You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sample-workspace-designs.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,10 +63,10 @@ The Contoso Operations team needs to have access to all the logs that they curre
63
63
Constoso's solution includes the following considerations:
64
64
65
65
- Contoso already has an existing workspace, and they'd like to explore enabling Microsoft Sentinel in that same workspace.
66
-
- Contoso has regulatory requirements, so we need at least one Microsoft Sentinel workspace in Europe.
67
-
-Contoso has two different Microsoft Entra tenants, and collects from tenant-level data sources, like Office 365 and Microsoft Entra sign-in and audit logs, so we need at least one workspace per tenant.
68
-
- Contoso does need to collect non-SOC data, although there isn't any overlap between SOC and non-SOC data. Also, SOC data accounts for approximately 250 GB/day, so they should use separate workspaces for the sake of cost efficiency.
69
-
-Most Contoso's VMs are the EU North region, where they already have a workspace. Therefore, in this case, bandwidth costs aren't a concern.
66
+
- Contoso has [regulatory requirements](/azure/azure-monitor/logs/workspace-design#azure-regions), so we need at least one Microsoft Sentinel workspace in Europe.
67
+
-Most of Contoso's VMs are the EU North region, where they already have a workspace. Therefore, in this case, bandwidth costs aren't a concern.
68
+
- Contoso has [two different Microsoft Entra tenants](/azure/azure-monitor/logs/workspace-design#multiple-tenant-strategies), and collects from tenant-level data sources, like Office 365 and Microsoft Entra sign-in and audit logs, and we need at least one workspace per tenant.
69
+
- Contoso does need to collect [non-SOC data](/azure/azure-monitor/logs/workspace-design#operational-and-security-data), although there isn't any overlap between SOC and non-SOC data. Also, SOC data accounts for approximately 250 GB/day, so they should use separate workspaces for the sake of cost efficiency.
70
70
- Contoso has a single SOC team that will be using Microsoft Sentinel, so no extra separation is needed.
71
71
- All members of Contoso's SOC team will have access to all the data, so no extra separation is needed.
72
72
@@ -132,15 +132,15 @@ Fabrikam's solution includes the following considerations:
132
132
133
133
- Fabrikam has a single-tenant environment, and wouldn't need separate workspaces per tenant.
134
134
135
-
- However, Fabrikam will need separate workspaces for their SOC and Operations teams.
135
+
- However, Fabrikam will need separate workspaces for their [SOC and Operations teams](/azure/azure-monitor/logs/workspace-design#operational-and-security-data).
136
136
137
137
The Fabrikam Operations team needs to collect performance data, from both VMs and AKS. Since AKS is based on diagnostic settings, they can select specific logs to send to specific workspaces. Fabrikam can choose to send AKS audit logs to the Microsoft Sentinel workspace, and all AKS logs to a separate workspace, where Microsoft Sentinel isn't enabled. In the workspace where Microsoft Sentinel isn't enabled, Fabrikam will enable the Container Insights solution.
138
138
139
139
For Windows VMs, Fabrikam can use the [Azure Monitoring Agent (AMA)](connect-windows-security-events.md#connector-options) to split the logs, sending security events to the Microsoft Sentinel workspace, and performance and Windows events to the workspace without Microsoft Sentinel.
140
140
141
141
Fabrikam chooses to consider their overlapping data, such as security events and Azure activity events, as SOC data only, and sends this data to the workspace with Microsoft Sentinel.
142
142
143
-
- Fabrikam needs to control access for overlapping data, including security events and Azure activity events, but there's no row-level requirement. Since security events and Azure activity events aren't custom logs, Fabrikam can use table-level RBAC to grant access to these two tables for the Operations team.
143
+
- Fabrikam needs to control access for overlapping data, including security events and Azure activity events, but there's no row-level requirement. Since security events and Azure activity events aren't custom logs, Fabrikam can use [table-level RBAC](/azure/azure-monitor/logs/workspace-design#data-access-control) to grant access to these two tables for the Operations team.
144
144
145
145
The resulting Microsoft Sentinel workspace design for Fabrikam is illustrated in the following image, including only key log sources for the sake of design simplicity:
146
146
@@ -186,7 +186,7 @@ Azure VMs are scattered across the three continents, but bandwidth costs aren't
186
186
187
187
Adventure Works has a single, centralized SOC team that oversees security operations for all the different sub-entities.
188
188
189
-
Adventure Works also has three independent SOC teams, one for each of the continents. Each continent's SOC team should be able to access only the data generated within its region, without seeing data from other continents. For example, the Asia SOC team should only access data from Azure resources deployed in Asia, Microsoft Entra Sign-ins from the Asia tenant, and Defender for Endpoint logs from it’s the Asia tenant.
189
+
Adventure Works also has three independent SOC teams, one for each of the continents. Each continent's SOC team should be able to access [only the data generated within its region](/azure/azure-monitor/logs/workspace-design#azure-regions), without seeing data from other continents. For example, the Asia SOC team should only access data from Azure resources deployed in Asia, Microsoft Entra Sign-ins from the Asia tenant, and Defender for Endpoint logs from it’s the Asia tenant.
190
190
191
191
Each continent's SOC team needs to access the full Microsoft Sentinel portal experience.
192
192
@@ -236,6 +236,7 @@ In this example, you'd have a cost savings of $1,000 per month by combining both
236
236
237
237
This example is relevant only when both SOC and non-SOC data each have an ingestion size of >=50 GB/day and <100 GB/day.
238
238
239
+
For more information, see [Operational and security data](/azure/azure-monitor/logs/workspace-design#operational-and-security-data).
0 commit comments