You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#Customer intent: As a security operator, set up data connectors in one place so I can monitor and protect my environment.
10
10
---
11
11
12
12
# Quickstart: Onboard Microsoft Sentinel
13
13
14
-
In this quickstart, you enable Microsoft Sentinel, and then set up data connectors to monitor and protect your environment. After you connect your data sources using data connectors, you choose from a gallery of expertly created workbooks that surface insights based on your data. These workbooks can be easily customized to your needs.
14
+
In this quickstart, you'll enable Microsoft Sentinel and install a solution from the content hub. Then, you'll set up a data connector to start ingesting data into Microsoft Sentinel.
15
15
16
-
Microsoft Sentinel comes with many connectors for Microsoft products, for example, the Microsoft 365 Defender service-to-service connector. You can also enable built-in connectors for non-Microsoft products, for example, Syslog or Common Event Format (CEF). [Learn more about data connectors](connect-data-sources.md).
16
+
Microsoft Sentinel comes with many data connectors for Microsoft products such as the Microsoft 365 Defender service-to-service connector. You can also enable built-in connectors for non-Microsoft products such as Syslog or Common Event Format (CEF). For this quickstart, you'll use the Azure Activity data connector that's available in the Azure Activity solution for Microsoft Sentinel.
17
17
18
-
>[!IMPORTANT]
19
-
> Review the [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel/) and [Microsoft Sentinel costs and billing](billing.md) information.
20
-
21
-
## Global prerequisites
18
+
## Prerequisites
22
19
23
20
-**Active Azure Subscription**. If you don't have one, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
24
21
@@ -28,68 +25,121 @@ Microsoft Sentinel comes with many connectors for Microsoft products, for exampl
28
25
29
26
-**Permissions**:
30
27
31
-
- To enable Microsoft Sentinel, you need **contributor** permissions to the subscription in which the Microsoft Sentinel workspace resides.
28
+
- To enable Microsoft Sentinel, you need **contributor** permissions to the subscription in which the Microsoft Sentinel workspace resides.
32
29
33
30
- To use Microsoft Sentinel, you need either **contributor** or **reader** permissions on the resource group that the workspace belongs to.
34
-
35
-
- You might need other permissions to connect specific data sources.
31
+
- To install or manage solutions in the content hub, you need the **Template Spec Contributor** role on the resource group that the workspace belongs to.
36
32
37
33
-**Microsoft Sentinel is a paid service**. Review the [pricing options](https://go.microsoft.com/fwlink/?linkid=2104058) and the [Microsoft Sentinel pricing page](https://azure.microsoft.com/pricing/details/azure-sentinel/).
38
34
39
-
-Review the full [pre-deployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md).
35
+
-Before deploying Microsoft Sentinel to a production environment, review the [predeployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md).
40
36
41
37
## Enable Microsoft Sentinel <aname="enable"></a>
42
38
43
-
1. Sign in to the Azure portal. Make sure that the subscription in which Microsoft Sentinel is created is selected.
39
+
To get started, add Microsoft Sentinel to an existing workspace or create a new one.
40
+
41
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
44
42
45
43
1. Search for and select **Microsoft Sentinel**.
46
44
47
45
:::image type="content" source="media/quickstart-onboard/search-product.png" alt-text="Screenshot of searching for a service while enabling Microsoft Sentinel.":::
48
46
49
47
1. Select **Add**.
50
48
51
-
1. Select the workspace you want to use or create a new one. You can run Microsoft Sentinel on more than one workspace, but the data is isolated to a single workspace. Note that default workspaces created by Microsoft Defender for Cloud are not shown in the list. You can't install Microsoft Sentinel on these workspaces.
49
+
1. Select the workspace you want to use or create a new one. You can run Microsoft Sentinel on more than one workspace, but the data is isolated to a single workspace.
52
50
53
51
:::image type="content" source="media/quickstart-onboard/choose-workspace.png" alt-text="Screenshot of choosing a workspace while enabling Microsoft Sentinel.":::
54
-
55
-
>[!IMPORTANT]
56
-
>
57
-
> - Once deployed on a workspace, Microsoft Sentinel **does not currently support** the moving of that workspace to other resource groups or subscriptions.
58
-
>
59
-
> If you have already moved the workspace, disable all active rules under **Analytics** and re-enable them after five minutes. This should be effective in most cases, though, to reiterate, it is unsupported and undertaken at your own risk.
52
+
53
+
- The default workspaces created by Microsoft Defender for Cloud aren't shown in the list. You can't install Microsoft Sentinel on these workspaces.
54
+
- Once deployed on a workspace, Microsoft Sentinel **doesn't currently support** moving that workspace to another resource group or subscription.
60
55
61
56
1. Select **Add Microsoft Sentinel**.
62
57
63
-
## Set up data connectors
58
+
## Install a solution from the content hub
59
+
60
+
The content hub in Microsoft Sentinel is the centralized location to discover and manage out-of-the-box content including data connectors. For this quickstart, install the solution for Azure Activity.
61
+
62
+
1. In Microsoft Sentinel, select **Content hub**.
63
+
64
+
1. Find and select the **Azure Activity** solution.
65
+
66
+
:::image type="content" source="media/quickstart-onboard/content-hub-azure-activity.png" alt-text="Screenshot of the content hub with the solution for Azure Activity selected.":::
67
+
68
+
1. On the toolbar at the top of the page, select :::image type="icon" source="media/quickstart-onboard/install-update-button.png"::: **Install/Update**.
64
69
65
-
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel.
