You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-azure-windows-microsoft-services.md
+39-39Lines changed: 39 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,45 +129,7 @@ You can find and query the data for each resource type using the table name that
129
129
130
130
## Windows agent-based connections
131
131
132
-
# [Log Analytics Agent (Legacy)](#tab/LAA)
133
-
134
-
### Prerequisites
135
-
136
-
- You must have read and write permissions on the Log Analytics workspace, and any workspace that contains machines you want to collect logs from.
137
-
- You must have the **Log Analytics Contributor** role on the SecurityInsights (Azure Sentinel) solution on those workspaces, in addition to any Azure Sentinel roles.
138
-
139
-
### Instructions
140
-
141
-
#### Install the agent
142
-
143
-
1. From the Azure Sentinel navigation menu, select **Data connectors**.
144
-
145
-
1. Select your service (**DNS** or **Windows Firewall**) and then select **Open connector page**.
146
-
147
-
1. Install and onboard the agent on the device that generates the logs.
148
-
149
-
| Machine type | Instructions |
150
-
| --------- | --------- |
151
-
|**For an Azure Windows VM**| 1. Under **Choose where to install the agent**, expand **Install agent on Azure Windows virtual machine**. <br><br>2. Select the **Download & install agent for Azure Windows Virtual machines >** link. <br><br>3. In the **Virtual machines** blade, select a virtual machine to install the agent on, and then select **Connect**. Repeat this step for each VM you wish to connect. |
152
-
|**For any other Windows machine**| 1. Under **Choose where to install the agent**, expand **Install agent on non-Azure Windows Machine** <br><br>2. Select the **Download & install agent for non-Azure Windows machines >** link. <br><br>3. In the **Agents management** blade, on the **Windows servers** tab, select the **Download Windows Agent** link for either 32-bit or 64-bit systems, as appropriate. <br><br>4. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the **Workspace ID and Keys** that appear below the download links in the previous step. |
153
-
|||
154
-
155
-
> [!NOTE]
156
-
>
157
-
> To allow Windows systems without the necessary internet connectivity to still stream events to Azure Sentinel, download and install the **Log Analytics Gateway** on a separate machine, using the **Download Log Analytics Gateway** link on the **Agents Management** page, to act as a proxy. You will still need to install the Log Analytics agent on each Windows system whose events you want to collect.
158
-
>
159
-
> For more information on this scenario, see the [**Log Analytics gateway** documentation](../azure-monitor/agents/gateway.md).
160
-
161
-
For additional installation options and further details, see the [**Log Analytics agent** documentation](../azure-monitor/agents/agent-windows.md).
162
-
163
-
164
-
#### Determine the logs to send
165
-
166
-
For the Windows DNS Server and Windows Firewall connectors, select the **Install solution** button. For the legacy Security Events connector, choose the [**event set**](windows-security-event-id-reference.md) you wish to send and select **Update**.
167
-
168
-
You can find and query the data for these services using the table names in their respective sections in the [Data connectors reference](data-connectors-reference.md) page.
169
-
170
-
# [Azure Monitor Agent (New)](#tab/AMA)
132
+
# [Azure Monitor Agent](#tab/AMA)
171
133
172
134
> [!IMPORTANT]
173
135
>
@@ -281,6 +243,44 @@ PUT https://management.azure.com/subscriptions/703362b3-f278-4e4b-9179-c76eaf41f
281
243
}
282
244
```
283
245
246
+
# [Log Analytics Agent (Legacy)](#tab/LAA)
247
+
248
+
### Prerequisites
249
+
250
+
- You must have read and write permissions on the Log Analytics workspace, and any workspace that contains machines you want to collect logs from.
251
+
- You must have the **Log Analytics Contributor** role on the SecurityInsights (Azure Sentinel) solution on those workspaces, in addition to any Azure Sentinel roles.
