Skip to content

Commit 313fe30

Browse files
authored
Merge pull request #302361 from MicrosoftDocs/release-preview-sentinel-lake
Release preview sentinel lake
2 parents df64ba7 + 6c3ca8f commit 313fe30

File tree

108 files changed

+2880
-244
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+2880
-244
lines changed

articles/sentinel/TOC.yml

Lines changed: 64 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,58 @@
55
items:
66
- name: What is Microsoft Sentinel?
77
href: overview.md
8+
- name: Microsoft Sentinel data lake overview
9+
href: datalake/sentinel-lake-overview.md
10+
displayName: data lake
811
- name: What's new
912
href: whats-new.md
1013
- name: Best practices
1114
href: best-practices.md
1215
- name: Experience in Defender portal
1316
href: microsoft-sentinel-defender-portal.md
17+
- name: Data lake exploration
18+
items:
19+
- name: KQL for data lake exploration
20+
items:
21+
- name: Overview
22+
href: datalake/kql-overview.md
23+
displayName: data lake
24+
- name: Run KQL queries
25+
href: datalake/kql-queries.md
26+
displayName: data lake
27+
- name: Create KQL jobs
28+
href: datalake/kql-jobs.md
29+
displayName: data lake
30+
- name: Manage KQL jobs
31+
href: datalake/kql-manage-jobs.md
32+
displayName: data lake
33+
- name: Troubleshoot KQL for the lake
34+
href: datalake/kql-troubleshoot.md
35+
displayName: data lake
36+
- name: Notebooks for data lake exploration
37+
items:
38+
- name: Overview
39+
href: datalake/notebooks-overview.md
40+
displayName: data lake
41+
- name: Run notebooks
42+
href: datalake/notebooks.md
43+
displayName: data lake
44+
- name: Microsoft Sentinel provider class reference
45+
href: datalake/sentinel-provider-class-reference.md
46+
displayName: data lake
47+
- name: Create and manage notebook jobs
48+
href: datalake/notebook-jobs.md
49+
displayName: data lake
50+
- name: Notebook examples for data lake exploration
51+
href: datalake/notebook-examples.md
1452
- name: Plan
1553
items:
1654
- name: Deployment planning guide
1755
href: deploy-overview.md
1856
- name: Prerequisites
1957
href: prerequisites.md
2058
- name: Workspace architecture
21-
items:
22-
- name: Design workspace architecture
23-
href: /azure/azure-monitor/logs/workspace-design?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
59+
items:
2460
- name: Review sample workspace designs
2561
href: sample-workspace-designs.md
2662
- name: Prepare for multiple workspaces
@@ -29,6 +65,7 @@
2965
href: prioritize-data-connectors.md
3066
- name: Plan roles and permissions
3167
href: roles.md
68+
displayName: data lake
3269
- name: Plan interactive and long-term data retention
3370
href: log-plans.md
3471
- name: Plan costs
@@ -55,6 +92,12 @@
5592
href: quickstart-onboard.md
5693
- name: Connect Microsoft Sentinel to the Defender portal
5794
href: /unified-secops-platform/microsoft-sentinel-onboard?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
95+
- name: Onboard to Microsoft Sentinel data lake
96+
href: datalake/sentinel-lake-onboarding.md
97+
displayName: data lake
98+
- name: Set up connectors for the Microsoft Sentinel data lake
99+
href: datalake/sentinel-lake-connectors.md
100+
displayName: data lake
58101
- name: Configure content
59102
href: configure-content.md
60103
- name: Set up multiple workspaces
@@ -356,6 +399,14 @@
356399
href: summary-rules.md
357400
- name: Aggregate insights from raw data into an Auxiliary table
358401
href: summary-rules-tutorial.md
402+
- name: Manage data
403+
items:
404+
- name: Data management overview
405+
href: manage-data-overview.md
406+
displayName: table management, tiers, retention, manage data, tables
407+
- name: Manage tables, tiers, and retention
408+
href: manage-table-tiers-retention.md
409+
displayName: table management, tiers, retention, tables
359410
- name: Integrate threat intelligence
360411
items:
361412
- name: Overview
@@ -665,6 +716,7 @@
665716
href: soc-optimization/soc-optimization-reference.md
666717
- name: Manage Microsoft Sentinel
667718
items:
719+
668720
- name: Manage costs and billing
669721
items:
670722
- name: Monitor costs
@@ -675,9 +727,7 @@
675727
href: enroll-simplified-pricing-tier.md
676728
- name: Optimize costs with pre-purchase plan
677729
href: billing-pre-purchase-plan.md
678-
- name: Manage data retention
679-
href: /azure/azure-monitor/logs/data-retention-configure?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
680-
- name: Auxiliary logs use cases
730+
- name: Data lake use cases
681731
href: basic-logs-use-cases.md
682732
- name: Manage multiple workspaces
683733
items:
@@ -695,7 +745,7 @@
695745
href: multiple-workspace-view.md
696746
- name: Manage your intellectual property in Microsoft Sentinel
697747
href: mssp-protect-intellectual-property.md
698-
- name: Manage workspace access
748+
- name: Manage workspace access with resource-context RBAC
699749
href: resource-context-rbac.md
700750
- name: Set up customer-managed keys
701751
href: customer-managed-keys.md
@@ -717,6 +767,9 @@
717767
href: monitor-analytics-rule-integrity.md
718768
- name: Auditing Microsoft Sentinel with Azure Activity Logs
719769
href: audit-sentinel-data.md
770+
- name: Audit log for Microsoft Sentinel data lake
771+
href: datalake/auditing-lake-activities.md
772+
displayName: data lake
720773
- name: Remove Microsoft Sentinel from your workspaces
721774
href: offboard.md
722775
- name: Build and publish Microsoft Sentinel solutions
@@ -757,8 +810,11 @@
757810
href: aws-s3-troubleshoot.md
758811
- name: Reference
759812
items:
760-
- name: Service limits
813+
- name: Microsoft Sentinel service limits
761814
href: sentinel-service-limits.md
815+
- name: Microsoft Sentinel data lake service limits
816+
href: datalake/sentinel-lake-service-limits.md
817+
displayName: data lake
762818
- name: Microsoft Sentinel REST-API
763819
href: /rest/api/securityinsights/
764820
- name: OOTB content centralization changes

