You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/audit-sentinel-data.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,10 @@ title: Audit Microsoft Sentinel queries and activities | Microsoft Docs
3
3
description: This article describes how to audit queries and activities performed in Microsoft Sentinel.
4
4
author: batamig
5
5
ms.topic: how-to
6
-
ms.date: 01/09/2023
6
+
ms.date: 09/26/2024
7
7
ms.author: bagol
8
8
9
-
10
9
#Customer intent: As a security analyst, I want to audit queries and activities in my SOC environment so that I can ensure compliance and monitor security operations effectively.
11
-
12
10
---
13
11
14
12
# Audit Microsoft Sentinel queries and activities
@@ -26,6 +24,12 @@ Microsoft Sentinel provides access to:
26
24
>
27
25
> In the Microsoft Sentinel **Workbooks** area, search for the **Workspace audit** workbook.
28
26
27
+
## Prerequisites
28
+
29
+
- Before you can successfully run the sample queries in this article, you need to have relevant data in your Microsoft Sentinel workspace to query on and access to Microsoft Sentinel.
30
+
31
+
For more information, see [Configure Microsoft Sentinel content](configure-content.md) and [Roles and permissions in Microsoft Sentinel](roles.md).
32
+
29
33
## Auditing with Azure Activity logs
30
34
31
35
Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azure/azure-monitor/essentials/platform-logs-overview), where the **AzureActivity** table includes all actions taken in your Microsoft Sentinel workspace.
@@ -34,9 +38,9 @@ You can use the **AzureActivity** table when auditing activity in your SOC envir
34
38
35
39
**To query the AzureActivity table**:
36
40
37
-
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table in the **Logs**screen called AzureActivity.
41
+
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table called `AzureActivity`. In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)**page. In the Defender portal, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page. For more information, see
38
42
39
-
1.Then, query the data using KQL, like you would any other table.
43
+
1.Query the data using KQL, like you would any other table.
40
44
41
45
The **AzureActivity** table includes data from many services, including Microsoft Sentinel. To filter in only data from Microsoft Sentinel, start your query with the following code:
42
46
@@ -133,7 +137,8 @@ LAQueryLogs data includes information such as:
133
137
- Performance data on each query run
134
138
135
139
> [!NOTE]
136
-
> - The **LAQueryLogs** table only includes queries that have been run in the Logs blade of Microsoft Sentinel. It does not include the queries run by scheduled analytics rules, using the **Investigation Graph** or in the Microsoft Sentinel **Hunting** page.
140
+
> - The **LAQueryLogs** table only includes queries that have been run in the Logs blade of Microsoft Sentinel. It does not include the queries run by scheduled analytics rules, using the **Investigation Graph**, in the Microsoft Sentinel **Hunting** page, or in the Defender portal's **Advanced hunting** page. <!--is this correct?-->
141
+
>
137
142
> - There may be a short delay between the time a query is run and the data is populated in the **LAQueryLogs** table. We recommend waiting about 5 minutes to query the **LAQueryLogs** table for audit data.
138
143
139
144
**To query the LAQueryLogs table**:
@@ -211,14 +216,9 @@ LAQueryLogs
211
216
212
217
Use Microsoft Sentinel's own features to monitor events and actions that occur within Microsoft Sentinel.
213
218
214
-
-**Monitor with workbooks**. The following workbooks were built to monitor workspace activity:
215
-
216
-
-**Workspace Auditing**. Includes information about which users in the environment are performing actions, which actions they have performed, and more.
217
-
-**Analytics Efficiency**. Provides insight into which analytic rules are being used, which MITRE tactics are most covered, and incidents generated from the rules.
218
-
-**Security Operations Efficiency**. Presents metrics on SOC team performance, incidents opened, incidents closed, and more. This workbook can be used to show team performance and highlight any areas that might be lacking that require attention.
219
-
-**Data collection health monitoring**. Helps watch for stalled or stopped ingestions.
219
+
-**Monitor with workbooks**. Several built-in Microsoft Sentinel workbooks can help you monitor workspace activity, including information about the users working in your workspace, the analytics rules being used, the MITRE tactics most covered, stalled or stopped ingestions, and SOC team performance.
220
220
221
-
For more information, see [Commonly used Microsoft Sentinel workbooks](top-workbooks.md).
221
+
For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md) and [Commonly used Microsoft Sentinel workbooks](top-workbooks.md)
222
222
223
223
-**Watch for ingestion delay**. If you have concerns about ingestion delay, [set a variable in an analytics rule](ingestion-delay.md) to represent the delay.
Copy file name to clipboardExpand all lines: articles/sentinel/configure-data-retention.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: cwatson-cat
5
5
ms.author: cwatson
6
6
ms.service: microsoft-sentinel
7
7
ms.topic: tutorial
8
-
ms.date: 01/05/2023
8
+
ms.date: 09/26/2024
9
9
ms.custom: template-tutorial
10
10
11
11
@@ -72,14 +72,16 @@ In your Log Analytics workspace, change the interactive retention policy of the
72
72
73
73
## Review interactive and total retention policies
74
74
75
-
On the **Tables** page for the table you updated, review the field values for **Interactive retention** and **Total retention**.
75
+
On the **Tables** page, for the table you updated, review the field values for **Interactive retention** and **Total retention**.
