Skip to content

Commit 5ca5803

Browse files
authored
Merge pull request #275724 from batamig/may-fixes
Sentinel May freshness
2 parents f89f4e9 + 6e6b8f4 commit 5ca5803

File tree

6 files changed

+99
-89
lines changed

6 files changed

+99
-89
lines changed

articles/sentinel/get-visibility.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,15 @@ title: Visualize collected data
33
description: Learn how to quickly view and monitor what's happening across your environment by using Microsoft Sentinel.
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 06/07/2023
6+
ms.date: 05/19/2024
77
ms.author: yelevin
88
---
99

1010
# Visualize collected data
1111

12-
In this article, you will learn how to quickly be able to view and monitor what's happening across your environment using Microsoft Sentinel. After you connected your data sources to Microsoft Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Microsoft Sentinel gives you workbooks that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use workbook templates or create a new workbook easily, from scratch or based on an existing workbook.
12+
In this article, you will learn how to quickly be able to view and monitor what's happening across your environment using Microsoft Sentinel.
13+
14+
After you connected your data sources to Microsoft Sentinel, you get instant visualization and analysis of data so that you can know what's happening across all your connected data sources. Microsoft Sentinel gives you workbooks that provide you with the full power of tools already available in Azure as well as tables and charts that are built in to provide you with analytics for your logs and queries. You can either use workbook templates or create a new workbook easily, from scratch or based on an existing workbook.
1315

1416
## Get visualization
1517

@@ -38,10 +40,24 @@ You see different types of automation data under **Automation**.
3840

3941
:::image type="content" source="./media/qs-get-visibility/automation.png" alt-text="Screenshot of the Automation section in the Microsoft Sentinel Overview page." lightbox="./media/qs-get-visibility/automation.png":::
4042

41-
- At the top, you see a summary of the automation rules activity: Incidents closed by automation, the time the automation saved, and related playbooks health.
43+
- At the top, you see a summary of the automation rules activity: Incidents closed by automation, the time the automation saved, and related playbooks health.
44+
45+
Microsoft Sentinel calculates the time saved by automation by finding the average time that a single automation saved, multiplied by the number of incidents that were resolved by automation. The formula is as follows:
46+
47+
`(avgWithout - avgWith) * resolvedByAutomation`
48+
49+
Where:
50+
51+
- **avgWithout** is the average time it takes for an incident to be resolved without automation.
52+
- **avgWith** is the average time it takes for an incident to be resolved by automation.
53+
- **resolvedByAutomation** is the number of incidents that are resolved by automation.
54+
55+
4256
- Below the summary, a graph summarizes the numbers of actions performed by automation, by type of action.
57+
4358
- At the bottom, you can find a count of the active automation rules with a link to the automation blade.
4459

60+
4561
### View status of data records, data collectors, and threat intelligence
4662

4763
You see different types of data on data records, data collectors, and threat intelligence under **Data**.
@@ -68,10 +84,10 @@ Workbook templates provide integrated data from your connected data sources to l
6884
2. Search for a specific workbook to see the whole list and description of what each offers.
6985
3. Assuming you use Microsoft Entra ID, to get up and running with Microsoft Sentinel, we recommend that you install the Microsoft Entra solution for Microsoft Sentinel and use the following workbooks:
7086
- **Microsoft Entra ID**: Use either or both of the following:
71-
- **Microsoft Entra sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbooks provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
87+
- **Microsoft Entra sign-ins** analyzes sign-ins over time to see if there are anomalies. This workbook provides failed sign-ins by applications, devices, and locations so that you can notice, at a glance if something unusual happens. Pay attention to multiple failed sign-ins.
7288
- **Microsoft Entra audit logs** analyzes admin activities, such as changes in users (add, remove, etc.), group creation, and modifications.
7389

74-
- Install the appropriate solution to add a workbook for your firewall. For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlights suspicious events across entities. Workbooks provide you with information about trends in your traffic and let you drill down into and filter results.
90+
- Install the appropriate solution to add a workbook for your firewall. For example, install the Palo Alto firewall solution for Microsoft Sentinel to add the Palo Alto workbooks. The workbooks analyze your firewall traffic, providing you with correlations between your firewall data and threat events, and highlight suspicious events across entities. Workbooks provide you with information about trends in your traffic and let you drill down into and filter results.
7591

