Skip to content

Commit 1fcb550

Browse files
committed
Next draft
1 parent 610c2fb commit 1fcb550

File tree

3 files changed

+138
-3
lines changed

3 files changed

+138
-3
lines changed
Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Common threat detection scenarios | Microsoft Docs
3+
description: Learn some common threats you might want to search for and which components you need, and learn how to set up these detections.
4+
services: sentinel
5+
documentationcenter: na
6+
author: yelevin
7+
manager: rkarlin
8+
editor: ''
9+
10+
ms.assetid: d51d2e09-a073-41c8-b396-91d60b057e6a
11+
ms.service: azure-sentinel
12+
ms.subservice: azure-sentinel
13+
ms.devlang: na
14+
ms.topic: conceptual
15+
ms.tgt_pltfrm: na
16+
ms.workload: na
17+
ms.date: 06/06/2021
18+
ms.author: yelevin
19+
---
20+
21+
# Common threat detection scenarios
22+
23+
## Configure the Security events / Windows Security Events connector for anomalous RDP login detection
24+
25+
> [!IMPORTANT]
26+
> Anomalous RDP login detection is currently in public preview.
27+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
28+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
29+
30+
Azure Sentinel can apply machine learning (ML) to Security events data to identify anomalous Remote Desktop Protocol (RDP) login activity. Scenarios include:
31+
32+
- **Unusual IP** - the IP address has rarely or never been observed in the last 30 days
33+
34+
- **Unusual geo-location** - the IP address, city, country, and ASN have rarely or never been observed in the last 30 days
35+
36+
- **New user** - a new user logs in from an IP address and geo-location, both or either of which were not expected to be seen based on data from the 30 days prior.
37+
38+
**Configuration instructions**
39+
40+
1. You must be collecting RDP login data (Event ID 4624) through the **Security events** or **Windows Security Events** data connectors. Make sure you have selected an [event set](#event-id-reference) besides "None", or created a data collection rule that includes this event ID, to stream into Azure Sentinel.
41+
42+
1. From the Azure Sentinel portal, select **Analytics**, and then select the **Rule templates** tab. Choose the **(Preview) Anomalous RDP Login Detection** rule, and move the **Status** slider to **Enabled**.
43+
44+
> [!NOTE]
45+
> As the machine learning algorithm requires 30 days' worth of data to build a baseline profile of user behavior, you must allow 30 days of Windows Security events data to be collected before any incidents can be detected.
46+
47+
## Configure the Syslog connector for anomalous SSH login detection
48+
49+
> [!IMPORTANT]
50+
> Anomalous SSH login detection is currently in public preview.
51+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
52+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
53+
54+
Azure Sentinel can apply machine learning (ML) to the syslog data to identify anomalous Secure Shell (SSH) login activity. Scenarios include:
55+
56+
- Impossible travel – when two successful login events occur from two locations that are impossible to reach within the timeframe of the two login events.
57+
- Unexpected location – the location from where a successful login event occurred is suspicious. For example, the location has not been seen recently.
58+
59+
This detection requires a specific configuration of the Syslog data connector:
60+
61+
1. For step 2 under [Configure the Log Analytics agent](#configure-the-log-analytics-agent) above, make sure that both **auth** and **authpriv** are selected as facilities to monitor, and that all the severities are selected.
62+
63+
2. Allow sufficient time for syslog information to be collected. Then, navigate to **Azure Sentinel - Logs**, and copy and paste the following query:
64+
65+
```kusto
66+
Syslog
67+
| where Facility in ("authpriv","auth")
68+
| extend c = extract( "Accepted\\s(publickey|password|keyboard-interactive/pam)\\sfor ([^\\s]+)",1,SyslogMessage)
69+
| where isnotempty(c)
70+
| count
71+
```
72+
73+
Change the **Time range** if required, and select **Run**.
74+
75+
If the resulting count is zero, confirm the configuration of the connector and that the monitored computers do have successful login activity for the time period you specified for your query.
76+
77+
If the resulting count is greater than zero, your syslog data is suitable for anomalous SSH login detection. You enable this detection from **Analytics** > **Rule templates** > **(Preview) Anomalous SSH Login Detection**.
78+
79+
80+
## Next steps
81+
In this document, you learned how to connect Windows security events to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
82+
- Learn how to [get visibility into your data and potential threats](get-visibility.md).
83+
- Get started detecting threats with Azure Sentinel, using [built-in](detect-threats-built-in.md) or [custom](detect-threats-custom.md) rules.

