-protection/howto-identity-protection-investigate-risk#risy-users-report)| Risk detections associated with service principals logged by Microsoft Entra ID Protection. |[AADServicePrincipalRiskEvents](/azure/azure-monitor/reference/tables/aadserviceprincipalriskevents)|
39
39
40
40
> [!IMPORTANT]
41
-
> Some of the available log types are currently in **PREVIEW**. See the [Supplemental Termso| Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
41
+
> Some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -54,25 +54,13 @@ This table lists the logs you can send from Microsoft Entra ID to Microsoft Sent
54
54
55
55
<aname='connect-to-azure-active-directory'></a>
56
56
57
-
## Install the Microsoft Entra ID data connector
57
+
## Enable the Microsoft Entra ID data connector
58
58
59
-
To install the Microsoft Entra ID data connector, search for and enable **Microsoft Entra ID** as described in [Enable a data connector](configure-data-connector.md#enable-a-data-connector).
59
+
Search for and enable the **Microsoft Entra ID** connector as described in [Enable a data connector](configure-data-connector.md#enable-a-data-connector).
60
60
61
-
## Find and use your data
61
+
## Install the Microsoft Entra ID solution (optional)
62
62
63
-
After a successful connection is established, the data appears in **Logs**, under the **LogManagement** section, in the following tables:
64
-
65
-
-`SigninLogs`
66
-
-`AuditLogs`
67
-
-`AADNonInteractiveUserSignInLogs`
68
-
-`AADServicePrincipalSignInLogs`
69
-
-`AADManagedIdentitySignInLogs`
70
-
-`AADProvisioningLogs`
71
-
-`MSGraphActivityLogs`
72
-
73
-
To query the Microsoft Entra logs, enter the relevant table name at the top of the query window.
74
-
75
-
If an expected table is not available, verify the log categories are selected for your Microsoft Sentinel workspace in Microsoft Entra diagnostic settings. For more informatoin, see [Configure Microsoft Entra diagnostic settings for activity logs](/entra/identity/monitoring-health/howto-configure-diagnostic-settings).
63
+
Install the solution for **Microsoft Entra ID** from the **Content Hub** in Microsoft Sentinel to get prebuilt workbooks, analytics rules, playbooks, and more. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
76
64
77
65
## Next steps
78
66
In this document, you learned how to connect Microsoft Entra ID to Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:
0 commit comments