Skip to content

Commit aa9ff4e

Browse files
authored
Update siem-integration-with-sentinel.md
1 parent 0a0ee6c commit aa9ff4e

File tree

1 file changed

+28
-30
lines changed

1 file changed

+28
-30
lines changed

articles/application-gateway/for-containers/siem-integration-with-sentinel.md

Lines changed: 28 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,16 @@ ms.author: greglin
1515
By creating a SIEM integration with Application Gateway for Containers and Azure Sentinel, you streamline the security data collection across your digital environment. By following our QuickStart guide, you effortlessly set up Microsoft Sentinel to work in tandem with the Application Gateway for Container Access Logs. This setup allows you to monitor, detect, and examine potential threats and alerts generated from logs with precision. Additionally, by incorporating a solution from the content hub and configuring a data connector, you start importing access logs into Microsoft Sentinel without a hitch. To cap it off, you establish analytical rules, conduct test alerts, and utilize visualization tools for alerts, ensuring comprehensive oversight of your security landscape.
1616

1717
In this QuickStart guide, you set up:
18-
1. Integrate a log analytics workspace.
19-
2. Configure a data connector into Microsoft Sentinel.
20-
3. Establish an analytical rule, conduct a test alert, and visualize an alert for comprehensive oversight.
21-
22-
![A screenshot of Application Gateway for Containers Log Settings.](./media/siem-integration-with-sentinel/sentinel-arch.png)
18+
- Integrate a log analytics workspace.
19+
- Configure a data connector into Microsoft Sentinel.
20+
- Establish an analytical rule, conduct a test alert, and visualize an alert for comprehensive oversight.
21+
[ ![A screenshot of Application Gateway for Containers Log Settings.](./media/siem-integration-with-sentinel/sentinel-arch.png) ](./media/siem-integration-with-sentinel/sentinel-arch.png#lightbox)
2322

2423
## Learn About The Services
25-
1. [What is Azure Sentinel?](../../sentinel/overview.md)
26-
1. Why use Sentinel: Sentinel provides security content packaged in SIEM solutions that enable you to ingest data, monitor, alert, hunt, investigate, respond, and connect with different products and platforms such as Log Analytics Workspace.
27-
2. [What is Azure Log Analytics Workspace?](../../azure-monitor/logs/log-analytics-workspace-overview.md)
28-
1. Why use Log Analytics Workspace: Log Analytics workspace scales with your business needs, handling large volumes of log data efficiently and detects and diagnose issues quickly.
24+
- [What is Azure Sentinel?](../../sentinel/overview.md)
25+
- Why use Sentinel: Sentinel provides security content packaged in SIEM solutions that enable you to ingest data, monitor, alert, hunt, investigate, respond, and connect with different products and platforms such as Log Analytics Workspace.
26+
- [What is Azure Log Analytics Workspace?](../../azure-monitor/logs/log-analytics-workspace-overview.md)
27+
- Why use Log Analytics Workspace: Log Analytics workspace scales with your business needs, handling large volumes of log data efficiently and detects and diagnose issues quickly.
2928

3029
## Prerequisites
3130

@@ -37,23 +36,22 @@ In this QuickStart guide, you set up:
3736

3837
1. [Enable Azure Sentinel Workspace](../../sentinel/overview.md).
3938
2. Send Logs to Log Analytics Workspace:
40-
- In **Search resources, service, and docs**, type **Application Gateways for Containers**.
41-
- Go to your selected Application Gateway for Container Resource.
42-
- Go to Diagnostic Setting under Monitoring:
43-
- Select a name, check box **allLogs** which include the Application Gateway for Container Access Logs.
44-
- Select **Send to Log analytics Workspace** with your desired subscription and your log analytics workspace.
45-
46-
![A screenshot of app gateway for containers Log Settings.](./media/siem-integration-with-sentinel/logging.png)
39+
1. In **Search resources, service, and docs**, type **Application Gateways for Containers**.
40+
2. Go to your selected Application Gateway for Container Resource.
41+
3. Go to Diagnostic Setting under Monitoring:
42+
1. Select a name, check box **allLogs** which include the Application Gateway for Container Access Logs.
43+
2. Select **Send to Log analytics Workspace** with your desired subscription and your log analytics workspace.
44+
[ ![A screenshot of app gateway for containers Log Settings.](./media/siem-integration-with-sentinel/logging.png) ](./media/siem-integration-with-sentinel/logging.png#lightbox)
4745

