Skip to content

Commit 29693f2

Browse files
committed
adding defender tabs and screenshots
1 parent e1ceff6 commit 29693f2

File tree

5 files changed

+56
-40
lines changed

5 files changed

+56
-40
lines changed
169 KB
Loading
35.6 KB
Loading
173 KB
Loading
33.8 KB
Loading

articles/sentinel/quickstart-onboard.md

Lines changed: 56 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: 'Quickstart: Onboard to Microsoft Sentinel'
33
description: In this quickstart, you enable Microsoft Sentinel, and set up data connectors to monitor and protect your environment.
4-
author: yelevin
5-
ms.author: yelevin
4+
author: batamig
5+
ms.author: bagol
66
ms.topic: quickstart
7-
ms.date: 06/18/2024
7+
ms.date: 04/03/2025
88
ms.custom: references_regions, mode-other
99
#Customer intent: As a security operator, set up data connectors in one place so I can monitor and protect my environment.
1010

@@ -76,79 +76,95 @@ The content hub in Microsoft Sentinel is the centralized location to discover an
7676

7777
1. Find and select the **Azure Activity** solution.
7878

79-
:::image type="content" source="media/quickstart-onboard/content-hub-azure-activity.png" alt-text="Screenshot of the content hub with the solution for Azure Activity selected.":::
79+
#### [Azure portal](#tab/azure-portal)
8080

81-
1. On the toolbar at the top of the page, select :::image type="icon" source="media/quickstart-onboard/install-update-button.png"::: **Install/Update**.
81+
:::image type="content" source="media/quickstart-onboard/content-hub-azure-activity.png" alt-text="Screenshot of the content hub in the Azure portal with the solution for Azure Activity selected.":::
8282

83-
## Set up the data connector
83+
#### [Defender portal](#tab/defender-portal)
8484

85-
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For this quickstart, install the data connector to forward data for Azure Activity to Microsoft Sentinel.
86-
87-
1. In Microsoft Sentinel, select **Data connectors**.
85+
:::image type="content" source="media/quickstart-onboar/content-hub-azure-activity-defender.png" alt-text="Screenshot of the content hub in the Defender portal with the solution for Azure Activity selected.":::
8886

89-
1. Search for and select the **Azure Activity** data connector.
87+
---
9088

91-
1. In the details pane for the connector, select **Open connector page**.
89+
1. On the solution details pane on the side, select **Install**.
9290

93-
1. Review the instructions to configure the connector.
91+
## Set up the data connector
9492

95-
1. Select **Launch Azure Policy Assignment Wizard**.
93+
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For this quickstart, install the data connector to forward data for Azure Activity to Microsoft Sentinel.
9694

97-
1. On the **Basics** tab, set the **Scope** to the subscription and resource group that has activity to send to Microsoft Sentinel. For example, select the subscription that contains your Microsoft Sentinel instance.
95+
1. In Microsoft Sentinel, select **Configuration** > **Data connectors** and search for and select the **Azure Activity** data connector.
9896

99-
1. Select the **Parameters** tab.
97+
1. In the connector details pane, select **Open connector page**. Use the instructions on the **Azure Activity** connector page to set up the data connector.
10098

101-
1. Set the **Primary Log Analytics workspace**. This should be the workspace where Microsoft Sentinel is installed.
99+
1. Select **Launch Azure Policy Assignment Wizard**.
102100

103-
1. Select **Review + create** and **Create**.
101+
1. On the **Basics** tab, set the **Scope** to the subscription and resource group that has activity to send to Microsoft Sentinel. For example, select the subscription that contains your Microsoft Sentinel instance.
104102

105-
## Generate activity data
103+
1. Select the **Parameters** tab, and set the **Primary Log Analytics workspace**. This should be the workspace where Microsoft Sentinel is installed.
106104

107-
Let's generate some activity data by enabling a rule that was included in the Azure Activity solution for Microsoft Sentinel. This step also shows you how to manage content in the content hub.
105+
1. Select **Review + create** and **Create**.
108106