76
76
77
77
:::image type="content" source="media/configure-data-retention/data-retention-archive-period.png" alt-text="Screenshot of the table view that shows the interactive retention and archive period columns.":::
78
78
79
79
## Clean up resources
80
80
81
81
No resources were created but you might want to restore the data retention settings you changed.
82
82
83
+
Depending on the settings set for your entire workspace, the settings updated in this tutorial might incur additional charges. To avoid these charges, restore the settings to their original values.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-defender-for-cloud.md
+16-19Lines changed: 16 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Ingest Microsoft Defender for Cloud subscription-based alerts to Microsof
3
3
description: Learn how to connect security alerts from Microsoft Defender for Cloud and stream them into Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 11/09/2021
6
+
ms.date: 09/26/2024
7
7
ms.author: yelevin
8
8
9
9
@@ -13,13 +13,9 @@ ms.author: yelevin
13
13
14
14
# Ingest Microsoft Defender for Cloud alerts to Microsoft Sentinel
15
15
16
-
[Microsoft Defender for Cloud](/azure/defender-for-cloud/)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multicloud workloads.
16
+
[Microsoft Defender for Cloud](/azure/defender-for-cloud/)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multicloud workloads. The **Microsoft Defender for Cloud** connector allows you to ingest [security alerts from Defender for Cloud](/azure/defender-for-cloud/alerts-reference) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
17
17
18
-
This connector allows you to ingest [security alerts from Defender for Cloud](/azure/defender-for-cloud/alerts-reference) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
19
-
20
-
As [Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription, this data connector is also enabled or disabled separately for each subscription.
21
-
22
-
The new **Tenant-based Microsoft Defender for Cloud connector**, in PREVIEW, allows you to collect Defender for Cloud alerts over your entire tenant, without having to enable each subscription separately. It also leverages [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) (formerly Microsoft 365 Defender) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
18
+
[Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription. While Microsoft Sentinel's legacy connector for Defender for Cloud Apps is also configured per subscription, the **Tenant-based Microsoft Defender for Cloud** connector, in preview, allows you to collect Defender for Cloud alerts over your entire tenant without having to enable each subscription separately. The tenant-based connector also works with [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
@@ -49,34 +45,35 @@ Enabling **bi-directional sync** will automatically sync the status of original
49
45
50
46
## Connect to Microsoft Defender for Cloud
51
47
52
-
1.In Microsoft Sentinel, select **Data connectors** from the navigation menu.
48
+
1.After installing the solution, in Microsoft Sentinel, select **Configuration > Data connectors**.
53
49
54
-
1. From the data connectors gallery, select **Microsoft Defender for Cloud**, and select **Open connector page** in the details pane.
50
+
1. From the **Data connectors** page, select the either the **Subscription-based Microsoft Defender for Cloud (Legacy)** or the **Tenant-based Microsoft Defender for Cloud (Preview)** connector, and then select **Open connector page**.
55
51
56
52
1. Under **Configuration**, you will see a list of the subscriptions in your tenant, and the status of their connection to Microsoft Defender for Cloud. Select the **Status** toggle next to each subscription whose alerts you want to stream into Microsoft Sentinel. If you want to connect several subscriptions at once, you can do this by marking the check boxes next to the relevant subscriptions and then selecting the **Connect** button on the bar above the list.
57
53
58
-
> [!NOTE]
59
-
> - The check boxes and **Connect** toggles will be active only on the subscriptions for which you have the required permissions.
60
-
> - The **Connect** button will be active only if at least one subscription's check box has been marked.
54
+
- The check boxes and **Connect** toggles are active only on the subscriptions for which you have the [required permissions](#prerequisites).
55
+
- The **Connect** button is active only if at least one subscription's check box has been marked.
61
56
62
57
1. To enable bi-directional sync on a subscription, locate the subscription in the list, and choose **Enabled** from the drop-down list in the **Bi-directional sync** column. To enable bi-directional sync on several subscriptions at once, mark their check boxes and select the **Enable bi-directional sync** button on the bar above the list.
63
58
64
-
> [!NOTE]
65
-
> - The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
66
-
> - The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
59
+
- The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
60
+
- The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
61
+
62
+
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector).
67
63
68
-
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector). The value for each subscription in this column will either be blank (meaning no Defender plans are enabled), "All enabled," or "Some enabled." Those that say "Some enabled" will also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable. The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether.
64
+
The value for each subscription in this column is either blank (meaning no Defender plans are enabled), **All enabled**, or **Some enabled**. Those that say **Some enabled**also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable.
69
65
70
-
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration":::
66
+
The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether. For example:
67
+
68
+
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration.":::
71
69
72
70
1. You can select whether you want the alerts from Microsoft Defender for Cloud to automatically generate incidents in Microsoft Sentinel. Under **Create incidents**, select **Enabled** to turn on the default analytics rule that automatically [creates incidents from alerts](create-incidents-from-alerts.md). You can then edit this rule under **Analytics**, in the **Active rules** tab.
73
71
74
72
> [!TIP]
75
73
> When configuring [custom analytics rules](detect-threats-custom.md) for alerts from Microsoft Defender for Cloud, consider the alert severity to avoid opening incidents for informational alerts.
76
74
>
77
75
> Informational alerts in Microsoft Defender for Cloud don't represent a security risk on their own, and are relevant only in the context of an existing, open incident. For more information, see [Security alerts and incidents in Microsoft Defender for Cloud](../security-center/security-center-alerts-overview.md).
0 commit comments