You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/basic-logs-use-cases.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: When to use Auxiliary Logs in Microsoft Sentinel
3
-
description: Learn what log sources might be appropriate for Auxiliary Log ingestion.
3
+
description: Learn what log sources might be appropriate for Auxiliary Log or Basic Log ingestion and what are the attributes to look for to decide about other sources.
4
4
author: cwatson-cat
5
5
ms.author: cwatson
6
6
ms.topic: conceptual
7
-
ms.date: 07/21/2024
7
+
ms.date: 03/31/2025
8
8
appliesto:
9
9
- Microsoft Sentinel in the Azure portal
10
10
- Microsoft Sentinel in the Microsoft Defender portal
@@ -16,7 +16,7 @@ ms.collection: usx-security
16
16
---
17
17
# Log sources to use for Auxiliary Logs ingestion
18
18
19
-
This article highlights log sources to consider configuring as Auxiliary Logs when they're stored in Log Analytics tables. Before choosing a log type for which to configure a given table, do the research to see which is most appropriate. For more information about data categories and log data plans, see [Log retention plans in Microsoft Sentinel](log-plans.md).
19
+
This article highlights log sources to consider configuring as Auxiliary Logs (or Basic Logs) when they're stored in Log Analytics tables. Before choosing a log type for which to configure a given table, do the research to see which is most appropriate. For more information about data categories and log data plans, see [Log retention plans in Microsoft Sentinel](log-plans.md).
Copy file name to clipboardExpand all lines: articles/sentinel/billing-reduce-costs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ When hunting or investigating threats in Microsoft Sentinel, you might need to a
53
53
54
54
## Select low-cost log types for high-volume, low-value data
55
55
56
-
While standard analytics logs are most appropriate for continuous, real-time threat detection, the [auxiliary logs](log-plans.md) type is more suited for ad-hoc querying and search of [verbose, high-volume, low-value logs](basic-logs-use-cases.md) that aren't frequently needed or accessed on demand. Enable auxiliary log data ingestion at a significantly reduced cost for eligible data tables. For more information, see [Microsoft Sentinel Pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/).
56
+
While standard analytics logs are most appropriate for continuous, real-time threat detection, two other log types—[basic logs and auxiliary logs](log-plans.md)—are more suited for ad-hoc querying and search of [verbose, high-volume, low-value logs](basic-logs-use-cases.md) that aren't frequently needed or accessed on demand. basic log data ingestion at a significantly reduced cost, or auxiliary log data ingestion at an even lower cost, for eligible data tables. For more information, see [Microsoft Sentinel Pricing](https://azure.microsoft.com/pricing/details/microsoft-sentinel/).
57
57
58
58
-[Log retention plans in Microsoft Sentinel](log-plans.md)
59
59
-[Log sources to use for Auxiliary Logs ingestion](basic-logs-use-cases.md)
Copy file name to clipboardExpand all lines: articles/sentinel/billing.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ Use the [Microsoft Sentinel pricing calculator](https://azure.microsoft.com/pric
47
47
48
48
For example, enter the GB of daily data you expect to ingest in Microsoft Sentinel, and the region for your workspace. The calculator provides the aggregate monthly cost across these components:
49
49
50
-
- Microsoft Sentinel: Analytics logs and auxiliary logs
50
+
- Microsoft Sentinel: Analytics logs and auxiliary/basic logs
51
51
- Azure Monitor: Retention
52
52
- Azure Monitor: Data Restore
53
53
- Azure Monitor: Search Queries and Search Jobs
@@ -60,7 +60,7 @@ Microsoft Sentinel runs on Azure infrastructure that accrues costs when you depl
60
60
61
61
### How you're charged for Microsoft Sentinel
62
62
63
-
Pricing is based on the types of logs ingested into a workspace. Analytics logs typically make up most of your high value security logs and support all data types offering full analytics, alerts and no query limits. Auxiliary logs tend to be verbose with low security value. It's important to note that billing is done per workspace on a daily basis for all log types and tiers.
63
+
Pricing is based on the types of logs ingested into a workspace. Analytics logs typically make up most of your high value security logs and support all data types offering full analytics, alerts and no query limits. Auxiliary logs and Basic logs tend to be verbose with low security value. It's important to note that billing is done per workspace on a daily basis for all log types and tiers.
64
64
65
65
#### Analytics logs
66
66
@@ -90,6 +90,8 @@ This log type is best suited for use in playbook automation, ad-hoc querying, in
90
90
-[Log retention plans in Microsoft Sentinel](log-plans.md)
91
91
-[Log sources to use for Auxiliary Logs ingestion](basic-logs-use-cases.md)
92
92
93
+
Basic logs are a similar option, but less cost-effective.
94
+
93
95
To learn more about the difference between **interactive retention** and **long-term retention** (formerly known as archive), see [Manage data retention in a Log Analytics workspace](/azure/azure-monitor/logs/data-retention-archive).
94
96
95
97
### Simplified pricing tiers
@@ -160,8 +162,10 @@ If you're billed at classic pay-as-you-go rate, this table shows how Microsoft S
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ The following table lists the available types of data value SOC optimization rec
43
43
44
44
| Type of observation | Action |
45
45
|---------|---------|
46
-
| The table wasn’t used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to [auxiliary logs](../billing.md#auxiliary-logs) if the table is eligible. |
46
+
| The table wasn't used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move the table to a [basic logs plan](../billing.md#auxiliary-logs) if the table is eligible. |
47
47
| The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates <br>OR<br> Stop data ingestion and remove the table or move the table to long term retention. |
48
48
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace. |
0 commit comments