articles/sentinel/basic-logs-use-cases.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: When to use Auxiliary Logs in Microsoft Sentinel
3-
description: Learn what log sources might be appropriate for Auxiliary Log or Basic Log ingestion and what are the attributes to look for to decide about other sources.
4-
author: cwatson-cat
5-
ms.author: cwatson
2+
title: When to use the Microsoft Sentinel data lake
3+
description: Learn what log sources might be appropriate for the Microsoft Sentinel data lake and what attributes to look for, to decide about other sources.
4+
author: EdB-MSFT
5+
ms.author: edbaynash
66
ms.topic: conceptual
7-
ms.date: 03/31/2025
7+
ms.date: 07/15/2025
88
appliesto:
99
- Microsoft Sentinel in the Microsoft Defender portal
1010
- Microsoft Sentinel in the Azure portal
@@ -14,12 +14,14 @@ ms.collection: usx-security
1414
#Customer intent: As a security analyst, I want to ingest high-volume, verbose logs into a cost-effective storage solution so that I can enhance my threat hunting and incident investigation capabilities.
1515

1616
---
17-
# Log sources to use for Auxiliary Logs ingestion
17+
# Log sources to use for the Microsoft Sentinel data lake
1818

19-
This article highlights log sources to consider configuring as Auxiliary Logs (or Basic Logs) when they're stored in Log Analytics tables. Before choosing a log type for which to configure a given table, do the research to see which is most appropriate. For more information about data categories and log data plans, see [Log retention plans in Microsoft Sentinel](log-plans.md).
19+
This article highlights log sources to consider configuring as data lake tier only when enabling a connector. Before choosing a tier for which to configure a given table, check which tier is most appropriate for your use case. For more information about data categories and data tiers, see [Log retention plans in Microsoft Sentinel](log-plans.md).
2020

2121
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2222

23+
[!INCLUDE [sentinel-lake-preview](includes/sentinel-lake-preview.md)]
24+
2325
## Storage access logs for cloud providers
2426

2527
Storage access logs can provide a secondary source of information for investigations that involve exposure of sensitive data to unauthorized parties. These logs can help you identify issues with system or user permissions granted to the data.
@@ -64,7 +66,8 @@ A new and growing source of log data is Internet of Things (IoT)-connected devic
6466