252
+
253
+
### Instructions
254
+
255
+
#### Install the agent
256
+
257
+
1. From the Azure Sentinel navigation menu, select **Data connectors**.
258
+
259
+
1. Select your service (**DNS** or **Windows Firewall**) and then select **Open connector page**.
260
+
261
+
1. Install and onboard the agent on the device that generates the logs.
262
+
263
+
| Machine type | Instructions |
264
+
| --------- | --------- |
265
+
|**For an Azure Windows VM**| 1. Under **Choose where to install the agent**, expand **Install agent on Azure Windows virtual machine**. <br><br>2. Select the **Download & install agent for Azure Windows Virtual machines >** link. <br><br>3. In the **Virtual machines** blade, select a virtual machine to install the agent on, and then select **Connect**. Repeat this step for each VM you wish to connect. |
266
+
|**For any other Windows machine**| 1. Under **Choose where to install the agent**, expand **Install agent on non-Azure Windows Machine** <br><br>2. Select the **Download & install agent for non-Azure Windows machines >** link. <br><br>3. In the **Agents management** blade, on the **Windows servers** tab, select the **Download Windows Agent** link for either 32-bit or 64-bit systems, as appropriate. <br><br>4. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the **Workspace ID and Keys** that appear below the download links in the previous step. |
267
+
|||
268
+
269
+
> [!NOTE]
270
+
>
271
+
> To allow Windows systems without the necessary internet connectivity to still stream events to Azure Sentinel, download and install the **Log Analytics Gateway** on a separate machine, using the **Download Log Analytics Gateway** link on the **Agents Management** page, to act as a proxy. You will still need to install the Log Analytics agent on each Windows system whose events you want to collect.
272
+
>
273
+
> For more information on this scenario, see the [**Log Analytics gateway** documentation](../azure-monitor/agents/gateway.md).
274
+
275
+
For additional installation options and further details, see the [**Log Analytics agent** documentation](../azure-monitor/agents/agent-windows.md).
276
+
277
+
278
+
#### Determine the logs to send
279
+
280
+
For the Windows DNS Server and Windows Firewall connectors, select the **Install solution** button. For the legacy Security Events connector, choose the [**event set**](windows-security-event-id-reference.md) you wish to send and select **Update**.
281
+
282
+
You can find and query the data for these services using the table names in their respective sections in the [Data connectors reference](data-connectors-reference.md) page.
|**Data ingestion method**|**Azure service-to-service integration: <br>[Azure Monitor agent-based connections](connect-azure-windows-microsoft-services.md?tabs=AMA#windows-agent-based-connections)**<br><br>[Additional instructions for deploying the Windows Forwarded Events connector](#additional-instructions-for-deploying-the-windows-forwarded-events-connector) |
1566
+
|**Prerequisites**| You must have Windows Event Collection (WEC) enabled and running.<br>Install the Azure Monitor Agent on the WEC machine. |
1566
1567
|**Log Analytics table(s)**| SecurityEvents |
1567
1568
|**Supported by**| Microsoft |
1568
1569
|||
1569
1570
1571
+
### Additional instructions for deploying the Windows Forwarded Events connector
1572
+
1573
+
We recommend installing the [Advanced SIEM Information Model (ASIM)](normalization.md) parsers to ensure full support fordata normalization. You can deploy these parsers from the [Azure Sentinel GitHub repository(link)] using the **Deploy** buttonin the **ASIM normalization support** section of the connector page.
1574
+
1570
1575
## Windows Firewall
1571
1576
1572
1577
| Connector attribute | Description |
@@ -1580,11 +1585,13 @@ Follow the instructions to obtain the credentials.
1580
1585
1581
1586
| Connector attribute | Description |
1582
1587
| --- | --- |
1583
-
|**Data ingestion method**|**Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md)** (Top connector article);<br>**[Azure Monitor agent-based connections](connect-azure-windows-microsoft-services.md?tabs=AMA#windows-agent-based-connections)**|
0 commit comments