Skip to content

Commit bf522ba

Browse files
committed
Adding information into notes and removing from what's new
1 parent 875c274 commit bf522ba

File tree

5 files changed

+24
-103
lines changed

5 files changed

+24
-103
lines changed

articles/sentinel/cef-name-mapping.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ ms.custom: ignite-fall-2021
1212

1313
The following tables map Common Event Format (CEF) field names to the names they use in Microsoft Sentinel's CommonSecurityLog, and may be helpful when you are working with a CEF data source in Microsoft Sentinel.
1414

15+
> [!IMPORTANT]
16+
>
17+
> On **February 28th 2023**, we will introduce [changes to the CommonSecurityLog table schema](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/upcoming-changes-to-the-commonsecuritylog-table/ba-p/3643232). This means that custom queries will require being reviewed and updated. Out-of-the-box content (detections, hunting queries, workbooks, parsers, etc.) will be updated by Microsoft Sentinel.
18+
1519
For more information, see [Connect your external solution using Common Event Format](connect-common-event-format.md).
1620

1721
> [!NOTE]

articles/sentinel/connect-cef-ama.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,16 +14,18 @@ This article describes how to use the **Common Event Format (CEF) via AMA** conn
1414

1515
The connector uses the Azure Monitor Agent (AMA), which uses Data Collection Rules (DCRs). With DCRs, you can filter the logs before they're ingested, for quicker upload, efficient analysis, and querying.
1616

17+
> [!IMPORTANT]
18+
>
19+
> The CEF via AMA connector is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
20+
1721
The AMA is installed on a Linux machine that acts as a log forwarder, and the AMA collects the logs in the CEF format.
1822

1923
- [Set up the connector](#set-up-the-common-event-format-cef-via-ama-connector)
2024
- [Learn more about the connector](#how-collection-works-with-the-common-event-format-cef-via-ama-connector)
2125

2226
> [!IMPORTANT]
23-
> The CEF via AMA connector is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
24-
25-
> [!NOTE]
26-
> On February 28th 2023, we will introduce [changes to the CommonSecurityLog table schema](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/upcoming-changes-to-the-commonsecuritylog-table/ba-p/3643232). This means that custom queries will require being reviewed and updated. Out-of-the-box content (detections, hunting queries, workbooks, parsers, etc.) will be updated by Microsoft Sentinel.
27+
>
28+
> On **February 28th 2023**, we will introduce [changes to the CommonSecurityLog table schema](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/upcoming-changes-to-the-commonsecuritylog-table/ba-p/3643232). This means that custom queries will require being reviewed and updated. Out-of-the-box content (detections, hunting queries, workbooks, parsers, etc.) will be updated by Microsoft Sentinel.
2729
2830
## Overview
2931

articles/sentinel/connect-common-event-format.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,12 @@ ms.custom: ignite-fall-2021
1515
Many networking and security devices and appliances send their system logs over the Syslog protocol in a specialized format known as Common Event Format (CEF). This format includes more information than the standard Syslog format, and it presents the information in a parsed key-value arrangement. The Log Analytics Agent accepts CEF logs and formats them especially for use with Microsoft Sentinel, before forwarding them on to your Microsoft Sentinel workspace.
1616

1717
> [!IMPORTANT]
18-
> The Log Analytics agent will be [retired on **31 August, 2024**](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). If you are using the Log Analytics agent in your Microsoft Sentinel deployment, we recommend that you start planning your migration to the AMA. For more information, see [AMA migration for Microsoft Sentinel](ama-migrate.md).
18+
>
19+
> Upcoming changes:
20+
> - On **February 28th, 2023** we will introduce [changes to the CommonSecurityLog table schema](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/upcoming-changes-to-the-commonsecuritylog-table/ba-p/3643232).
21+
> - This means that custom queries will require review and update. Out-of-the-box content (detections, hunting queries, workbooks, parsers, etc.) will be updated by Microsoft Sentinel.
22+
> - Data that has been streamed and ingested before the change will still be available in its former columns and formats. Old columns will therefore remain in the schema.
23+
> - On **31 August, 2024**, the [Log Analytics agent will be retired](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). If you are using the Log Analytics agent in your Microsoft Sentinel deployment, we recommend that you start planning your migration to the AMA. For more information, see [AMA migration for Microsoft Sentinel](ama-migrate.md).
1924
2025
This article describes the process of using CEF-formatted logs to connect your data sources. For information about data connectors that use this method, see [Microsoft Sentinel data connectors reference](data-connectors-reference.md).
2126

articles/sentinel/troubleshooting-cef-syslog.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ For more information, see [Connect your external solution using Common Event For
2020

