You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/siem-integration-with-sentinel.md
+28-30Lines changed: 28 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,17 +15,16 @@ ms.author: greglin
15
15
By creating a SIEM integration with Application Gateway for Containers and Azure Sentinel, you streamline the security data collection across your digital environment. By following our QuickStart guide, you effortlessly set up Microsoft Sentinel to work in tandem with the Application Gateway for Container Access Logs. This setup allows you to monitor, detect, and examine potential threats and alerts generated from logs with precision. Additionally, by incorporating a solution from the content hub and configuring a data connector, you start importing access logs into Microsoft Sentinel without a hitch. To cap it off, you establish analytical rules, conduct test alerts, and utilize visualization tools for alerts, ensuring comprehensive oversight of your security landscape.
16
16
17
17
In this QuickStart guide, you set up:
18
-
1. Integrate a log analytics workspace.
19
-
2. Configure a data connector into Microsoft Sentinel.
20
-
3. Establish an analytical rule, conduct a test alert, and visualize an alert for comprehensive oversight.
21
-
22
-

18
+
- Integrate a log analytics workspace.
19
+
- Configure a data connector into Microsoft Sentinel.
20
+
- Establish an analytical rule, conduct a test alert, and visualize an alert for comprehensive oversight.
21
+
[](./media/siem-integration-with-sentinel/sentinel-arch.png#lightbox)
23
22
24
23
## Learn About The Services
25
-
1.[What is Azure Sentinel?](../../sentinel/overview.md)
26
-
1. Why use Sentinel: Sentinel provides security content packaged in SIEM solutions that enable you to ingest data, monitor, alert, hunt, investigate, respond, and connect with different products and platforms such as Log Analytics Workspace.
27
-
2.[What is Azure Log Analytics Workspace?](../../azure-monitor/logs/log-analytics-workspace-overview.md)
28
-
1. Why use Log Analytics Workspace: Log Analytics workspace scales with your business needs, handling large volumes of log data efficiently and detects and diagnose issues quickly.
24
+
-[What is Azure Sentinel?](../../sentinel/overview.md)
25
+
- Why use Sentinel: Sentinel provides security content packaged in SIEM solutions that enable you to ingest data, monitor, alert, hunt, investigate, respond, and connect with different products and platforms such as Log Analytics Workspace.
26
+
-[What is Azure Log Analytics Workspace?](../../azure-monitor/logs/log-analytics-workspace-overview.md)
27
+
- Why use Log Analytics Workspace: Log Analytics workspace scales with your business needs, handling large volumes of log data efficiently and detects and diagnose issues quickly.
29
28
30
29
## Prerequisites
31
30
@@ -37,23 +36,22 @@ In this QuickStart guide, you set up:
- In **Search resources, service, and docs**, type **Application Gateways for Containers**.
41
-
- Go to your selected Application Gateway for Container Resource.
42
-
- Go to Diagnostic Setting under Monitoring:
43
-
- Select a name, check box **allLogs** which include the Application Gateway for Container Access Logs.
44
-
- Select **Send to Log analytics Workspace** with your desired subscription and your log analytics workspace.
45
-
46
-

39
+
1. In **Search resources, service, and docs**, type **Application Gateways for Containers**.
40
+
2. Go to your selected Application Gateway for Container Resource.
41
+
3. Go to Diagnostic Setting under Monitoring:
42
+
1. Select a name, check box **allLogs** which include the Application Gateway for Container Access Logs.
43
+
2. Select **Send to Log analytics Workspace** with your desired subscription and your log analytics workspace.
44
+
[](./media/siem-integration-with-sentinel/logging.png#lightbox)
47
45
48
46
> [!NOTE]
49
47
> It takes a few minutes for AccessLogs to populate into your log analytics workspace.
50
48
51
-
4. View data ingested to Microsoft Sentinel:
52
-
- In **Search resources, service, and docs**, type **Azure Sentinel**.
53
-
- Go to your selected Sentinel Resource.
54
-
- Select **Logs**.
55
-
-On the left-side bar, go to **Tables** where a section called **LogManagement** appear with digested access logs.
56
-
- Preview all logs by hovering over access logs and click **Run**.
49
+
3. View data ingested to Microsoft Sentinel:
50
+
1. In **Search resources, service, and docs**, type **Azure Sentinel**.
51
+
2. Go to your selected Sentinel Resource.
52
+
3. Select **Logs**.
53
+
4.On the left-side bar, go to **Tables** where a section called **LogManagement** appear with digested access logs.
54
+
5. Preview all logs by hovering over access logs and click **Run**.
57
55

58
56
59
57
## Create Analytics Rule
@@ -66,9 +64,9 @@ In this QuickStart guide, you set up:
66
64

67
65
68
66
6. Create rule query based on your access logs:
69
-
- Example Scenario: A user sends encrypted data through a specific URL.
70
-
- Goal: Detect threats from a HostName with RequestURI **"/secret/path"**.
71
-
- Create query:
67
+
1. Example Scenario: A user sends encrypted data through a specific URL.
68
+
2. Goal: Detect threats from a HostName with RequestURI **"/secret/path"**.
69
+
3. Create query:
72
70
73
71
```bash
74
72
# Example Query
@@ -82,8 +80,8 @@ In this QuickStart guide, you set up:
82
80
<img src="./media/siem-integration-with-sentinel/entity-mapping.png" alt="A screenshot of the entity mapping." width="80%">
83
81
84
82
8. Set Query Scheduling:
85
-
- Run for every 5 hours.
86
-
- Look up data for every 5 hours.
83
+
1. Run for every 5 hours.
84
+
2. Look up data for every 5 hours.
87
85
9. **Review + Create**.
88
86
89
87
@@ -109,18 +107,18 @@ In this QuickStart guide, you set up:
109
107
3. Click **View Full Details**.
110
108
4. Select **Investigate**.
111
109
112
-

110
+
[  ](./media/siem-integration-with-sentinel/investigate.png#lightbox)
113
111
114
112
> [!Note]
115
113
> The **Investigate** option will only show up if the incident has any linked entities.
116
114
117
115
5. In Investigate, you can visualize the associated entities and similar alerts.
118
116
119
-
[](./media/siem-integration-with-sentinel/mapping.png#lightbox)
117
+
[](./media/siem-integration-with-sentinel/mapping.png#lightbox)
120
118
121
119
6. Click on the entity to view **Insights** and delve deeper into the investigation.
122
120
123
-

121
+
[  ](./media/siem-integration-with-sentinel/insights.png#lightbox)
124
122
125
123
126
124
[Automate Playbook and Alerts](../../azure-monitor/../sentinel/automation/automation.md) to create an alert for extra security measures and communication.
0 commit comments