7692
![Palo Alto dashboard](./media/qs-get-visibility/palo-alto-week-query.png)
7793

articles/sentinel/health-audit.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,44 @@
11
---
22
title: Auditing and health monitoring in Microsoft Sentinel
33
description: Learn about the Microsoft Sentinel health and audit feature, which monitors service health drifts and user actions.
4-
author: limwainstein
5-
ms.author: lwainstein
4+
author: batamig
5+
ms.author: bagol
66
ms.topic: conceptual
7-
ms.date: 01/17/2023
7+
ms.date: 05/20/2024
88
---
99

1010
# Auditing and health monitoring in Microsoft Sentinel
1111

12-
Microsoft Sentinel is a critical service for advancing and protecting the security of your organization’s technological and information assets, so you’ll want to rest assured that it’s always running smoothly and free of interference. You’ll want to be able to make sure that the service's many moving parts are always functioning as intended and that the service isn't being manipulated by unauthorized actions, whether by internal users or otherwise. You also might like to configure notifications of health drifts or unauthorized actions to be sent to relevant stakeholders who can respond or approve a response. For example, you can set conditions to trigger the sending of emails or Microsoft Teams messages to operations teams, managers, or officers, launch new tickets in your ticketing system, and so on.
12+
Microsoft Sentinel is a critical service for advancing and protecting the security of your organization’s technological and information assets, so you want to be sure that it's always running smoothly and free of interference.
13+
14+
You want to verify that the service's many moving parts are always functioning as intended, and it isn't being manipulated by unauthorized actions, whether by internal users or otherwise. You may also like to configure notifications of health drifts or unauthorized actions to be sent to relevant stakeholders who can respond or approve a response. For example, you can set conditions to trigger the sending of emails or Microsoft Teams messages to operations teams, managers, or officers, launch new tickets in your ticketing system, and so on.
1315

1416
This article describes how Microsoft Sentinel’s health monitoring and auditing features let you monitor the activity of some of the service’s key resources and inspect logs of user actions within the service.
1517

16-
## Description
1718

18-
This section describes the function and use cases of the health monitoring and auditing components.
19+
## Health and audit data storage
20+
21+
Health and audit data are collected in two tables in your Log Analytics workspace: *SentinelHealth* and *SentinelAudit*
1922

20-
### Data storage
23+
**Audit data** is collected in the *SentinelAudit* table.
2124

22-
Health and audit data are collected in two tables in your Log Analytics workspace:
25+
**Health data** is collected in the *SentinelHealth* table, which captures events that record each time an automation rule is run and the end results of those runs. The *SentinelHealth* table includes:
2326

24-
- Health data is collected in the *SentinelHealth* table.
25-
- Audit data is collected in the *SentinelAudit* table.
27+
- Whether actions launched in the rule succeed or fail, and the playbooks called by the rule.
28+
- Events that record the on-demand (manual or API-based) triggering of playbooks, including the identities that triggered them, and the end results of those runs
2629

27-
The prevalent way you'll use this data is by querying these tables.
30+
The *SentinelHealth* table doesn't include a record of the execution of a playbook's contents, only whether the playbook was launched successfully. A log of the actions taken within a playbook, which are Logic Apps workflows, are listed in the *AzureDiagnostics* table. The *AzureDiagnostics* provides you with a complete picture of your automation health when used in tandem with the *SentinelHealth* data.
2831

29-
For best results, you should build your queries on the **pre-built functions** on these tables, ***_SentinelHealth()*** and ***_SentinelAudit()***, instead of querying the tables directly. These functions ensure the maintenance of your queries' backward compatibility in the event of changes being made to the schema of the tables themselves.
32+
The most common way you'll use this data is by querying these tables. For best results, build your queries on the **pre-built functions** on these tables, ***_SentinelHealth()*** and ***_SentinelAudit()***, instead of querying the tables directly. These functions ensure the maintenance of your queries' backward compatibility in the event of changes being made to the schema of the tables themselves.
3033