109-
1. In Microsoft Sentinel, select **Content hub**.
110-
111-
1. Find and select the **Azure Activity** solution.
112-
113-
1. From the right-hand side pane, select **Manage**.
107+
## Generate activity data
114108

115-
1. Find and select the rule template **Suspicious Resource deployment**.
109+
Let's generate some activity data by enabling a rule that was included in the Azure Activity solution for Microsoft Sentinel. This step also shows you how to manage content in the content hub.
116110

117-
1. Select **Configuration**.
111+
1. In Microsoft Sentinel, select **Content hub** and search for and select **Suspicious Resource deployment** rule template in the **Azure Activity** solution.
118112

119-
1. Select the rule and **Create rule**.
113+
1. In the details pane, select **Create rule** to create a new rule using the **Analytics rule wizard**.
120114

121-
1. On the **General** tab, change the **Status** to enabled. Leave the rest of the default values.
115+
1. In the **Analytics rule wizard - Create a new Scheduled rule** page, change the **Status** to **Enabled**.
122116

123-
1. Accept the defaults on the other tabs.
117+
On this tab and all other tabs in the wizard, leave the default values as they are.
124118

125119
1. On the **Review and create** tab, select **Create**.
126120

127121
## View data ingested into Microsoft Sentinel
128122

129123
Now that you've enabled the Azure Activity data connector and generated some activity data let's view the activity data added to the workspace.
130124

131-
1. In Microsoft Sentinel, select **Data connectors**.
125+
1. In Microsoft Sentinel, select **Configuration** > **Data connectors** and search for and select the **Azure Activity** data connector.
132126

133-
1. Search for and select the **Azure Activity** data connector.
134-
135-
1. In the details pane for the connector, select **Open connector page**.
127+
1. In the connector details pane, select **Open connector page**.
136128

137129
1. Review the **Status** of the data connector. It should be **Connected**.
138130

139131
:::image type="content" source="media/quickstart-onboard/azure-activity-connected-status.png" alt-text="Screenshot of data connector for Azure Activity with the status showing as connected.":::
140132

141-
1. In the left-hand side pane above the chart, select **Go to log analytics**.
133+
1. Select a tab to continue, depending on which portal you're using:
134+
135+
#### [Azure portal](#tab/azure-portal)
136+
137+
1. Select **Go to query** to open the **Logs** page in the Azure portal.
138+
139+
1. On the top of the pane, next to the **New query 1** tab, select the **+** to add a new query tab.
140+
141+
1. On the side, switch from **Simple mode** to **KQL mode**, and run the following query to view the activity date ingested into the workspace:
142+
143+
```kusto
144+
AzureActivity
145+
```
146+
147+
For example:
148+
149+
:::image type="content" source="media/quickstart-onboard/azure-activity-logs-query.png" alt-text="Screenshot of the AzureActivity query in the Logs page of the Azure portal.":::
150+
151+
#### [Defender portal](#tab/defender-portal)
152+
153+
1. Select **Go to log analytics** to open the **Advanced hunting** page.
154+
155+
1. On the top of the pane, next to the **New query** tab, select the **+** to add a new query tab.
156+
157+
1. Run the following query to view the activity date ingested into the workspace:
142158
143-
1. On the top of the pane, next to the **New query 1** tab, select the **+** to add a new query tab.
159+
```kusto
160+
AzureActivity
161+
```
144162
145-
1. In the query pane, run the following query to view the activity date ingested into the workspace.
163+
For example:
146164
147-
```kusto
148-
AzureActivity
149-
```
165+
:::image type="content" source="media/quickstart-onboard/content-hub-azure-activity-defender.png" alt-text="Screenshot of the content hub in the Defender portal with the solution for Azure Activity selected.":::
150166
151-
:::image type="content" source="media/quickstart-onboard/azure-activity-logs-query.png" alt-text="Screenshot of the log query window with results returned for the Azure Activity query.":::
167+
---
152168
153169
## Next steps
154170

0 commit comments

Comments
 (0)