Skip to content

Commit c6b2798

Browse files
authored
Merge pull request #289728 from batamig/patch-79310
Update ama-migrate.md
2 parents bd87f7a + c2122bf commit c6b2798

File tree

4 files changed

+28
-39
lines changed

4 files changed

+28
-39
lines changed

articles/sentinel/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -679,11 +679,11 @@
679679
items:
680680
- name: Connect Microsoft Sentinel to Microsoft connectors
681681
href: connect-azure-windows-microsoft-services.md
682-
- name: API-based connection
682+
- name: Connect via API-based connectors
683683
href: connect-services-api-based.md
684-
- name: Diagnostic settings-based connection
684+
- name: Connect via diagnostic settings-based connectors
685685
href: connect-services-diagnostic-setting-based.md
686-
- name: Windows agent-based connection
686+
- name: Connect via Windows agent-based connectors
687687
href: connect-services-windows-based.md
688688
- name: Azure Functions API connection
689689
href: connect-azure-functions-template.md

articles/sentinel/ama-migrate.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ The Log Analytics agent is [retired as of 31 August, 2024](https://azure.microso
2121

2222
- Start with the [Azure Monitor documentation](/azure/azure-monitor/agents/azure-monitor-agent-migration), which provides an agent comparison and general information for this migration process. This article provides specific details and differences for Microsoft Sentinel.
2323

24-
25-
## Recommended migration plan
24+
## Migrate to the Azure Monitor Agent
2625

2726
Each organization will have different metrics of success and internal migration processes. This section provides suggested guidance to consider when migrating from the Log Analytics MMA/OMS agent to the AMA, specifically for Microsoft Sentinel.
2827

articles/sentinel/connect-services-api-based.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This article presents information that is common to the group of API-based data
3939

4040

4141

42-
## Instructions
42+
## Connect to Microsoft services via API-based connectors
4343

4444
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
4545

@@ -51,7 +51,7 @@ This article presents information that is common to the group of API-based data
5151

5252
You can find and query the data for each service using the table names that appear in the section for the service's connector in the [Data connectors reference](data-connectors-reference.md) page.
5353

54-
## Next steps
54+
## Related content
5555

5656
For more information, see:
5757

articles/sentinel/connect-services-diagnostic-setting-based.md

Lines changed: 22 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,25 @@ This article presents information that is common to the group of data connectors
1919

2020
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2121

22-
## Standalone diagnostic settings-based connectors
22+
## Prerequisites
2323

24-
This section covers prerequisites and general installation instructions for the group of data connectors that use standalone diagnostic settings-based connections.
24+
To ingest data into Microsoft Sentinel using a standalone, diagnostic settings-based connector, you must have read and write permissions on the Log Analytics workspace enabled for Microsoft Sentinel.
2525

26-
### Prerequisites
26+
To ingest data into Microsoft Sentinel using diagnostic settings-based connectors managed by Azure Policy, you must also have the following prerequisites:
2727

28-
To ingest data into Microsoft Sentinel:
28+
- To use Azure Policy to apply a log streaming policy to your resources, you must have the Owner role for the policy assignment scope.
29+
30+
- The following prerequisites, depending on which connector you're using:
2931

30-
- You must have read and write permissions on the Microsoft Sentinel workspace.
32+
|Data connector |Licensing, costs, and other information |
33+
|---------|---------|
34+
|**Azure Activity**| This connector now uses the diagnostic settings pipeline. If you're using the legacy method, you must disconnect the existing subscriptions from the legacy method before setting up the new Azure Activity log connector.<br><br>1. From the Microsoft Sentinel navigation menu, select **Data connectors**. From the list of connectors, select **Azure Activity**, and then select the **Open connector page** button on the lower right.<br>2. Under the **Instructions** tab, in the **Configuration** section, in step 1, review the list of your existing subscriptions that are connected to the legacy method, and disconnect them all at once by clicking the **Disconnect All** button below.<br>3. Continue setting up the new connector with the instructions in this section. |
35+
|**Azure DDoS Protection**|- Configured [Azure DDoS Standard protection plan](../ddos-protection/manage-ddos-protection.md#create-a-ddos-protection-plan).<br>- Configured [virtual network with Azure DDoS Standard enabled](../ddos-protection/manage-ddos-protection.md#enable-for-a-new-virtual-network)<br>- Other charges may apply<br>- The **Status** for Azure DDoS Protection Data Connector changes to **Connected** only when the protected resources are under a DDoS attack.|
36+
|**Azure Storage Account**|The storage account (parent) resource has within it other (child) resources for each type of storage: files, tables, queues, and blobs. </br>When configuring diagnostics for a storage account, you must select and configure: <br><br>- The parent account resource, exporting the **Transaction** metric.<br>- Each of the child storage-type resources, exporting all the logs and metrics.<br><br>You'll only see the storage types that you actually have defined resources for.|
3137

32-
### Instructions
38+
## Connect via a standalone diagnostic settings-based connector
39+
40+
This procedure describes how to connect to Microsoft Sentinel using data connectors that use standalone connections based on diagnostic settings.
3341

3442
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
3543

@@ -45,35 +53,17 @@ To ingest data into Microsoft Sentinel:
4553

4654
1. In the **Diagnostics settings** screen, enter a name in the **Diagnostic settings name** field.
4755

48-
Mark the **Send to Log Analytics** check box. Two new fields will be displayed below it. Choose the relevant **Subscription** and **Log Analytics Workspace** (where Microsoft Sentinel resides).
56+
Mark the **Send to Log Analytics** check box. Two new fields are displayed below it. Choose the relevant **Subscription** and **Log Analytics Workspace** (where Microsoft Sentinel resides).
4957

