Skip to content

Commit e723ade

Browse files
authored
Merge pull request #289281 from batamig/freshness
Oct freshness
2 parents 96db85f + 1bd79bd commit e723ade

File tree

8 files changed

+69
-81
lines changed

8 files changed

+69
-81
lines changed

articles/sentinel/audit-sentinel-data.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,10 @@ title: Audit Microsoft Sentinel queries and activities | Microsoft Docs
33
description: This article describes how to audit queries and activities performed in Microsoft Sentinel.
44
author: batamig
55
ms.topic: how-to
6-
ms.date: 01/09/2023
6+
ms.date: 09/26/2024
77
ms.author: bagol
88

9-
109
#Customer intent: As a security analyst, I want to audit queries and activities in my SOC environment so that I can ensure compliance and monitor security operations effectively.
11-
1210
---
1311

1412
# Audit Microsoft Sentinel queries and activities
@@ -26,6 +24,12 @@ Microsoft Sentinel provides access to:
2624
>
2725
> In the Microsoft Sentinel **Workbooks** area, search for the **Workspace audit** workbook.
2826
27+
## Prerequisites
28+
29+
- Before you can successfully run the sample queries in this article, you need to have relevant data in your Microsoft Sentinel workspace to query on and access to Microsoft Sentinel.
30+
31+
For more information, see [Configure Microsoft Sentinel content](configure-content.md) and [Roles and permissions in Microsoft Sentinel](roles.md).
32+
2933
## Auditing with Azure Activity logs
3034

3135
Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azure/azure-monitor/essentials/platform-logs-overview), where the **AzureActivity** table includes all actions taken in your Microsoft Sentinel workspace.
@@ -34,9 +38,9 @@ You can use the **AzureActivity** table when auditing activity in your SOC envir
3438

3539
**To query the AzureActivity table**:
3640

37-
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table in the **Logs** screen called AzureActivity.
41+
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table called `AzureActivity`. In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)** page. In the Defender portal, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page. For more information, see
3842

39-
1. Then, query the data using KQL, like you would any other table.
43+
1. Query the data using KQL, like you would any other table.
4044

4145
The **AzureActivity** table includes data from many services, including Microsoft Sentinel. To filter in only data from Microsoft Sentinel, start your query with the following code:
4246

@@ -133,7 +137,8 @@ LAQueryLogs data includes information such as:
133137
- Performance data on each query run
134138

135139
> [!NOTE]
136-
> - The **LAQueryLogs** table only includes queries that have been run in the Logs blade of Microsoft Sentinel. It does not include the queries run by scheduled analytics rules, using the **Investigation Graph** or in the Microsoft Sentinel **Hunting** page.
140+
> - The **LAQueryLogs** table only includes queries that have been run in the Logs blade of Microsoft Sentinel. It does not include the queries run by scheduled analytics rules, using the **Investigation Graph**, in the Microsoft Sentinel **Hunting** page, or in the Defender portal's **Advanced hunting** page. <!--is this correct?-->
141+
>
137142
> - There may be a short delay between the time a query is run and the data is populated in the **LAQueryLogs** table. We recommend waiting about 5 minutes to query the **LAQueryLogs** table for audit data.
138143
139144
**To query the LAQueryLogs table**:
@@ -211,14 +216,9 @@ LAQueryLogs
211216

212217
Use Microsoft Sentinel's own features to monitor events and actions that occur within Microsoft Sentinel.
213218

214-
- **Monitor with workbooks**. The following workbooks were built to monitor workspace activity:
215-
216-
- **Workspace Auditing**. Includes information about which users in the environment are performing actions, which actions they have performed, and more.
217-
- **Analytics Efficiency**. Provides insight into which analytic rules are being used, which MITRE tactics are most covered, and incidents generated from the rules.
218-
- **Security Operations Efficiency**. Presents metrics on SOC team performance, incidents opened, incidents closed, and more. This workbook can be used to show team performance and highlight any areas that might be lacking that require attention.
219-
- **Data collection health monitoring**. Helps watch for stalled or stopped ingestions.
219+
- **Monitor with workbooks**. Several built-in Microsoft Sentinel workbooks can help you monitor workspace activity, including information about the users working in your workspace, the analytics rules being used, the MITRE tactics most covered, stalled or stopped ingestions, and SOC team performance.
220220

221-
For more information, see [Commonly used Microsoft Sentinel workbooks](top-workbooks.md).
221+
For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md) and [Commonly used Microsoft Sentinel workbooks](top-workbooks.md)
222222

223223
- **Watch for ingestion delay**. If you have concerns about ingestion delay, [set a variable in an analytics rule](ingestion-delay.md) to represent the delay.
224224

articles/sentinel/configure-data-retention.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: cwatson-cat
55
ms.author: cwatson
66
ms.service: microsoft-sentinel
77
ms.topic: tutorial
8-
ms.date: 01/05/2023
8+
ms.date: 09/26/2024
99
ms.custom: template-tutorial
1010

1111

@@ -72,14 +72,16 @@ In your Log Analytics workspace, change the interactive retention policy of the
7272

7373
## Review interactive and total retention policies
7474

75-
On the **Tables** page for the table you updated, review the field values for **Interactive retention** and **Total retention**.
75+
On the **Tables** page, for the table you updated, review the field values for **Interactive retention** and **Total retention**.
7676

7777
:::image type="content" source="media/configure-data-retention/data-retention-archive-period.png" alt-text="Screenshot of the table view that shows the interactive retention and archive period columns.":::
7878