4846
> [!NOTE]
4947
> It takes a few minutes for AccessLogs to populate into your log analytics workspace.
5048
51-
4. View data ingested to Microsoft Sentinel:
52-
- In **Search resources, service, and docs**, type **Azure Sentinel**.
53-
- Go to your selected Sentinel Resource.
54-
- Select **Logs**.
55-
- On the left-side bar, go to **Tables** where a section called **LogManagement** appear with digested access logs.
56-
- Preview all logs by hovering over access logs and click **Run**.
49+
3. View data ingested to Microsoft Sentinel:
50+
1. In **Search resources, service, and docs**, type **Azure Sentinel**.
51+
2. Go to your selected Sentinel Resource.
52+
3. Select **Logs**.
53+
4. On the left-side bar, go to **Tables** where a section called **LogManagement** appear with digested access logs.
54+
5. Preview all logs by hovering over access logs and click **Run**.
5755
![A screenshot of Log Management.](./media/siem-integration-with-sentinel/log-management.png)
5856

5957
## Create Analytics Rule
@@ -66,9 +64,9 @@ In this QuickStart guide, you set up:
6664
![A screenshot of Rule Query.](./media/siem-integration-with-sentinel/create-rule.png)
6765

6866
6. Create rule query based on your access logs:
69-
- Example Scenario: A user sends encrypted data through a specific URL.
70-
- Goal: Detect threats from a HostName with RequestURI **"/secret/path"**.
71-
- Create query:
67+
1. Example Scenario: A user sends encrypted data through a specific URL.
68+
2. Goal: Detect threats from a HostName with RequestURI **"/secret/path"**.
69+
3. Create query:
7270

7371
```bash
7472
# Example Query
@@ -82,8 +80,8 @@ In this QuickStart guide, you set up:
8280
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<img src="./media/siem-integration-with-sentinel/entity-mapping.png" alt="A screenshot of the entity mapping." width="80%">
8381

8482
8. Set Query Scheduling:
85-
- Run for every 5 hours.
86-
- Look up data for every 5 hours.
83+
1. Run for every 5 hours.
84+
2. Look up data for every 5 hours.
8785
9. **Review + Create**.
8886

8987

@@ -109,18 +107,18 @@ In this QuickStart guide, you set up:
109107
3. Click **View Full Details**.
110108
4. Select **Investigate**.
111109
112-
![A screenshot of investigate.](./media/siem-integration-with-sentinel/investigate.png)
110+
[ ![A screenshot of investigate.](./media/siem-integration-with-sentinel/investigate.png) ](./media/siem-integration-with-sentinel/investigate.png#lightbox)
113111
114112
> [!Note]
115113
> The **Investigate** option will only show up if the incident has any linked entities.
116114
117115
5. In Investigate, you can visualize the associated entities and similar alerts.
118116
119-
[![A screenshot of monitoring metrics.](./media/siem-integration-with-sentinel/mapping.png)](./media/siem-integration-with-sentinel/mapping.png#lightbox)
117+
[![A screenshot of monitoring metrics.](./media/siem-integration-with-sentinel/mapping.png) ](./media/siem-integration-with-sentinel/mapping.png#lightbox)
120118
121119
6. Click on the entity to view **Insights** and delve deeper into the investigation.
122120
123-
![A screenshot of the insights.](./media/siem-integration-with-sentinel/insights.png)
121+
[ ![A screenshot of the insights.](./media/siem-integration-with-sentinel/insights.png) ](./media/siem-integration-with-sentinel/insights.png#lightbox)
124122
125123
126124
[Automate Playbook and Alerts](../../azure-monitor/../sentinel/automation/automation.md) to create an alert for extra security measures and communication.

0 commit comments

Comments
 (0)