|
1 | 1 | ---
|
2 | 2 | title: 'Quickstart: Onboard to Microsoft Sentinel'
|
3 | 3 | description: In this quickstart, you enable Microsoft Sentinel, and set up data connectors to monitor and protect your environment.
|
4 |
| -author: yelevin |
5 |
| -ms.author: yelevin |
| 4 | +author: batamig |
| 5 | +ms.author: bagol |
6 | 6 | ms.topic: quickstart
|
7 |
| -ms.date: 06/18/2024 |
| 7 | +ms.date: 04/03/2025 |
8 | 8 | ms.custom: references_regions, mode-other
|
9 | 9 | #Customer intent: As a security operator, set up data connectors in one place so I can monitor and protect my environment.
|
10 | 10 |
|
@@ -76,79 +76,95 @@ The content hub in Microsoft Sentinel is the centralized location to discover an
|
76 | 76 |
|
77 | 77 | 1. Find and select the **Azure Activity** solution.
|
78 | 78 |
|
79 |
| - :::image type="content" source="media/quickstart-onboard/content-hub-azure-activity.png" alt-text="Screenshot of the content hub with the solution for Azure Activity selected."::: |
| 79 | + #### [Azure portal](#tab/azure-portal) |
80 | 80 |
|
81 |
| -1. On the toolbar at the top of the page, select :::image type="icon" source="media/quickstart-onboard/install-update-button.png"::: **Install/Update**. |
| 81 | + :::image type="content" source="media/quickstart-onboard/content-hub-azure-activity.png" alt-text="Screenshot of the content hub in the Azure portal with the solution for Azure Activity selected."::: |
82 | 82 |
|
83 |
| -## Set up the data connector |
| 83 | + #### [Defender portal](#tab/defender-portal) |
84 | 84 |
|
85 |
| -Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For this quickstart, install the data connector to forward data for Azure Activity to Microsoft Sentinel. |
86 |
| - |
87 |
| -1. In Microsoft Sentinel, select **Data connectors**. |
| 85 | + :::image type="content" source="media/quickstart-onboar/content-hub-azure-activity-defender.png" alt-text="Screenshot of the content hub in the Defender portal with the solution for Azure Activity selected."::: |
88 | 86 |
|
89 |
| -1. Search for and select the **Azure Activity** data connector. |
| 87 | + --- |
90 | 88 |
|
91 |
| -1. In the details pane for the connector, select **Open connector page**. |
| 89 | +1. On the solution details pane on the side, select **Install**. |
92 | 90 |
|
93 |
| -1. Review the instructions to configure the connector. |
| 91 | +## Set up the data connector |
94 | 92 |
|
95 |
| -1. Select **Launch Azure Policy Assignment Wizard**. |
| 93 | +Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For this quickstart, install the data connector to forward data for Azure Activity to Microsoft Sentinel. |
96 | 94 |
|
97 |
| -1. On the **Basics** tab, set the **Scope** to the subscription and resource group that has activity to send to Microsoft Sentinel. For example, select the subscription that contains your Microsoft Sentinel instance. |
| 95 | +1. In Microsoft Sentinel, select **Configuration** > **Data connectors** and search for and select the **Azure Activity** data connector. |
98 | 96 |
|
99 |
| -1. Select the **Parameters** tab. |
| 97 | +1. In the connector details pane, select **Open connector page**. Use the instructions on the **Azure Activity** connector page to set up the data connector. |
100 | 98 |
|
101 |
| -1. Set the **Primary Log Analytics workspace**. This should be the workspace where Microsoft Sentinel is installed. |
| 99 | + 1. Select **Launch Azure Policy Assignment Wizard**. |
102 | 100 |
|
103 |
| -1. Select **Review + create** and **Create**. |
| 101 | + 1. On the **Basics** tab, set the **Scope** to the subscription and resource group that has activity to send to Microsoft Sentinel. For example, select the subscription that contains your Microsoft Sentinel instance. |
104 | 102 |
|
105 |
| -## Generate activity data |
| 103 | + 1. Select the **Parameters** tab, and set the **Primary Log Analytics workspace**. This should be the workspace where Microsoft Sentinel is installed. |
106 | 104 |
|
107 |
| -Let's generate some activity data by enabling a rule that was included in the Azure Activity solution for Microsoft Sentinel. This step also shows you how to manage content in the content hub. |
| 105 | + 1. Select **Review + create** and **Create**. |
108 | 106 |
|
109 |
| -1. In Microsoft Sentinel, select **Content hub**. |
110 |
| - |
111 |
| -1. Find and select the **Azure Activity** solution. |
112 |
| - |
113 |
| -1. From the right-hand side pane, select **Manage**. |
| 107 | +## Generate activity data |
114 | 108 |
|
115 |
| -1. Find and select the rule template **Suspicious Resource deployment**. |
| 109 | +Let's generate some activity data by enabling a rule that was included in the Azure Activity solution for Microsoft Sentinel. This step also shows you how to manage content in the content hub. |
116 | 110 |
|
117 |
| -1. Select **Configuration**. |
| 111 | +1. In Microsoft Sentinel, select **Content hub** and search for and select **Suspicious Resource deployment** rule template in the **Azure Activity** solution. |
118 | 112 |
|
119 |
| -1. Select the rule and **Create rule**. |
| 113 | +1. In the details pane, select **Create rule** to create a new rule using the **Analytics rule wizard**. |
120 | 114 |
|
121 |
| -1. On the **General** tab, change the **Status** to enabled. Leave the rest of the default values. |
| 115 | +1. In the **Analytics rule wizard - Create a new Scheduled rule** page, change the **Status** to **Enabled**. |
122 | 116 |
|
123 |
| -1. Accept the defaults on the other tabs. |
| 117 | + On this tab and all other tabs in the wizard, leave the default values as they are. |
124 | 118 |
|
125 | 119 | 1. On the **Review and create** tab, select **Create**.