6567
## Next steps
6668

67-
- [Select a table plan based on data usage in a Log Analytics workspace](/azure/azure-monitor/logs/logs-table-plans)
68-
- [Set up a table with the Auxiliary plan in your Log Analytics workspace](/azure/azure-monitor/logs/create-custom-table-auxiliary)
69-
- [Manage data retention in a Log Analytics workspace](/azure/azure-monitor/logs/data-retention-configure)
70-
- [Start an investigation by searching for events in large datasets (preview)](investigate-large-datasets.md)
69+
- [What is the Microsoft Sentinel data lake? (preview)](datalake/sentinel-lake-overview.md)
70+
- [Manage data tiers and retention in Microsoft Defender Portal (preview)](manage-data-overview.md)
71+
- [KQL and the Microsoft Sentinel data lake (preview)](datalake/kql-overview.md)
72+
- [Jupyter notebooks in the Microsoft Sentinel data lake (preview)](datalake/notebooks-overview.md)
73+

articles/sentinel/best-practices.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Best practices for Microsoft Sentinel
33
description: Learn about best practices to employ when managing your Log Analytics workspace for Microsoft Sentinel.
4-
author: cwatson-cat
5-
ms.author: cwatson
4+
author: EdB-MSFT
5+
ms.author: edbaynash
66
ms.topic: conceptual
77
ms.date: 07/16/2025
88

@@ -21,13 +21,17 @@ Best practice guidance is provided throughout the technical documentation for Mi
2121

2222
Start with the [deployment guide for Microsoft Sentinel](deploy-overview.md). The deployment guide covers the high level steps to plan, deploy, and fine-tune your Microsoft Sentinel deployment. From that guide, select the provided links to find detailed guidance for each stage in your deployment.
2323

24+
## Adopt a single-platform architecture
25+
26+
Microsoft Sentinel is integrated with a modern data lake that offers affordable, long-term storage enabling teams to simplify data management, optimize costs, and accelerate the adoption of AI. The Microsoft Sentinel data lake (preview) enables a single-platform architecture for security data and empowers analysts with a unified query experience while leveraging Microsoft Sentinel’s rich connector ecosystem. For more information, see [Microsoft Sentinel data lake (preview)](datalake/sentinel-lake-overview.md).
27+
2428
## Microsoft security service integrations
2529

2630
Microsoft Sentinel is empowered by the components that send data to your workspace, and is made stronger through integrations with other Microsoft services. Any logs ingested into products, such as Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, and Microsoft Defender for Identity, allow these services to create detections, and in turn provide those detections to Microsoft Sentinel. Logs can also be ingested directly into Microsoft Sentinel to provide a fuller picture for events and incidents.
2731

28-
For example, the following image shows how Microsoft Sentinel ingests data from other Microsoft services and multicloud and partner platforms to provide coverage for your environment:
32+
For example, the following image shows how Microsoft Sentinel ingests data from other Microsoft services, multicloud, and partner platforms to provide coverage for your environment:
2933

30-
:::image type="content" source="media/best-practices/azure-sentinel-and-other-services.png" alt-text="Microsoft Sentinel integrating with other Microsoft and partner services":::
34+
:::image type="content" source="media/best-practices/azure-sentinel-and-other-services.png" lightbox="media/best-practices/azure-sentinel-and-other-services.png" alt-text="A diagram showing the Microsoft Sentinel integrating with other Microsoft and partner services.":::
3135

3236
More than ingesting alerts and logs from other sources, Microsoft Sentinel also:
3337

@@ -49,7 +53,7 @@ If you're using Microsoft Sentinel in the Azure portal, consider onboarding Micr
4953

5054
The following image shows recommended steps in an incident management and response process.
5155

52-
:::image type="content" source="media/best-practices/incident-handling.png" alt-text="Diagram of incident management process: Triage. Preparation. Remediation. Eradication. Post incident activities.":::
56+
:::image type="content" source="media/best-practices/incident-handling.png" alt-text="Diagram showing incident management process: Triage. Preparation. Remediation. Eradication. Post incident activities.":::
5357

5458
The following table provides high-level descriptions for how to use Microsoft Sentinel features for incident management and response. For more information, see [Investigate incidents with Microsoft Sentinel](investigate-cases.md).
5559

@@ -67,6 +71,7 @@ The following table provides high-level descriptions for how to use Microsoft Se
6771

6872
- [Microsoft Sentinel operational guide](ops-guide.md)
6973
- [On-board Microsoft Sentinel](quickstart-onboard.md)
74+
- [On-board Microsoft Sentinel data lake](datalake/sentinel-lake-onboarding.md)
7075
- [Deployment guide for Microsoft Sentinel](deploy-overview.md)
7176
- [Protecting MSSP intellectual property in Microsoft Sentinel](mssp-protect-intellectual-property.md)
7277

0 commit comments

Comments
 (0)