Skip to content

Commit c3a7708

Browse files
authored
Merge pull request #177320 from yelevin/yelevin/sec-events-ga
Security events connector GA
2 parents 4c78e58 + b9c6007 commit c3a7708

File tree

3 files changed

+17
-8
lines changed

3 files changed

+17
-8
lines changed

articles/sentinel/connect-windows-security-events.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The Windows Security Events connector supports the following versions:
3131
|Connector version |Description |
3232
|---------|---------|
3333
|**Security events** |Legacy version, based on the Log Analytics Agent, and sometimes known as the Microsoft Monitoring Agent (MMA) or the OMS agent. <br><br>Limited to 10,000 events per second. To ensure optimal performance, make sure to keep to 8,500 events per second or fewer. |
34-
|**Windows Security Events** |Newer version, currently in preview, and based on the Azure Monitor Agent (AMA.) <br><br>Supports additional features, such as pre-ingestion log filtering and individual data collection rules for certain groups of machines. |
34+
|**Windows Security Events** |Newer version **(now in general availability!)** based on the Azure Monitor Agent (AMA.) <br><br>Supports additional features, such as pre-ingestion log filtering and individual data collection rules for certain groups of machines. |
3535
| | |
3636

3737

@@ -66,9 +66,9 @@ You can select which events to stream from among the following sets: <a name="ev
6666
6767
# [Azure Monitor Agent (New)](#tab/AMA)
6868

69-
> [!IMPORTANT]
69+
> [!NOTE]
7070
>
71-
> - The Windows Security Events data connector based on the Azure Monitor Agent (AMA) is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
71+
> - The Windows Security Events data connector based on the Azure Monitor Agent (AMA) has now been released into general availability.
7272
7373
The [Azure Monitor agent](../azure-monitor/agents/azure-monitor-agent-overview.md) uses **Data collection rules (DCR)** to define the data to collect from each agent. Data collection rules let you manage collection settings at scale while still allowing unique, scoped configurations for subsets of machines. They are independent of the workspace and independent of the virtual machine, which means they can be defined once and reused across machines and environments. See [Configure data collection for the Azure Monitor agent](../azure-monitor/agents/data-collection-rule-azure-monitor-agent.md).
7474

@@ -168,8 +168,8 @@ You'll see all your data collection rules (including those created through the A
168168
> Get-WinEvent -LogName 'Application' -FilterXPath $XPath
169169
> ```
170170
> - If events are returned, the query is valid.
171-
> - If you receive the message No events were found that match the specified selection criteria., the query may be valid, but there are no matching events on the local machine.
172-
> - If you receive the message The specified query is invalid , the query syntax is invalid.
171+
> - If you receive the message "*No events were found that match the specified selection criteria*," the query may be valid, but there are no matching events on the local machine.
172+
> - If you receive the message "*The specified query is invalid*," the query syntax is invalid.
173173
174174
### Create data collection rules using the API
175175

articles/sentinel/data-connectors-reference.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1327,7 +1327,7 @@ If a longer timeout duration is required, consider upgrading to an [App Service
13271327
| | |
13281328
13291329
1330-
## Security events (Windows)
1330+
## Security events via Legacy Agent (Windows)
13311331
13321332
| Connector attribute | Description |
13331333
| --- | --- |
@@ -1338,6 +1338,8 @@ If a longer timeout duration is required, consider upgrading to an [App Service
13381338
13391339
For more information, see [Insecure protocols workbook setup](./get-visibility.md#use-built-in-workbooks).
13401340
1341+
See also: [**Windows Security Events via AMA**](#windows-security-events-via-ama) connector based on Azure Monitor Agent (AMA)
1342+
13411343
## SentinelOne (Preview)
13421344
13431345
| Connector attribute | Description |
@@ -1565,15 +1567,17 @@ Follow the instructions to obtain the credentials.
15651567
| **Supported by** | Microsoft |
15661568
| | |
15671569
1568-
## Windows security events
1570+
## Windows security events via AMA
15691571
15701572
| Connector attribute | Description |
15711573
| --- | --- |
1572-
| **Data ingestion method** | **Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md)** (Top connector article) |
1574+
| **Data ingestion method** | **Azure service-to-service integration: <br>[Connect to Windows servers to collect security events](connect-windows-security-events.md?tabs=AMA)** (Top connector article) |
15731575
| **Log Analytics table(s)** | SecurityEvents |
15741576
| **Supported by** | Microsoft |
15751577
| | |
15761578
1579+
See also: [**Security events via legacy agent**](#security-events-via-legacy-agent-windows) connector.
1580+
15771581
## Workplace from Facebook (Preview)
15781582
15791583
| Connector attribute | Description |

articles/sentinel/whats-new.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,16 @@ If you're looking for items older than six months, you'll find them in the [Arch
3030
3131
## October 2021
3232

33+
- [Windows Security Events connector using Azure Monitor Agent now in GA](#windows-security-events-connector-using-azure-monitor-agent-now-in-ga)
3334
- [Defender for Office 365 events now available in the Microsoft 365 Defender connector (Public preview)](#defender-for-office-365-events-now-available-in-the-microsoft-365-defender-connector-public-preview)
3435
- [Playbook templates and gallery now available (Public preview)](#playbook-templates-and-gallery-now-available-public-preview)
3536
- [Manage template versions for your scheduled analytics rules (Public preview)](#manage-template-versions-for-your-scheduled-analytics-rules-public-preview)
3637
- [DHCP normalization schema (Public preview)](#dhcp-normalization-schema-public-preview)
3738

39+
### Windows Security Events connector using Azure Monitor Agent now in GA
40+
41+
The new version of the Windows Security Events connector, based on the Azure Monitor Agent, is now generally available! See [Connect to Windows servers to collect security events](connect-windows-security-events.md?tabs=AMA) for more information.
42+
3843
### Defender for Office 365 events now available in the Microsoft 365 Defender connector (Public preview)
3944

4045
In addition to those from Microsoft Defender for Endpoint, you can now ingest raw [advanced hunting events](/microsoft-365/security/defender/advanced-hunting-overview) from [Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/overview) through the [Microsoft 365 Defender connector](connect-microsoft-365-defender.md). [Learn more](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).

0 commit comments

Comments
 (0)