|
126 | 120 |
|
127 | 121 | ## View data ingested into Microsoft Sentinel
|
128 | 122 |
|
129 | 123 | Now that you've enabled the Azure Activity data connector and generated some activity data let's view the activity data added to the workspace.
|
130 | 124 |
|
131 |
| -1. In Microsoft Sentinel, select **Data connectors**. |
| 125 | +1. In Microsoft Sentinel, select **Configuration** > **Data connectors** and search for and select the **Azure Activity** data connector. |
132 | 126 |
|
133 |
| -1. Search for and select the **Azure Activity** data connector. |
134 |
| - |
135 |
| -1. In the details pane for the connector, select **Open connector page**. |
| 127 | +1. In the connector details pane, select **Open connector page**. |
136 | 128 |
|
137 | 129 | 1. Review the **Status** of the data connector. It should be **Connected**.
|
138 | 130 |
|
139 | 131 | :::image type="content" source="media/quickstart-onboard/azure-activity-connected-status.png" alt-text="Screenshot of data connector for Azure Activity with the status showing as connected.":::
|
140 | 132 |
|
141 |
| -1. In the left-hand side pane above the chart, select **Go to log analytics**. |
| 133 | +1. Select a tab to continue, depending on which portal you're using: |
| 134 | + |
| 135 | + #### [Azure portal](#tab/azure-portal) |
| 136 | + |
| 137 | + 1. Select **Go to query** to open the **Logs** page in the Azure portal. |
| 138 | + |
| 139 | + 1. On the top of the pane, next to the **New query 1** tab, select the **+** to add a new query tab. |
| 140 | + |
| 141 | + 1. On the side, switch from **Simple mode** to **KQL mode**, and run the following query to view the activity date ingested into the workspace: |
| 142 | + |
| 143 | + ```kusto |
| 144 | + AzureActivity |
| 145 | + ``` |
| 146 | +
|
| 147 | + For example: |
| 148 | +
|
| 149 | + :::image type="content" source="media/quickstart-onboard/azure-activity-logs-query.png" alt-text="Screenshot of the AzureActivity query in the Logs page of the Azure portal."::: |
| 150 | +
|
| 151 | + #### [Defender portal](#tab/defender-portal) |
| 152 | +
|
| 153 | + 1. Select **Go to log analytics** to open the **Advanced hunting** page. |
| 154 | +
|
| 155 | + 1. On the top of the pane, next to the **New query** tab, select the **+** to add a new query tab. |
| 156 | +
|
| 157 | + 1. Run the following query to view the activity date ingested into the workspace: |
142 | 158 |
|
143 |
| -1. On the top of the pane, next to the **New query 1** tab, select the **+** to add a new query tab. |
| 159 | + ```kusto |
| 160 | + AzureActivity |
| 161 | + ``` |
144 | 162 |
|
145 |
| -1. In the query pane, run the following query to view the activity date ingested into the workspace. |
| 163 | + For example: |
146 | 164 |
|
147 |
| - ```kusto |
148 |
| - AzureActivity |
149 |
| - ``` |
| 165 | + :::image type="content" source="media/quickstart-onboard/content-hub-azure-activity-defender.png" alt-text="Screenshot of the content hub in the Defender portal with the solution for Azure Activity selected."::: |
150 | 166 |
|
151 |
| - :::image type="content" source="media/quickstart-onboard/azure-activity-logs-query.png" alt-text="Screenshot of the log query window with results returned for the Azure Activity query."::: |
| 167 | + --- |
152 | 168 |
|
153 | 169 | ## Next steps
|
154 | 170 |
|
|
0 commit comments