3134
> [!IMPORTANT]
3235
>
33-
> - The *SentinelHealth* and *SentinelAudit* data tables are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
34-
>
35-
> - When monitoring the health of **playbooks**, you'll also need to capture Azure Logic Apps diagnostic events from your playbooks, in addition to the *SentinelHealth* data, in order to get the full picture of your playbook activity. Azure Logic Apps diagnostic data is collected in the *AzureDiagnostics* table in your workspace.
36+
> The *SentinelHealth* and *SentinelAudit* data tables are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
37+
>
3638
37-
### Use cases
39+
### Questions to verify service health and audit data
3840

39-
#### Health
41+
Use the following questions to guide your monitoring of Microsoft Sentinel's health and audit data:
4042

4143
**Is the data connector running correctly?**
4244

@@ -50,14 +52,12 @@ For best results, you should build your queries on the **pre-built functions** o
5052

5153
[Did your analytics rule run when it was supposed to, and did it generate results](monitor-analytics-rule-integrity.md)? If you're expecting to see particular incidents in your queue but you don't, you want to know whether the rule ran but didn't find anything (or enough things), or didn't run at all.
5254

53-
#### Audit
54-
5555
**Were unauthorized changes made to an analytics rule?**
5656

5757
[Was something changed in the rule](monitor-analytics-rule-integrity.md)? You didn't get the results you expected from your analytics rule, and it didn't have any health issues. You want to see if any unplanned changes were made to the rule, and if so, what changes were made, by whom, from where, and when.
5858

5959

60-
## How Microsoft Sentinel presents health and audit data
60+
## Health and audit monitoring flow
6161

6262
To start collecting health and audit data, you need to [enable health and audit monitoring](enable-monitoring.md) in the Microsoft Sentinel settings. Then you can dive into the health and audit data that Microsoft Sentinel collects:
6363

articles/sentinel/monitor-automation-health.md

Lines changed: 25 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Monitor the health of your Microsoft Sentinel automation rules and playbooks
33
description: Use the SentinelHealth and AzureDiagnostics data tables to keep track of your automation rules' and playbooks' execution and performance.
4-
author: yelevin
5-
ms.author: yelevin
4+
author: batamig
5+
ms.author: bagol
66
ms.topic: how-to
7-
ms.date: 11/09/2022
7+
ms.date: 05/20/2024
88
ms.service: microsoft-sentinel
99
---
1010

@@ -14,33 +14,11 @@ To ensure proper functioning and performance of your security orchestration, aut
1414

1515
Set up notifications of health events for relevant stakeholders, who can then take action. For example, define and send email or Microsoft Teams messages, create new tickets in your ticketing system, and so on.
1616

17-
This article describes how to use Microsoft Sentinel's [health monitoring features](health-audit.md) to keep track of your automation rules and playbooks' health from within Microsoft Sentinel.
18-
19-
## Summary
20-
21-
22-
23-
24-
- **Microsoft Sentinel automation health logs:**
25-
26-
- This log captures events that record the running of automation rules, and the end result of these runnings - if they succeeded or failed, and if they failed, why. The log records the collective success or failure of the launch of the actions in the rule, and it also lists the playbooks called by the rule.
27-
- The log also captures events that record the on-demand (manual or API-based) triggering of playbooks, including the **identities that triggered them**, whether they succeeded or failed, and if they failed, why.
28-
- This log *does not include* a record of the execution of the contents of a playbook, only of the success or failure of the launching of the playbook. For a log of the actions taken within a playbook, see the next list below.
29-
- These logs are collected in the *SentinelHealth* table in Log Analytics.
30-
31-
> [!IMPORTANT]
32-
>
33-
> The *SentinelHealth* data table is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
34-
35-
- **Azure Logic Apps diagnostics logs:**
36-
37-
- These logs capture the results of the running of playbooks (also known as Logic Apps workflows) and the actions in them.
38-
- These logs provide you with a complete picture of your automation health when used in tandem with the automation health logs.
39-
- These logs are collected in the *AzureDiagnostics* table in Log Analytics.
17+
This article describes how to use Microsoft Sentinel's health monitoring features to keep track of your automation rules and playbooks's health from within Microsoft Sentinel. For more information, see [Auditing and health monitoring in Microsoft Sentinel](health-audit.md).
4018

4119
## Use the SentinelHealth data table (Public preview)
4220

43-
To get automation health data from the *SentinelHealth* data table, you must first turn on the Microsoft Sentinel health feature for your workspace. For more information, see [Turn on health monitoring for Microsoft Sentinel](enable-monitoring.md).
21+
To get automation health data from the *SentinelHealth* data table, first turn on the Microsoft Sentinel health feature for your workspace. For more information, see [Turn on health monitoring for Microsoft Sentinel](enable-monitoring.md).
4422

