Skip to content

Commit a0cb070

Browse files
authored
Merge pull request #108606 from yelevin/yelevin/WinSecEvts
Yelevin/win sec evts
2 parents aefd9c7 + 1f65484 commit a0cb070

File tree

1 file changed

+47
-28
lines changed

1 file changed

+47
-28
lines changed

articles/sentinel/connect-windows-security-events.md

Lines changed: 47 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -14,51 +14,70 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 09/23/2019
17+
ms.date: 03/22/2020
1818
ms.author: yelevin
1919

2020
---
2121
# Connect Windows security events
2222

23+
The Security Events connector lets you stream all security events from your Windows systems (servers and workstations, physical and virtual) to your Azure Sentinel workspace. This enables you to view Windows security events in your dashboards, to use them in creating custom alerts, and to rely on them to improve your investigations, giving you more insight into your organization's network and expanding your security operations capabilities. You can select which events to stream from among the following sets: <a name="event-sets"></a>
2324

25+
- **All events** - All Windows security and AppLocker events.
26+
- **Common** - A standard set of events for auditing purposes. A full user audit trail is included in this set. For example, it contains both user sign-in and user sign-out events (event IDs 4624, 4634). There are also auditing actions such as security group changes, key domain controller Kerberos operations, and other types of events in line with accepted best practices.
2427

25-
You can stream all security events from the Windows Servers connected to your Azure Sentinel workspace. This connection enables you to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization’s network and improves your security operation capabilities. You can select which events to stream:
28+
The **Common** event set may contain some types of events that aren't so common. This is because the main point of the **Common** set is to reduce the volume of events to a more manageable level, while still maintaining full audit trail capability.
2629

27-
- **All events** - All Windows security and AppLocker events.
28-
- **Common** - A standard set of events for auditing purposes. A full user audit trail is included in this set. For example, this set contains both user sign in and user sign out events (event ID 4634). We include auditing actions like security group changes, key domain controller Kerberos operations, and other events that are recommended by industry organizations.
30+
- **Minimal** - A small set of events that might indicate potential threats. This set does not contain a full audit trail. It covers only events that might indicate a successful breach, and other important events that have very low rates of occurrence. For example, it contains successful and failed user logons (event IDs 4624, 4625), but it doesn't contain sign-out information (4634) which, while important for auditing, is not meaningful for breach detection and has relatively high volume. Most of the data volume of this set is comprised of sign-in events and process creation events (event ID 4688).
31+
32+
- **None** - No security or AppLocker events. (This setting is used to disable the connector.)
2933

30-
Events that have very low volume were included in the Common set as the main motivation to choose it over all the events is to reduce the volume and not to filter out specific events.
31-
- **Minimal** - A small set of events that might indicate potential threats. By enabling this option, you won't be able to have a full audit trail. This set covers only events that might indicate a successful breach and important events that have a very low volume. For example, this set contains user successful and failed login (event IDs 4624, 4625), but it doesn’t contain sign out information which is important for auditing but not meaningful for detection and has relatively high volume. Most of the data volume of this set is the sign in events and process creation event (event ID 4688).
32-
- **None** - No security or AppLocker events.
34+
The following list provides a complete breakdown of the Security and App Locker event IDs for each set:
35+
36+
| Event set | Collected event IDs |
37+
| --- | --- |
38+
| **Minimal** | 1102, 4624, 4625, 4657, 4663, 4688, 4700, 4702, 4719, 4720, 4722, 4723, 4724, 4727, 4728, 4732, 4735, 4737, 4739, 4740, 4754, 4755, 4756, 4767, 4799, 4825, 4946, 4948, 4956, 5024, 5033, 8001, 8002, 8003, 8004, 8005, 8006, 8007, 8222 |
39+
| **Common** | 1, 299, 300, 324, 340, 403, 404, 410, 411, 412, 413, 431, 500, 501, 1100, 1102, 1107, 1108, 4608, 4610, 4611, 4614, 4622, 4624, 4625, 4634, 4647, 4648, 4649, 4657, 4661, 4662, 4663, 4665, 4666, 4667, 4688, 4670, 4672, 4673, 4674, 4675, 4689, 4697, 4700, 4702, 4704, 4705, 4716, 4717, 4718, 4719, 4720, 4722, 4723, 4724, 4725, 4726, 4727, 4728, 4729, 4733, 4732, 4735, 4737, 4738, 4739, 4740, 4742, 4744, 4745, 4746, 4750, 4751, 4752, 4754, 4755, 4756, 4757, 4760, 4761, 4762, 4764, 4767, 4768, 4771, 4774, 4778, 4779, 4781, 4793, 4797, 4798, 4799, 4800, 4801, 4802, 4803, 4825, 4826, 4870, 4886, 4887, 4888, 4893, 4898, 4902, 4904, 4905, 4907, 4931, 4932, 4933, 4946, 4948, 4956, 4985, 5024, 5033, 5059, 5136, 5137, 5140, 5145, 5632, 6144, 6145, 6272, 6273, 6278, 6416, 6423, 6424, 8001, 8002, 8003, 8004, 8005, 8006, 8007, 8222, 26401, 30004 |
3340