2121
If you've deployed your connector using a method different than the documented procedure and are having issues, we recommend that you purge the deployment and install again as documented.
2222

23+
> [!IMPORTANT]
24+
>
25+
> On **February 28th 2023**, we will introduce [changes to the CommonSecurityLog table schema](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/upcoming-changes-to-the-commonsecuritylog-table/ba-p/3643232). This means that custom queries will require being reviewed and updated. Out-of-the-box content (detections, hunting queries, workbooks, parsers, etc.) will be updated by Microsoft Sentinel.
26+
2327
## How to use this article
2428

2529
When information in this article is relevant only for Syslog or only for CEF connectors, we've organized the page into tabs. Make sure that you're using the instructions on the correct tab for your connector type.

articles/sentinel/whats-new.md

Lines changed: 4 additions & 98 deletions
Original file line numberDiff line numberDiff line change
@@ -119,23 +119,9 @@ A [new version of the Microsoft Sentinel Logstash plugin](connect-logstash-data-
119119

120120
## Announcements
121121

122-
- [CEF schema changes: Upcoming changes to the CommonSecurityLog table](#cef-schema-changes-upcoming-changes-to-the-commonsecuritylog-table)
123122
- [Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
124123
- [Name fields removed from UEBA UserPeerAnalytics table](#name-fields-removed-from-ueba-userpeeranalytics-table)
125124

126-
### CEF schema changes: Upcoming changes to the CommonSecurityLog table    
127-
128-
On February 28th, 2023 we will introduce changes to the [CommonSecurityLog](/azure-monitor/reference/tables/commonsecuritylog) table schema. This means that custom queries will require review and update. Out-of-the-box content (detections, hunting queries, workbooks, parsers, etc.) will be updated by Microsoft Sentinel.
129-
130-
Data that has been streamed and ingested before the change will still be available in its former columns and formats. Old columns will therefore remain in the schema.
131-
132-
#### Why are we making this change?
133-
134-
- Several fields, previously defined to be of type Integer, were updated in the ArcSight CEF standard revision, to be of other types. By changing the column data types from `System.Int32` to `System.Int64`, we will allow larger values to populate the column that would have been with the previous data type when their length exceeded the column limit.
135-
- We're fixing escaped characters: CEF requires escaping for special characters such as the equal sign and the backslash to be valid. Up to this maintenance work, the backslash escaping character was not removed from events streaming into the CommonSecurityLog table. This escaping character will now be removed before the event is ingested and stored in the table.
136-
137-
Read more about these [schema changes](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/upcoming-changes-to-the-commonsecuritylog-table/ba-p/3643232).
138-
139125
### Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)
140126