4523
Once the health feature is turned on, the *SentinelHealth* data table is created at the first success or failure event generated for your automation rules and playbooks.
4624

@@ -66,21 +44,27 @@ For more information, see [SentinelHealth table columns schema](health-table-ref
6644
6745
### Statuses, errors and suggested steps
6846
69-
For **Automation rule run**, you may see the following statuses:
70-
- Success: rule executed successfully, triggering all actions.
71-
- Partial success: rule executed and triggered at least one action, but some actions failed.
72-
- Failure: automation rule did not run any action due to one of the following reasons:
47+
For the **Automation rule run** status, you may see the following statuses:
48+
49+
- **Success**: rule executed successfully, triggering all actions.
50+
- **Partial success**: rule executed and triggered at least one action, but some actions failed.
51+
- *Failure*: automation rule did not run any action due to one of the following reasons:
52+
7353
- Conditions evaluation failed.
7454
- Conditions met, but the first action failed.
7555
76-
For **Playbook was triggered**, you may see the following statuses:
77-
- Success: playbook was triggered successfully.
78-
- Failure: playbook could not be triggered.
56+
For the **Playbook was triggered** status, you may see the following statuses:
57+
58+
- **Success**: playbook was triggered successfully.
59+
- **Failure**: playbook could not be triggered.
60+
7961
> [!NOTE]
8062
>
81-
> "Success" means only that the automation rule successfully triggered a playbook. It doesn't tell you when the playbook started or ended, the results of the actions in the playbook, or the final result of the playbook. To find this information, query the Logic Apps diagnostics logs (see the instructions later in this article).
63+
> **Success** means only that the automation rule successfully triggered a playbook. It doesn't tell you when the playbook started or ended, the results of the actions in the playbook, or the final result of the playbook.
64+
>
65+
> To find this information, query the Logic Apps diagnostics logs. For more information, see [Get the complete automation picture](#get-the-complete-automation-picture).
8266
83-
#### Error descriptions and suggested actions
67+
### Error descriptions and suggested actions
8468
8569
| Error description | Suggested actions |
8670
| --------------------------------- | ----------------------------------------- |
@@ -106,14 +90,14 @@ For **Playbook was triggered**, you may see the following statuses:
10690
10791
## Get the complete automation picture
10892
109-
Microsoft Sentinel's health monitoring table allows you to track the triggering of playbooks, but to monitor what happens inside your playbooks and their results when they're run, you must also [turn on diagnostics in Azure Logic Apps](../logic-apps/monitor-workflows-collect-diagnostic-data.md) to ingest the following events to the *AzureDiagnostics* table:
93+
Microsoft Sentinel's health monitoring table allows you to track when playbooks are triggered, but to monitor what happens inside your playbooks and their results when they're run, you must also [turn on diagnostics in Azure Logic Apps](../logic-apps/monitor-workflows-collect-diagnostic-data.md) to ingest the following events to the *AzureDiagnostics* table:
11094
11195
- {Action name} started
11296
- {Action name} ended
11397
- Workflow (playbook) started
11498
- Workflow (playbook) ended
11599
116-
These added events will give you additional insights into the actions being taken in your playbooks.
100+
These added events provide additional insights into the actions being taken in your playbooks.
117101
118102
### Turn on Azure Logic Apps diagnostics
119103
@@ -149,11 +133,14 @@ SentinelHealth
149133
## Use the health monitoring workbook
150134

151135
The **Automation health** workbook helps you visualize your health data, as well as the correlation between the two types of logs that we just mentioned. The workbook includes the following displays:
136+
152137
- Automation rule health and details
153138
- Playbook trigger health and details
154139
- Playbook runs health and details (requires Azure Diagnostic enabled on the Playbook level)
155140
- Automation details per incident
156141

142+
For example:
143+
157144
:::image type="content" source="media/monitor-automation-health/automation-health-monitoring-workbook.png" alt-text="Screenshot shows the opening panel of the automation health workbook.":::
158145

159146
Select the **Playbooks run by Automation Rules** tab to see playbook activity.

0 commit comments

Comments
 (0)