3441
> [!NOTE]
35-
>
36-
> - Data will be stored in the geographic location of the workspace on which you are running Azure Sentinel.
37-
> - If Azure Security Center and Azure Sentinel are running on the same workspace, the Security Events connector can only be connected from either Azure Security Center or Azure Sentinel. To manage these events from Azure Sentinel, we recommend that you disconnect it from Azure Security Center and connect it only to Azure Sentinel.
42+
> Security Events collection within the context of a single workspace can be configured from either Azure Security Center or Azure Sentinel, but not both. If you are onboarding Azure Sentinel in a workspace that is already running Azure Security Center, and is set to collect Security Events, you have two options:
43+
> - Leave the Security Events collection in Azure Security Center as is. You will be able to query and analyze these events in Azure Sentinel as well as in Azure Security Center. You will not, however, be able to monitor the connector's connectivity status or change its configuration in Azure Sentinel. If this is important to you, consider the second option.
44+
>
45+
> - [Disable Security Events collection](../security-center/security-center-enable-data-collection.md) in Azure Security Center, and only then add the Security Events connector in Azure Sentinel. As with the first option, you will be able to query and analyze events in both Azure Sentinel and Azure Security Center, but you will now be able to monitor the connector's connectivity status or change its configuration in - and only in - Azure Sentinel.
46+
47+
## Set up the Windows Security Events connector
48+
49+
To collect your Windows security events in Azure Sentinel:
3850

51+
1. From the Azure Sentinel navigation menu, select **Data connectors**. From the list of connectors, click on **Security Events**, and then on the **Open connector page** button on the lower right. Then follow the on-screen instructions under the **Instructions** tab, as described through the rest of this section.
3952

40-
The following list provides a complete breakdown of the Security and App Locker event IDs for each set:
53+
1. Verify that you have the appropriate permissions as described under **Prerequisites**.
4154

42-
| Data tier | Collected event indicators |
43-
| --- | --- |
44-
| Minimal | 1102,4624,4625,4657,4663,4688,4700,4702,4719,4720,4722,4723,4724,4727,4728,4732,4735,4737,4739,4740,4754,4755, |
45-
| | 4756,4767,4799,4825,4946,4948,4956,5024,5033,8001,8002,8003,8004,8005,8006,8007,8222 |
46-
| Common | 1,299,300,324,340,403,404,410,411,412,413,431,500,501,1100,1102,1107,1108,4608,4610,4611,4614,4622, |
47-
| | 4624,4625,4634,4647,4648,4649,4657,4661,4662,4663,4665,4666,4667,4688,4670,4672,4673,4674,4675,4689,4697, |
48-
| | 4700,4702,4704,4705,4716,4717,4718,4719,4720,4722,4723,4724,4725,4726,4727,4728,4729,4733,4732,4735,4737, |
49-
| | 4738,4739,4740,4742,4744,4745,4746,4750,4751,4752,4754,4755,4756,4757,4760,4761,4762,4764,4767,4768,4771, |
50-
| | 4774,4778,4779,4781,4793,4797,4798,4799,4800,4801,4802,4803,4825,4826,4870,4886,4887,4888,4893,4898,4902, |
51-
| | 4904,4905,4907,4931,4932,4933,4946,4948,4956,4985,5024,5033,5059,5136,5137,5140,5145,5632,6144,6145,6272, |
52-
| | 6273,6278,6416,6423,6424,8001,8002,8003,8004,8005,8006,8007,8222,26401,30004 |
55+
1. Download and install the [Log Analytics agent](../azure-monitor/platform/log-analytics-agent.md) (also known as the Microsoft Monitoring Agent or MMA) on the machines for which you want to stream security events into Azure Sentinel.
5356

54-
## Set up the Windows security events connector
57+
For Azure Virtual Machines:
58+
59+
1. Click on **Install agent on Azure Windows Virtual Machine**, and then on the link that appears below.
60+
1. For each virtual machine that you want to connect, click on its name in the list that appears on the right, and then click **Connect**.
5561

56-
To fully integrate your Windows security events with Azure Sentinel:
62+
For non-Azure Windows machines (physical, virtual on-prem, or virtual in another cloud):
63+
64+
1. Click on **Install agent on non-Azure Windows Machine**, and then on the link that appears below.
65+
1. Click on the appropriate download links that appear on the right, under **Windows Computers**.
66+
1. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the **Workspace ID and Keys** that appear below the download links mentioned above.
67+
68+
> [!NOTE]
69+
>
70+
> To allow Windows systems without the necessary internet connectivity to still stream events to Azure Sentinel, download and install the **OMS Gateway** on a separate machine, using the link on the lower right, to act as a proxy. You will still need to install the Log Analytics agent on each Windows system whose events you want to collect.
71+
>
72+
> For more information on this scenario, see the [**Log Analytics gateway** documentation](../azure-monitor/platform/gateway.md).
73+
74+
For additional installation options and further details, see the [**Log Analytics agent** documentation](../azure-monitor/platform/agent-windows.md).
75+
76+
1. Select which event set ([All, Common, or Minimal](#event-sets)) you want to stream.
5777

58-
1. In the Azure Sentinel portal, select **Data connectors** and then click on the **Security Events** tile.
59-
1. Select which data types you want to stream.
6078
1. Click **Update**.
61-
6. To use the relevant schema in Log Analytics for the Windows security events, search for **SecurityEvent**.
79+
80+
1. To use the relevant schema in Log Analytics for Windows security events, type `SecurityEvent` in the query window.
6281

6382
## Validate connectivity
6483

@@ -69,5 +88,5 @@ It may take around 20 minutes until your logs start to appear in Log Analytics.
6988
## Next steps
7089
In this document, you learned how to connect Windows security events to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
7190
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
72-
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
91+
- Get started detecting threats with Azure Sentinel, using [built-in](tutorial-detect-threats-built-in.md) or [custom](tutorial-detect-threats-custom.md) rules.
7392

0 commit comments

Comments
 (0)