articles/sentinel/connect-azure-windows-microsoft-services.md

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,56 @@ You'll see all your data collection rules (including those created through the A
230230
> - If you receive the message No events were found that match the specified selection criteria., the query may be valid, but there are no matching events on the local machine.
231231
> - If you receive the message The specified query is invalid , the query syntax is invalid.
232232
233+
### Create data collection rules using the API
234+
235+
You can also create data collection rules using the API ([see schema](/rest/api/monitor/data-collection-rules)), which can make life easier if you're creating many rules (if you're an MSSP, for example). Here's an example you can use as a template for creating a rule:
236+
237+
**Request URL and header**
238+
239+
```http
240+
PUT https://management.azure.com/subscriptions/703362b3-f278-4e4b-9179-c76eaf41ffc2/resourceGroups/myResourceGroup/providers/Microsoft.Insights/dataCollectionRules/myCollectionRule?api-version=2019-11-01-preview
241+
```
242+
243+
**Request body**
244+
245+
```json
246+
{
247+
"location": "eastus",
248+
"properties": {
249+
"dataSources": {
250+
"windowsEventLogs": [
251+
{
252+
"streams": [
253+
"Microsoft-SecurityEvent"
254+
],
255+
"xPathQueries": [
256+
"Security!*[System[(EventID=) or (EventID=4688) or (EventID=4663) or (EventID=4624) or (EventID=4657) or (EventID=4100) or (EventID=4104) or (EventID=5140) or (EventID=5145) or (EventID=5156)]]"
257+
],
258+
"name": "eventLogsDataSource"
259+
}
260+
]
261+
},
262+
"destinations": {
263+
"logAnalytics": [
264+
{
265+
"workspaceResourceId": "/subscriptions/703362b3-f278-4e4b-9179-c76eaf41ffc2/resourceGroups/myResourceGroup/providers/Microsoft.OperationalInsights/workspaces/centralTeamWorkspace",
266+
"name": "centralWorkspace"
267+
}
268+
]
269+
},
270+
"dataFlows": [
271+
{
272+
"streams": [
273+
"Microsoft-SecurityEvent"
274+
],
275+
"destinations": [
276+
"centralWorkspace"
277+
]
278+
}
279+
]
280+
}
281+
}
282+
```
233283

234284
---
235285

articles/sentinel/data-connectors-reference.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1322,13 +1322,15 @@ If a longer timeout duration is required, consider upgrading to an [App Service
13221322
13231323
| Connector attribute | Description |
13241324
| --- | --- |
1325-
| **Data ingestion method** | **Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md)** (Top connector article) |
1325+
| **Data ingestion method** | **Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md)** (Top connector article);<br>**[Log Analytics agent-based connections](connect-azure-windows-microsoft-services.md?tabs=LAA#windows-agent-based-connections)** |
13261326
| **Log Analytics table(s)** | SecurityEvents |
13271327
| **Supported by** | Microsoft |
13281328
| | |
13291329
13301330
For more information, see [Insecure protocols workbook setup](./get-visibility.md#use-built-in-workbooks).
13311331
1332+
See also: [**Windows Security Events**](#windows-security-events-preview).
1333+
13321334
## SentinelOne (Preview)
13331335
13341336
| Connector attribute | Description |
@@ -1560,7 +1562,7 @@ Follow the instructions to obtain the credentials.
15601562
15611563
| Connector attribute | Description |
15621564
| --- | --- |
1563-
| **Data ingestion method** | **Azure service-to-service integration: <br>[Azure Monitor agent-based connections](connect-azure-windows-microsoft-services.md?tabs=LAA#windows-agent-based-connections)** |
1565+
| **Data ingestion method** | **Azure service-to-service integration: <br>[Azure Monitor agent-based connections](connect-azure-windows-microsoft-services.md?tabs=AMA#windows-agent-based-connections)** |
15641566
| **Log Analytics table(s)** | SecurityEvents |
15651567
| **Supported by** | Microsoft |
15661568
| | |
@@ -1578,7 +1580,7 @@ Follow the instructions to obtain the credentials.
15781580
15791581
| Connector attribute | Description |
15801582
| --- | --- |
1581-
| **Data ingestion method** | **Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md)** (Top connector article) |
1583+
| **Data ingestion method** | **Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md)** (Top connector article);<br>**[Azure Monitor agent-based connections](connect-azure-windows-microsoft-services.md?tabs=AMA#windows-agent-based-connections)** |
15821584
| **Log Analytics table(s)** | SecurityEvents |
15831585
| **Supported by** | Microsoft |
15841586
| | |

0 commit comments

Comments
 (0)