Skip to content

Commit d6fd736

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into bedrock
2 parents 3096367 + 47c8bd1 commit d6fd736

File tree

3 files changed

+28
-24
lines changed

3 files changed

+28
-24
lines changed

articles/azure-vmware/arc-enable-guest-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: references_regions, devx-track-azurecli, engagement-fy23
99

1010
# Enable guest management and install extensions on Arc-enabled VMs
1111

12-
In this article, you learn how to enable guest management and install extensions on Arc-enabled VMs in Azure VMware Solution. Use guest management empowers you to manage the guest operating system of your VM, including installing and managing extensions. This feature is available for Arc-enabled VMware VMs in Azure VMware Solution private clouds.
12+
In this article, you learn how to enable guest management and install extensions on Arc-enabled VMs in Azure VMware Solution. Use guest management to manage the guest operating system of your VM, including installing and managing extensions. This feature is available for Arc-enabled VMware VMs in Azure VMware Solution private clouds.
1313

1414
## Prerequisite
1515

articles/sentinel/connect-azure-active-directory.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Send Microsoft Entra ID data to Microsoft Sentinel
33
description: Learn how to collect data from Microsoft Entra ID, and stream Microsoft Entra sign-in, audit, and provisioning logs into Microsoft Sentinel.
44
author: guywi-ms
55
ms.topic: how-to
6-
ms.date: 03/16/2025
6+
ms.date: 07/03/2025
77
ms.author: guywild
88

99

@@ -13,11 +13,24 @@ ms.author: guywild
1313

1414
# Send data to Microsoft Sentinel using the Microsoft Entra ID data connector
1515

16-
[Microsoft Entra ID](/entra/fundamentals/what-is-entra) logs provide comprehensive information about users, applications, and networks accessing your Entra tenant. This article explains the types of logs you can collect using the Microsoft Entra ID data connector, how to enable the connector to send data to Microsoft Sentinel, and how to find your data in Microsoft Sentinel.
16+
[Microsoft Entra ID](/entra/fundamentals/what-is-entra) logs provide comprehensive information about users, applications, and networks accessing your Microsoft Entra tenant. This article explains the types of logs you can collect using the Microsoft Entra ID data connector, how to enable the connector to send data to Microsoft Sentinel, and how to find your data in Microsoft Sentinel.
17+
18+
19+
## Prerequisites
20+
21+
- A Microsoft Entra Workload ID Premium license is required to stream **[AADRiskyServicePrincipals](/azure/azure-monitor/reference/tables/aadriskyserviceprincipals)** and **[AADServicePrincipalRiskEvents](/azure/azure-monitor/reference/tables/aadserviceprincipalriskevents)** logs to Microsoft Sentinel.
22+
23+
- A Microsoft Entra ID P1 or P2 license is required to ingest sign-in logs into Microsoft Sentinel. Any Microsoft Entra ID license (Free/O365/P1 or P2) is sufficient to ingest the other log types. Other per-gigabyte charges might apply for Azure Monitor (Log Analytics) and Microsoft Sentinel.
24+
25+
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
26+
27+
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
28+
29+
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
1730

1831
## Microsoft Entra ID data connector data types
1932

20-
This table lists the logs you can send from Microsoft Entra ID to Microsoft Sentinel using the Microsoft Entra ID data connector. Sentinel stores these logs in the Log Analytics workspace linked to your Microsoft Sentinel workspace.
33+
This table lists the logs you can send from Microsoft Entra ID to Microsoft Sentinel using the Microsoft Entra ID data connector. Microsoft Sentinel stores these logs in the Log Analytics workspace linked to your Microsoft Sentinel workspace.
2134

2235
| **Log type** | **Description** | **Log schema** |
2336
|--------------|-----------------------------------|----------------|
@@ -42,15 +55,6 @@ This table lists the logs you can send from Microsoft Entra ID to Microsoft Sent
4255
4356
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
4457

45-
## Prerequisites
46-
47-
- A Microsoft Entra ID P1 or P2 license is required to ingest sign-in logs into Microsoft Sentinel. Any Microsoft Entra ID license (Free/O365/P1 or P2) is sufficient to ingest the other log types. Other per-gigabyte charges might apply for Azure Monitor (Log Analytics) and Microsoft Sentinel.
48-
49-
- Your user must be assigned the [Microsoft Sentinel Contributor](../role-based-access-control/built-in-roles.md#microsoft-sentinel-contributor) role on the workspace.
50-
51-
- Your user must have the [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) role on the tenant you want to stream the logs from, or the equivalent permissions.
52-
53-
- Your user must have read and write permissions to the Microsoft Entra diagnostic settings in order to be able to see the connection status.
5458

5559
<a name='connect-to-azure-active-directory'></a>
5660

articles/sentinel/livestream.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
11
---
2-
title: Detect threats by using hunting livestream in Microsoft Sentinel
3-
description: Learn how to use hunting livestream in Microsoft Sentinel to actively monitor a compromise event.
2+
title: Detect threats by using hunting livestream in Microsoft Sentinel
3+
description: Detect threats in real time with hunting livestream in Microsoft Sentinel. Set up sessions, receive notifications, and take action fast.
44
ms.topic: how-to
5-
ms.date: 04/24/2024
5+
ms.date: 07/06/2025
66
ms.author: monaberdugo
77
author: mberdugo
88
ms.collection: usx-security
99
appliesto:
10-
- Microsoft Sentinel in the Microsoft Defender portal
11-
- Microsoft Sentinel in the Azure portal
12-
13-
14-
#Customer intent: As a security analyst, I want to create and manage hunting livestream sessions so that I can detect and respond to threats in real-time.
15-
10+
- Microsoft Sentinel in the Microsoft Defender portal
11+
- Microsoft Sentinel in the Azure portal
12+
ms.custom:
13+
- ai-gen-docs-bap
14+
- ai-gen-description
15+
- ai-seo-date:07/06/2025
1616
---
1717

1818
# Detect threats by using hunting livestream in Microsoft Sentinel
1919

20-
Use hunting livestream to create interactive sessions that let you test newly created queries as events occur, get notifications from the sessions when a match is found, and launch investigations if necessary. You can quickly create a livestream session using any Log Analytics query.
20+
Use hunting livestream to create interactive sessions that let you test newly created queries as events occur, get notifications from the sessions when a match is found, and launch investigations if necessary. You can quickly create a livestream session using any Log Analytics query. This article is about hunting in Microsoft Sentinel which also exists in Defender. For advanced hunting in Microsoft Defender, see [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview).
2121

2222
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
2323

2424
## Create a livestream session
2525

2626
You can create a livestream session from an existing hunting query, or create your session from scratch.
2727

28-
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Hunting**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Hunting**.
28+
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Threat management**, select **Hunting**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Threat management** > **Hunting**. Make sure you select *Hunting*, and not *Advanced hunting*.
2929

3030
1. To create a livestream session from a hunting query:
3131

0 commit comments

Comments
 (0)