7979
## Clean up resources
8080

8181
No resources were created but you might want to restore the data retention settings you changed.
8282

83+
Depending on the settings set for your entire workspace, the settings updated in this tutorial might incur additional charges. To avoid these charges, restore the settings to their original values.
84+
8385
## Next steps
8486

8587
> [!div class="nextstepaction"]

articles/sentinel/connect-defender-for-cloud.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Ingest Microsoft Defender for Cloud subscription-based alerts to Microsof
33
description: Learn how to connect security alerts from Microsoft Defender for Cloud and stream them into Microsoft Sentinel.
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 11/09/2021
6+
ms.date: 09/26/2024
77
ms.author: yelevin
88

99

@@ -13,13 +13,9 @@ ms.author: yelevin
1313

1414
# Ingest Microsoft Defender for Cloud alerts to Microsoft Sentinel
1515

16-
[Microsoft Defender for Cloud](/azure/defender-for-cloud/)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multicloud workloads.
16+
[Microsoft Defender for Cloud](/azure/defender-for-cloud/)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multicloud workloads. The **Microsoft Defender for Cloud** connector allows you to ingest [security alerts from Defender for Cloud](/azure/defender-for-cloud/alerts-reference) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
1717

18-
This connector allows you to ingest [security alerts from Defender for Cloud](/azure/defender-for-cloud/alerts-reference) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
19-
20-
As [Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription, this data connector is also enabled or disabled separately for each subscription.
21-
22-
The new **Tenant-based Microsoft Defender for Cloud connector**, in PREVIEW, allows you to collect Defender for Cloud alerts over your entire tenant, without having to enable each subscription separately. It also leverages [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) (formerly Microsoft 365 Defender) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
18+
[Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription. While Microsoft Sentinel's legacy connector for Defender for Cloud Apps is also configured per subscription, the **Tenant-based Microsoft Defender for Cloud** connector, in preview, allows you to collect Defender for Cloud alerts over your entire tenant without having to enable each subscription separately. The tenant-based connector also works with [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
2319

2420
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2521

@@ -49,34 +45,35 @@ Enabling **bi-directional sync** will automatically sync the status of original
4945

5046
## Connect to Microsoft Defender for Cloud
5147

52-
1. In Microsoft Sentinel, select **Data connectors** from the navigation menu.
48+
1. After installing the solution, in Microsoft Sentinel, select **Configuration > Data connectors**.
5349

54-
1. From the data connectors gallery, select **Microsoft Defender for Cloud**, and select **Open connector page** in the details pane.
50+
1. From the **Data connectors** page, select the either the **Subscription-based Microsoft Defender for Cloud (Legacy)** or the **Tenant-based Microsoft Defender for Cloud (Preview)** connector, and then select **Open connector page**.
5551

5652
1. Under **Configuration**, you will see a list of the subscriptions in your tenant, and the status of their connection to Microsoft Defender for Cloud. Select the **Status** toggle next to each subscription whose alerts you want to stream into Microsoft Sentinel. If you want to connect several subscriptions at once, you can do this by marking the check boxes next to the relevant subscriptions and then selecting the **Connect** button on the bar above the list.
5753

58-
> [!NOTE]
59-
> - The check boxes and **Connect** toggles will be active only on the subscriptions for which you have the required permissions.
60-
> - The **Connect** button will be active only if at least one subscription's check box has been marked.
54+
- The check boxes and **Connect** toggles are active only on the subscriptions for which you have the [required permissions](#prerequisites).
55+
- The **Connect** button is active only if at least one subscription's check box has been marked.
6156

6257
1. To enable bi-directional sync on a subscription, locate the subscription in the list, and choose **Enabled** from the drop-down list in the **Bi-directional sync** column. To enable bi-directional sync on several subscriptions at once, mark their check boxes and select the **Enable bi-directional sync** button on the bar above the list.
6358

64-
> [!NOTE]
65-
> - The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
66-
> - The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
59+
- The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
60+
- The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
61+
62+
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector).
6763

68-
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector). The value for each subscription in this column will either be blank (meaning no Defender plans are enabled), "All enabled," or "Some enabled." Those that say "Some enabled" will also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable. The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether.
64+
The value for each subscription in this column is either blank (meaning no Defender plans are enabled), **All enabled**, or **Some enabled**. Those that say **Some enabled** also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable.
6965

70-
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration":::
66+
The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether. For example:
67+
68+
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration.":::
7169

7270
1. You can select whether you want the alerts from Microsoft Defender for Cloud to automatically generate incidents in Microsoft Sentinel. Under **Create incidents**, select **Enabled** to turn on the default analytics rule that automatically [creates incidents from alerts](create-incidents-from-alerts.md). You can then edit this rule under **Analytics**, in the **Active rules** tab.
7371

7472
> [!TIP]
7573
> When configuring [custom analytics rules](detect-threats-custom.md) for alerts from Microsoft Defender for Cloud, consider the alert severity to avoid opening incidents for informational alerts.
7674
>
7775
> Informational alerts in Microsoft Defender for Cloud don't represent a security risk on their own, and are relevant only in the context of an existing, open incident. For more information, see [Security alerts and incidents in Microsoft Defender for Cloud](../security-center/security-center-alerts-overview.md).
78-
>
79-
76+
>
8077
8178
## Find and analyze your data
8279

0 commit comments

Comments
 (0)