Skip to content

Commit 68bdb6d

Browse files
authored
Merge pull request #204870 from limwainstein/update-quickstart-article
Updating quickstart page (content bash)
2 parents f683929 + 4d4f1ec commit 68bdb6d

File tree

3 files changed

+27
-34
lines changed

3 files changed

+27
-34
lines changed

articles/sentinel/connect-data-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: yelevin
1313

1414
After you onboard Microsoft Sentinel into your workspace, you can use data connectors to start ingesting your data into Microsoft Sentinel. Microsoft Sentinel comes with many out of the box connectors for Microsoft services, which you can integrate in real time. For example, the Microsoft 365 Defender connector is a [service-to-service connector](#service-to-service-integration-for-data-connectors) that integrates data from Office 365, Azure Active Directory (Azure AD), Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps.
1515

16-
You can also enable out-of-the-box connectors to the broader security ecosystem for non-Microsoft products. For example, you can use [Syslog](#syslog), [Common Event Format (CEF)](#common-event-format-cef), or [REST APIs](#rest-api-integration-using-azure-functions) to connect your data sources with Microsoft Sentinel.
16+
You can also enable built-in connectors to the broader security ecosystem for non-Microsoft products. For example, you can use [Syslog](#syslog), [Common Event Format (CEF)](#common-event-format-cef), or [REST APIs](#rest-api-integration-for-data-connectors) to connect your data sources with Microsoft Sentinel.
1717

1818
Learn about [types of Microsoft Sentinel data connectors](data-connectors-reference.md) or learn about the [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md).
1919

966 Bytes
Loading

articles/sentinel/quickstart-onboard.md

Lines changed: 26 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,42 @@
11
---
22
title: 'Quickstart: Onboard in Microsoft Sentinel'
3-
description: In this quickstart, learn how to on-board Microsoft Sentinel by first enabling it, and then connecting data sources.
3+
description: In this quickstart, you enable Microsoft Sentinel, and set up data connectors to monitor and protect your environment.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: quickstart
7-
ms.date: 11/09/2021
7+
ms.date: 07/14/2022
88
ms.custom: references_regions, ignite-fall-2021, mode-other
9-
#Customer intent: As a security operator, connect all my data sources in one place so I can monitor and protect my environment.
9+
#Customer intent: As a security operator, set up data connectors in one place so I can monitor and protect my environment.
1010
---
1111

12-
# Quickstart: On-board Microsoft Sentinel
12+
# Quickstart: Onboard Microsoft Sentinel
1313

14-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14+
In this quickstart, you enable Microsoft Sentinel, and then set up data connectors to monitor and protect your environment. After you connect your data sources using data connectors, you choose from a gallery of expertly created workbooks that surface insights based on your data. These workbooks can be easily customized to your needs.
1515

16-
In this quickstart, learn how to on-board Microsoft Sentinel. To on-board Microsoft Sentinel, you first need to enable Microsoft Sentinel, and then connect your data sources.
17-
18-
Microsoft Sentinel comes with a number of connectors for Microsoft solutions, available out of the box and providing real-time integration, including Microsoft 365 Defender (formerly Microsoft Threat Protection) solutions, Microsoft 365 sources (including Office 365), Azure AD, Microsoft Defender for Identity (formerly Azure ATP), Microsoft Defender for Cloud Apps, security alerts from Microsoft Defender for Cloud, and more. In addition, there are built-in connectors to the broader security ecosystem for non-Microsoft solutions. You can also use Common Event Format (CEF), Syslog or REST-API to connect your data sources with Microsoft Sentinel.
19-
20-
After you connect your data sources, choose from a gallery of expertly created workbooks that surface insights based on your data. These workbooks can be easily customized to your needs.
16+
Microsoft Sentinel comes with many connectors for Microsoft products, for example, the Microsoft 365 Defender service-to-service connector. You can also enable built-in connectors for non-Microsoft products, for example, Syslog or Common Event Format (CEF). [Learn more about data connectors](connect-data-sources.md).
2117

2218
>[!IMPORTANT]
23-
> For information about the charges incurred when using Microsoft Sentinel, see [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel/) and [Microsoft Sentinel costs and billing](billing.md).
19+
> Review the [Microsoft Sentinel pricing](https://azure.microsoft.com/pricing/details/azure-sentinel/) and [Microsoft Sentinel costs and billing](billing.md) information.
2420
2521
## Global prerequisites
2622

2723
- **Active Azure Subscription**. If you don't have one, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2824

2925
- **Log Analytics workspace**. Learn how to [create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md). For more information about Log Analytics workspaces, see [Designing your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md).
3026

31-
By default, you may have a default of [30 days retention](../azure-monitor/logs/cost-logs.md#legacy-pricing-tiers) in the Log Analytics workspace used for Microsoft Sentinel. To make sure that you can use the full extent of Microsoft Sentinel functionality, raise this to 90 days. For more information, see [Configure data retention and archive policies in Azure Monitor Logs](../azure-monitor/logs/data-retention-archive.md).
27+
You may have a default of [30 days retention](../azure-monitor/logs/cost-logs.md#legacy-pricing-tiers) in the Log Analytics workspace used for Microsoft Sentinel. To make sure that you can use all Microsoft Sentinel functionality and features, raise the retention to 90 days. [Configure data retention and archive policies in Azure Monitor Logs](../azure-monitor/logs/data-retention-archive.md).
3228

3329
- **Permissions**:
3430

3531
- To enable Microsoft Sentinel, you need **contributor** permissions to the subscription in which the Microsoft Sentinel workspace resides.
3632