141127
As of **October 24, 2022**, [Microsoft 365 Defender](/microsoft-365/security/defender/) integrates [Azure Active Directory Identity Protection (AADIP)](../active-directory/identity-protection/index.yml) alerts and incidents. Customers can choose between three levels of integration:
@@ -199,66 +185,11 @@ In the meantime, or if you've built any custom queries or rules directly referen
199185
| project-away AadTenantId, AadUserId, AccountTenantId, AccountObjectId
200186
```
201187
202-
For information on looking up data to replace enrichment fields removed from the UEBA UserPeerAnalytics table, See [Heads up: Name fields being removed from UEBA UserPeerAnalytics table](#name-fields-removed-from-ueba-userpeeranalytics-table) for a sample query.
203-
204-
### Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)
205-
206-
As of **October 24, 2022**, [Microsoft 365 Defender](/microsoft-365/security/defender/) will be integrating [Azure Active Directory Identity Protection (AADIP)](../active-directory/identity-protection/index.yml) alerts and incidents. Customers can choose between three levels of integration:
207-
208-
- **Show high-impact alerts only (Default)** includes only alerts about known malicious or highly suspicious activities that might require attention. These alerts are chosen by Microsoft security researchers and are mostly of Medium and High severities.
209-
- **Show all alerts** includes all AADIP alerts, including activity that might not be unwanted or malicious.
210-
- **Turn off all alerts** disables any AADIP alerts from appearing in your Microsoft 365 Defender incidents.
211-
212-
Microsoft Sentinel customers (who are also AADIP subscribers) with [Microsoft 365 Defender integration](microsoft-365-defender-sentinel-integration.md) enabled will automatically start receiving AADIP alerts and incidents in their Microsoft Sentinel incidents queue. Depending on your configuration, this may affect you as follows:
213-
214-
- If you already have your AADIP connector enabled in Microsoft Sentinel, and you've enabled incident creation, you may receive duplicate incidents. To avoid this, you have a few choices, listed here in descending order of preference:
215-
216-
| Preference | Action in Microsoft 365 Defender | Action in Microsoft Sentinel |
217-
| - | - | - |
218-
| **1** | Keep the default AADIP integration of **Show high-impact alerts only**. | Disable any [**Microsoft Security** analytics rules](detect-threats-built-in.md) that create incidents from AADIP alerts. |
219-
| **2** | Choose the **Show all alerts** AADIP integration. | Create automation rules to automatically close incidents with unwanted alerts.<br><br>Disable any [**Microsoft Security** analytics rules](detect-threats-built-in.md) that create incidents from AADIP alerts. |
220-
| **3** | Don't use Microsoft 365 Defender for AADIP alerts:<br>Choose the **Turn off all alerts** option for AADIP integration. | Leave enabled those [**Microsoft Security** analytics rules](detect-threats-built-in.md) that create incidents from AADIP alerts. |
221-
222-
- If you don't have your [AADIP connector](data-connectors-reference.md#azure-active-directory-identity-protection) enabled, you must enable it. Be sure **not** to enable incident creation on the connector page. If you don't enable the connector, you may receive AADIP incidents without any data in them.
223-
224-
- If you're first enabling your Microsoft 365 Defender connector now, the AADIP connection will be made automatically behind the scenes. You won't need to do anything else.
225-
226-
### Out of the box anomaly detection on the SAP audit log (Preview)
188+
For information on looking up data to replace enrichment fields removed from the UEBA UserPeerAnalytics table, See [Name fields removed from UEBA UserPeerAnalytics table](#name-fields-removed-from-ueba-userpeeranalytics-table) for a sample query.
227189
228-
The Microsoft Sentinel for SAP solution now includes the [**SAP - Dynamic Anomaly Detection analytics** rule](https://aka.ms/Sentinel4sapDynamicAnomalyAuditRuleBlog), adding an out of the box capability to identify suspicious anomalies across the SAP audit log events.
190+
### Name fields removed from UEBA UserPeerAnalytics table
229191
230-
Learn how to [use the new rule for anomaly detection](sap/configure-audit-log-rules.md#anomaly-detection).
231-
232-
### IoT device entity page (Preview)
233-
234-
The new [IoT device entity page](entity-pages.md) is designed to help the SOC investigate incidents that involve IoT/OT devices in their environment, by providing the full OT/IoT context through Microsoft Defender for IoT to Sentinel. This enables SOC teams to detect and respond more quickly across all domains to the entire attack timeline.
235-
236-
Learn more about [investigating IoT device entities in Microsoft Sentinel](iot-advanced-threat-monitoring.md).
237-
238-
## September 2022
239-
240-
- [Create automation rule conditions based on custom details (Preview)](#create-automation-rule-conditions-based-on-custom-details-preview)