5058
1. Mark the check boxes of the types of logs and metrics you want to collect. See our recommended choices for each resource type in the section for the resource's connector in the [Data connectors reference](data-connectors-reference.md) page.
5159

5260
1. Select **Save** at the top of the screen.
5361

5462
For more information, see also [Create diagnostic settings to send Azure Monitor platform logs and metrics to different destinations](/azure/azure-monitor/essentials/diagnostic-settings) in the Azure Monitor documentation.
5563

56-
## Azure Policy managed diagnostic settings-based connectors
57-
58-
This section covers prerequisites and general installation instructions for the group of data connectors that use Azure Policy managed diagnostic settings-based connections.
59-
60-
### Prerequisites
61-
62-
To ingest data into Microsoft Sentinel:
63-
64-
- You must have read and write permissions on the Microsoft Sentinel workspace.
65-
66-
- To use Azure Policy to apply a log streaming policy to your resources, you must have the Owner role for the policy assignment scope.
67-
68-
- Data connector specific requirements:
69-
70-
|Data connector |Licensing, costs, and other information |
71-
|---------|---------|
72-
|Azure Activity| This connector now uses the diagnostic settings pipeline. If you're using the legacy method, you must disconnect the existing subscriptions from the legacy method before setting up the new Azure Activity log connector.<br><br>1. From the Microsoft Sentinel navigation menu, select **Data connectors**. From the list of connectors, select **Azure Activity**, and then select the **Open connector page** button on the lower right.<br>2. Under the **Instructions** tab, in the **Configuration** section, in step 1, review the list of your existing subscriptions that are connected to the legacy method, and disconnect them all at once by clicking the **Disconnect All** button below.<br>3. Continue setting up the new connector with the instructions in this section. |
73-
|Azure DDoS Protection|- Configured [Azure DDoS Standard protection plan](../ddos-protection/manage-ddos-protection.md#create-a-ddos-protection-plan).<br>- Configured [virtual network with Azure DDoS Standard enabled](../ddos-protection/manage-ddos-protection.md#enable-for-a-new-virtual-network)<br>- Other charges may apply<br>- The **Status** for Azure DDoS Protection Data Connector changes to **Connected** only when the protected resources are under a DDoS attack.|
74-
|Azure Storage Account|The storage account (parent) resource has within it other (child) resources for each type of storage: files, tables, queues, and blobs.</br>When configuring diagnostics for a storage account, you must select and configure: <br><br>- The parent account resource, exporting the **Transaction** metric.<br>- Each of the child storage-type resources, exporting all the logs and metrics.<br><br>You will only see the storage types that you actually have defined resources for.|
64+
## Connect via a diagnostic setting-based connector managed by Azure Policy
7565

76-
### Instructions
66+
This procedure describes how to connect to Microsoft Sentinel using data connectors that use connections that are based on diagnostic settings and are managed by Azure Policy.
7767

7868
Connectors of this type use Azure Policy to apply a single diagnostic settings configuration to a collection of resources of a single type, defined as a scope. You can see the log types ingested from a given resource type on the left side of the connector page for that resource, under **Data types**.
7969

@@ -83,27 +73,27 @@ Connectors of this type use Azure Policy to apply a single diagnostic settings c
8373

8474
1. In the **Configuration** section of the connector page, expand any expanders you see there and select the **Launch Azure Policy Assignment wizard** button.
8575

86-
The policy assignment wizard opens, ready to create a new policy, with a policy name pre-populated.
76+
The policy assignment wizard opens, ready to create a new policy, with a policy name prepopulated.
8777

8878
1. In the **Basics** tab, select the button with the three dots under **Scope** to choose your subscription (and, optionally, a resource group). You can also add a description.
8979

9080
1. In the **Parameters** tab:
9181
- Clear the **Only show parameters that require input** check box.
9282
- If you see **Effect** and **Setting name** fields, leave them as is.
9383
- Choose your Microsoft Sentinel workspace from the **Log Analytics workspace** drop-down list.
94-
- The remaining drop-down fields represent the available diagnostic log types. Leave marked as True all the log types you want to ingest.
84+
- The remaining drop-down fields represent the available diagnostic log types. Leave marked as *True* all the log types you want to ingest.
9585

9686
1. The policy will be applied to resources added in the future. To apply the policy on your existing resources as well, select the **Remediation** tab and mark the **Create a remediation task** check box.
9787

9888
1. In the **Review + create** tab, click **Create**. Your policy is now assigned to the scope you chose.
9989

100-
With this type of data connector, the connectivity status indicators (a color stripe in the data connectors gallery and connection icons next to the data type names) will show as *connected* (green) only if data has been ingested at some point in the past 14 days. Once 14 days have passed with no data ingestion, the connector will show as being disconnected. The moment more data comes through, the *connected* status will return.
90+
With this type of data connector, the connectivity status indicators (a color stripe in the data connectors gallery and connection icons next to the data type names) shows as *connected* (green) only if data has been ingested at some point in the past 14 days. Once 14 days have passed with no data ingestion, the connector shows as being disconnected. The moment more data comes through, the *connected* status returns.
10191

10292
You can find and query the data for each resource type using the table name that appears in the section for the resource's connector in the [Data connectors reference](data-connectors-reference.md) page. For more information, see [Create diagnostic settings to send Azure Monitor platform logs and metrics to different destinations](/azure/azure-monitor/essentials/diagnostic-settings?tabs=CMD) in the Azure Monitor documentation.
10393

104-
## Next steps
94+
## Related content
10595

10696
For more information, see:
10797

10898
- [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md)
109-
- [Threat intelligence integration in Microsoft Sentinel](threat-intelligence-integration.md)
99+
- [Threat intelligence integration in Microsoft Sentinel](threat-intelligence-integration.md)

0 commit comments

Comments
 (0)