3733
- To use Microsoft Sentinel, you need either **contributor** or **reader** permissions on the resource group that the workspace belongs to.
3834

39-
- Additional permissions may be needed to connect specific data sources.
35+
- You might need other permissions to connect specific data sources.
4036

41-
- **Microsoft Sentinel is a paid service**. For more information, see [About Microsoft Sentinel](https://go.microsoft.com/fwlink/?linkid=2104058) and the [Microsoft Sentinel pricing page](https://azure.microsoft.com/pricing/details/azure-sentinel/)
37+
- **Microsoft Sentinel is a paid service**. Review the [pricing options](https://go.microsoft.com/fwlink/?linkid=2104058) and the [Microsoft Sentinel pricing page](https://azure.microsoft.com/pricing/details/azure-sentinel/).
4238

43-
For more information, see [Pre-deployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md).
39+
- Review the full [pre-deployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md).
4440

4541
### Geographical availability and data residency
4642

@@ -59,18 +55,14 @@ For more information, see [Pre-deployment activities and prerequisites for deplo
5955

6056
1. Search for and select **Microsoft Sentinel**.
6157

62-
![Services search](./media/quickstart-onboard/search-product.png)
58+
:::image type="content" source="media/quickstart-onboard/search-product.png" alt-text="Screenshot of searching for a service while enabling Microsoft Sentinel.":::
6359

6460
1. Select **Add**.
6561

66-
1. Select the workspace you want to use or create a new one. You can run Microsoft Sentinel on more than one workspace, but the data is isolated to a single workspace.
67-
68-
![Choose a workspace](./media/quickstart-onboard/choose-workspace.png)
69-
70-
>[!NOTE]
71-
> - Default workspaces created by Microsoft Defender for Cloud will not appear in the list; you can't install Microsoft Sentinel on them.
72-
>
62+
1. Select the workspace you want to use or create a new one. You can run Microsoft Sentinel on more than one workspace, but the data is isolated to a single workspace. Note that default workspaces created by Microsoft Defender for Cloud are not shown in the list. You can't install Microsoft Sentinel on these workspaces.
7363

64+
:::image type="content" source="media/quickstart-onboard/choose-workspace.png" alt-text="Screenshot of choosing a workspace while enabling Microsoft Sentinel.":::
65+
7466
>[!IMPORTANT]
7567
>
7668
> - Once deployed on a workspace, Microsoft Sentinel **does not currently support** the moving of that workspace to other resource groups or subscriptions.
@@ -79,23 +71,24 @@ For more information, see [Pre-deployment activities and prerequisites for deplo
7971
8072
1. Select **Add Microsoft Sentinel**.
8173

82-
## Connect data sources
83-
84-
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For physical and virtual machines, you can install the Log Analytics agent that collects the logs and forwards them to Microsoft Sentinel. For Firewalls and proxies, Microsoft Sentinel installs the Log Analytics agent on a Linux Syslog server, from which the agent collects the log files and forwards them to Microsoft Sentinel.
85-
86-
1. From the main menu, select **Data connectors**. This opens the data connectors gallery.
74+
## Set up data connectors
8775

88-
1. The gallery is a list of all the data sources you can connect. Select a data source and then the **Open connector page** button.
76+
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel.
8977

90-
1. The connector page shows instructions for configuring the connector, and any additional instructions that may be necessary.
78+
- For physical and virtual machines, you can install the Log Analytics agent that collects the logs and forwards them to Microsoft Sentinel.
79+
- For firewalls and proxies, Microsoft Sentinel installs the Log Analytics agent on a Linux Syslog server, from which the agent collects the log files and forwards them to Microsoft Sentinel.
80+
81+
1. From the main menu, select **Data connectors**. This opens the data connectors gallery.
82+
1. Select a data connector, and then select the **Open connector page** button.
83+
1. The connector page shows instructions for configuring the connector, and any other instructions that may be necessary.
9184

92-
For example, if you select the **Azure Active Directory** data source, which lets you stream logs from Azure AD into Microsoft Sentinel, you can select what type of logs you want to get - sign-in logs and/or audit logs. <br> Follow the installation instructions or [refer to the relevant connection guide](data-connectors-reference.md) for more information. For information about data connectors, see [Microsoft Sentinel data connectors](connect-data-sources.md).
85+
For example, if you select the **Azure Active Directory** data connector, which lets you stream logs from Azure AD into Microsoft Sentinel, you can select what type of logs you want to get - sign-in logs and/or audit logs. <br>Follow the installation instructions. To learn more, [read the relevant connection guide](data-connectors-reference.md) or learn about [Microsoft Sentinel data connectors](connect-data-sources.md).
9386

9487
1. The **Next steps** tab on the connector page shows relevant built-in workbooks, sample queries, and analytics rule templates that accompany the data connector. You can use these as-is or modify them - either way you can immediately get interesting insights across your data.
9588

96-
After your data sources are connected, your data starts streaming into Microsoft Sentinel and is ready for you to start working with. You can view the logs in the [built-in workbooks](get-visibility.md) and start building queries in Log Analytics to [investigate the data](investigate-cases.md).
89+
After you set up your data connectors, your data starts streaming into Microsoft Sentinel and is ready for you to start working with. You can view the logs in the [built-in workbooks](get-visibility.md) and start building queries in Log Analytics to [investigate the data](investigate-cases.md).
9790

98-
For more information, see [Data collection best practices](best-practices-data.md).
91+
Review the [data collection best practices](best-practices-data.md).
9992

10093
## Next steps
10194

0 commit comments

Comments
 (0)