Skip to content

Commit c3b7e25

Browse files
committed
adding xrefs
1 parent 817f6ec commit c3b7e25

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

articles/sentinel/sample-workspace-designs.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -63,10 +63,10 @@ The Contoso Operations team needs to have access to all the logs that they curre
6363
Constoso's solution includes the following considerations:
6464

6565
- Contoso already has an existing workspace, and they'd like to explore enabling Microsoft Sentinel in that same workspace.
66-
- Contoso has regulatory requirements, so we need at least one Microsoft Sentinel workspace in Europe.
67-
- Contoso has two different Microsoft Entra tenants, and collects from tenant-level data sources, like Office 365 and Microsoft Entra sign-in and audit logs, so we need at least one workspace per tenant.
68-
- Contoso does need to collect non-SOC data, although there isn't any overlap between SOC and non-SOC data. Also, SOC data accounts for approximately 250 GB/day, so they should use separate workspaces for the sake of cost efficiency.
69-
- Most Contoso's VMs are the EU North region, where they already have a workspace. Therefore, in this case, bandwidth costs aren't a concern.
66+
- Contoso has [regulatory requirements](/azure/azure-monitor/logs/workspace-design#azure-regions), so we need at least one Microsoft Sentinel workspace in Europe.
67+
- Most of Contoso's VMs are the EU North region, where they already have a workspace. Therefore, in this case, bandwidth costs aren't a concern.
68+
- Contoso has [two different Microsoft Entra tenants](/azure/azure-monitor/logs/workspace-design#multiple-tenant-strategies), and collects from tenant-level data sources, like Office 365 and Microsoft Entra sign-in and audit logs, and we need at least one workspace per tenant.
69+
- Contoso does need to collect [non-SOC data](/azure/azure-monitor/logs/workspace-design#operational-and-security-data), although there isn't any overlap between SOC and non-SOC data. Also, SOC data accounts for approximately 250 GB/day, so they should use separate workspaces for the sake of cost efficiency.
7070
- Contoso has a single SOC team that will be using Microsoft Sentinel, so no extra separation is needed.
7171
- All members of Contoso's SOC team will have access to all the data, so no extra separation is needed.
7272

@@ -132,15 +132,15 @@ Fabrikam's solution includes the following considerations:
132132

133133
- Fabrikam has a single-tenant environment, and wouldn't need separate workspaces per tenant.
134134

135-
- However, Fabrikam will need separate workspaces for their SOC and Operations teams.
135+
- However, Fabrikam will need separate workspaces for their [SOC and Operations teams](/azure/azure-monitor/logs/workspace-design#operational-and-security-data).
136136

137137
The Fabrikam Operations team needs to collect performance data, from both VMs and AKS. Since AKS is based on diagnostic settings, they can select specific logs to send to specific workspaces. Fabrikam can choose to send AKS audit logs to the Microsoft Sentinel workspace, and all AKS logs to a separate workspace, where Microsoft Sentinel isn't enabled. In the workspace where Microsoft Sentinel isn't enabled, Fabrikam will enable the Container Insights solution.
138138

139139
For Windows VMs, Fabrikam can use the [Azure Monitoring Agent (AMA)](connect-windows-security-events.md#connector-options) to split the logs, sending security events to the Microsoft Sentinel workspace, and performance and Windows events to the workspace without Microsoft Sentinel.
140140

141141
Fabrikam chooses to consider their overlapping data, such as security events and Azure activity events, as SOC data only, and sends this data to the workspace with Microsoft Sentinel.
142142

143-
- Fabrikam needs to control access for overlapping data, including security events and Azure activity events, but there's no row-level requirement. Since security events and Azure activity events aren't custom logs, Fabrikam can use table-level RBAC to grant access to these two tables for the Operations team.
143+
- Fabrikam needs to control access for overlapping data, including security events and Azure activity events, but there's no row-level requirement. Since security events and Azure activity events aren't custom logs, Fabrikam can use [table-level RBAC](/azure/azure-monitor/logs/workspace-design#data-access-control) to grant access to these two tables for the Operations team.
144144

145145
The resulting Microsoft Sentinel workspace design for Fabrikam is illustrated in the following image, including only key log sources for the sake of design simplicity:
146146

@@ -186,7 +186,7 @@ Azure VMs are scattered across the three continents, but bandwidth costs aren't
186186

187187
Adventure Works has a single, centralized SOC team that oversees security operations for all the different sub-entities.
188188

189-
Adventure Works also has three independent SOC teams, one for each of the continents. Each continent's SOC team should be able to access only the data generated within its region, without seeing data from other continents. For example, the Asia SOC team should only access data from Azure resources deployed in Asia, Microsoft Entra Sign-ins from the Asia tenant, and Defender for Endpoint logs from it’s the Asia tenant.
189+
Adventure Works also has three independent SOC teams, one for each of the continents. Each continent's SOC team should be able to access [only the data generated within its region](/azure/azure-monitor/logs/workspace-design#azure-regions), without seeing data from other continents. For example, the Asia SOC team should only access data from Azure resources deployed in Asia, Microsoft Entra Sign-ins from the Asia tenant, and Defender for Endpoint logs from it’s the Asia tenant.
190190

191191
Each continent's SOC team needs to access the full Microsoft Sentinel portal experience.
192192

@@ -236,6 +236,7 @@ In this example, you'd have a cost savings of $1,000 per month by combining both
236236

237237
This example is relevant only when both SOC and non-SOC data each have an ingestion size of >=50 GB/day and <100 GB/day.
238238

239+
For more information, see [Operational and security data](/azure/azure-monitor/logs/workspace-design#operational-and-security-data).
239240

240241
## Next steps
241242

0 commit comments

Comments
 (0)