241-
- [Add advanced "Or" conditions to automation rules (Preview)](#add-advanced-or-conditions-to-automation-rules-preview)
242-
- [Heads up: Name fields being removed from UEBA UserPeerAnalytics table](#heads-up-name-fields-being-removed-from-ueba-userpeeranalytics-table)
243-
- [Windows DNS Events via AMA connector (Preview)](#windows-dns-events-via-ama-connector-preview)
244-
- [Create and delete incidents manually (Preview)](#create-and-delete-incidents-manually-preview)
245-
- [Add entities to threat intelligence (Preview)](#add-entities-to-threat-intelligence-preview)
246-
247-
### Create automation rule conditions based on custom details (Preview)
248-
249-
You can set the value of a [custom detail surfaced in an incident](surface-custom-details-in-alerts.md) as a condition of an automation rule. Recall that custom details are data points in raw event log records that can be surfaced and displayed in alerts and the incidents generated from them. Through custom details you can get to the actual relevant content in your alerts without having to dig through query results.
250-
251-
Learn how to [add a condition based on a custom detail](create-manage-use-automation-rules.md#conditions-based-on-custom-details-preview).
252-
253-
### Add advanced "Or" conditions to automation rules (Preview)
254-
255-
You can now add OR conditions or condition groups to automation rules. These conditions allow you to combine several rules with identical actions into a single rule, greatly increasing your SOC's efficiency.
256-
257-
For more information, see [Add advanced conditions to Microsoft Sentinel automation rules](add-advanced-conditions-to-automation-rules.md).
258-
259-
### Heads up: Name fields being removed from UEBA UserPeerAnalytics table
260-
261-
As of **September 30, 2022**, the UEBA engine no longer performs automatic lookups of user IDs and resolve them into names. This change resulted in the removal of four name fields from the *UserPeerAnalytics* table:
192+
As of **September 30, 2022**, the UEBA engine no longer performs automatic lookups of user IDs and resolves them into names. This change resulted in the removal of four name fields from the *UserPeerAnalytics* table:
262193
263194
- UserName
264195
- UserPrincipalName
@@ -293,32 +224,7 @@ UserPeerAnalytics
293224
| project AccountTenantId, AccountObjectId, PeerUserPrincipalNameIdentityInfo, PeerUserNameIdentityInfo
294225
) on $left.AADTenantId == $right.AccountTenantId, $left.PeerUserId == $right.AccountObjectId
295226
```
296-
If your original query referenced the user or peer names (not just their IDs), substitute this query in its entirety for the table name (“UserPeerAnalytics”) in your original query.
297-
298-
### Windows DNS Events via AMA connector (Preview)
299-
300-
You can now use the new [Windows DNS Events via AMA connector](connect-dns-ama.md) to stream and filter events from your Windows Domain Name System (DNS) server logs to the `ASimDnsActivityLog` normalized schema table. You can then dive into your data to protect your DNS servers from threats and attacks.
301-
302-
### Create and delete incidents manually (Preview)
303-
304-
Microsoft Sentinel **incidents** have two main sources:
305-
306-
- They are generated automatically by detection mechanisms that operate on the logs and alerts that Sentinel ingests from its connected data sources.
307-
308-
- They are ingested directly from other connected Microsoft security services (such as [Microsoft 365 Defender](microsoft-365-defender-sentinel-integration.md)) that created them.
309-
310-
However, in some cases, data from sources *not ingested into Microsoft Sentinel*, or events not recorded in any log, may justify launching an investigation. For this reason, Microsoft Sentinel now allows security analysts to manually create incidents from scratch for any type of event, regardless of its source or associated data, in order to manage and document the investigation.
311-
312-
Since this capability raises the possibility that you'll create an incident in error, Microsoft Sentinel also allows you to delete incidents right from the portal as well.
313-
314-
- [Learn more about creating incidents manually](create-incident-manually.md).
315-
- [Learn more about deleting incidents](delete-incident.md).
316-
317-
### Add entities to threat intelligence (Preview)
318-
319-
Microsoft Sentinel now allows you to flag entities as malicious, right from within the investigation graph. You'll then be able to view this indicator both in Logs and in the Threat Intelligence blade in Sentinel.
320-
321-
Learn how to [add an entity to your threat intelligence](add-entity-to-threat-intelligence.md).
227+
If your original query referenced the user or peer names (not just their IDs), substitute this query in its entirety for the table name (“UserPeerAnalytics”) in your original query.
322228

323229
## Next steps
324230

0 commit comments

Comments
 (0)