70
+
## Set up the data connector
66
71
67
-
- For physical and virtual machines, you can install the Log Analytics agent that collects the logs and forwards them to Microsoft Sentinel.
68
-
- For firewalls and proxies, Microsoft Sentinel installs the Log Analytics agent on a Linux Syslog server, from which the agent collects the log files and forwards them to Microsoft Sentinel.
72
+
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For this quickstart, install the data connector to forward data for Azure Activity to Microsoft Sentinel.
69
73
70
-
1. From the main menu, select **Data connectors**. This opens the data connectors gallery.
71
-
1. Select a data connector, and then select the **Open connector page** button.
72
-
1. The connector page shows instructions for configuring the connector, and any other instructions that may be necessary.
74
+
1. In Microsoft Sentinel, select **Data connectors**.
73
75
74
-
For example, if you select the **Azure Active Directory** data connector, which lets you stream logs from Azure AD into Microsoft Sentinel, you can select what type of logs you want to get - sign-in logs and/or audit logs. <br>Follow the installation instructions. To learn more, [read the relevant connection guide](data-connectors-reference.md) or learn about [Microsoft Sentinel data connectors](connect-data-sources.md).
76
+
1. Search for and select the **Azure Activity** data connector.
75
77
76
-
1.The **Next steps** tab on the connector page shows relevant built-in workbooks, sample queries, and analytics rule templates that accompany the data connector. You can use these as-is or modify them - either way you can immediately get interesting insights across your data.
78
+
1.In the details pane for the connector, select **Open connector page**.
77
79
78
-
After you set up your data connectors, your data starts streaming into Microsoft Sentinel and is ready for you to start working with. You can view the logs in the [built-in workbooks](get-visibility.md) and start building queries in Log Analytics to [investigate the data](investigate-cases.md).
80
+
1. Review the instructions to configure the connector.
79
81
80
-
Review the [data collection best practices](best-practices-data.md).
1. On the **Basics** tab, set the **Scope** to the subscription and resource group that has activity to send to Microsoft Sentinel. For example, select the subscription that contains your Microsoft Sentinel instance.
85
+
86
+
1. Select the **Parameters** tab.
87
+
88
+
1. Set the **Primary Log Analytics workspace**. This should be the workspace where Microsoft Sentinel is installed.
89
+
90
+
1. Select **Review + create** and **Create**.
91
+
92
+
## Generate activity data
93
+
94
+
Let's generate some activity data by enabling a rule that was included in the Azure Activity solution for Microsoft Sentinel. This step also shows you how to manage content in the content hub.
95
+
96
+
1. In Microsoft Sentinel, select **Content hub**.
97
+
98
+
1. Find and select the **Azure Activity** solution.
99
+
100
+
1. From the right-hand side pane, select **Manage**.
83
101
84
-
For more information, see:
102
+
1. Find and select the rule template **Suspicious Resource deployment**.
85
103
86
-
-**Alternate deployment / management options**:
104
+
1. Select **Configuration**.
105
+
106
+
1. Select the rule and **Create rule**.
107
+
108
+
1. On the **General** tab, change the **Status** to enabled. Leave the rest of the default values.
109
+
110
+
1. Accept the defaults on the other tabs.
111
+
112
+
1. On the **Review and create** tab, select **Create**.
113
+
114
+
## View data ingested into Microsoft Sentinel
115
+
116
+
Now that you've enabled the Azure Activity data connector and generated some activity data let's view the activity data added to the workspace.
117
+
118
+
1. In Microsoft Sentinel, select **Data connectors**.
119
+
120
+
1. Search for and select the **Azure Activity** data connector.
121
+
122
+
1. In the details pane for the connector, select **Open connector page**.
123
+
124
+
1. Review the **Status** of the data connector. It should be **Connected**.
125
+
126
+
:::image type="content" source="media/quickstart-onboard/azure-activity-connected-status.png" alt-text="Screenshot of data connector for Azure Activity with the status showing as connected.":::
127
+
128
+
1. In the left-hand side pane above the chart, select **Go to log analytics**.
129
+
130
+
1. On the top of the pane, next to the **New query 1** tab, select the **+** to add a new query tab.
131
+
132
+
1. In the query pane, run the following query to view the activity date ingested into the workspace.
133
+
134
+
```kusto
135
+
AzureActivity
136
+
```
137
+
138
+
:::image type="content" source="media/quickstart-onboard/azure-activity-logs-query.png" alt-text="Screenshot of the log query window with results returned for the Azure Activity query.":::
139
+
140
+
## Next steps
87
141
88
-
-[Deploy Microsoft Sentinel via ARM template](https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Sentinel-All-In-One)
89
-
-[Manage Microsoft Sentinel via API](/rest/api/securityinsights/)
90
-
-[Manage Microsoft Sentinel via PowerShell](https://www.powershellgallery.com/packages/Az.SecurityInsights/0.1.0)
142
+
In this quickstart, you enabled Microsoft Sentinel and installed a solution from the content hub. Then, you set up a data connector to start ingesting data into Microsoft Sentinel. You also verified that data is being ingested by viewing the data in the workspace.
91
143
92
-
-**Get started**:
93
-
-[Get started with Microsoft Sentinel](get-visibility.md)
94
-
-[Create custom analytics rules to detect threats](detect-threats-custom.md)
95
-
-[Connect your external solution using Common Event Format](connect-common-event-format.md)
144
+
- To visualize the data you've collected by using the dashboards and workbooks, see [Visualize collected data](get-visibility.md).
145
+
- To detect threats by using analytics rules, see [Tutorial: Detect threats by using analytics rules in Microsoft Sentinel](tutorial-log4j-detection.md).
0 commit comments