Skip to content

Commit e8ba002

Browse files
committed
fixing docs
1 parent c6f107c commit e8ba002

File tree

2 files changed

+31
-76
lines changed

2 files changed

+31
-76
lines changed

articles/sentinel/ama-migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Each organization will have different metrics of success and internal migration
4242
4343
1. Measure the success of your proof of concept.
4444

45-
To help with this step, use the**AMA migration tracker** workbook, which displays the servers reporting to your workspaces, and whether they have the legacy MMA, the AMA, or both agents installed. You can also use this workbook to view the DCRs collecting events from your machines, and which events they are collecting.
45+
To help with this step, use the **AMA migration tracker** workbook, which displays the servers reporting to your workspaces, and whether they have the legacy MMA, the AMA, or both agents installed. You can also use this workbook to view the DCRs collecting events from your machines, and which events they are collecting.
4646

4747
Make sure to select you subscription and resource group at the top of the workbook to show data for your environment. For example:
4848

articles/sentinel/connect-services-windows-based.md

Lines changed: 30 additions & 75 deletions
Original file line numberDiff line numberDiff line change
@@ -3,33 +3,26 @@ title: Connect Microsoft Sentinel to other Microsoft services with a Windows age
33
description: Learn how to connect Microsoft Sentinel to Microsoft services with Windows agent-based connections.
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 07/18/2023
6+
ms.date: 10/06/2024
77
ms.author: yelevin
88
---
99

1010
# Connect Microsoft Sentinel to other Microsoft services with a Windows agent-based data connector
1111

12-
This article describes how to connect Microsoft Sentinel to other Microsoft services by using a Windows agent-based connections. Microsoft Sentinel uses the Azure foundation to provide built-in, service-to-service support for data ingestion from many Azure and Microsoft 365 services, Amazon Web Services, and various Windows Server services. There are a few different methods through which these connections are made.
13-
14-
This article presents information that is common to the group of Windows agent-based data connectors.
15-
16-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
17-
18-
## Azure Monitor Agent
19-
20-
Some connectors based on the Azure Monitor Agent (AMA) are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21-
22-
The Azure Monitor Agent is currently supported only for Windows Security Events, Windows Forwarded Events, and Windows DNS Events.
12+
This article describes how to connect Microsoft Sentinel to other Microsoft services Windows agent-based connections. Microsoft Sentinel uses the Azure Monitor Agent to provide built-in, service-to-service support for data ingestion from many Azure and Microsoft 365 services, Amazon Web Services, and various Windows Server services.
2313

2414
The [Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-overview) uses **Data collection rules (DCRs)** to define the data to collect from each agent. Data collection rules offer you two distinct advantages:
2515

2616
- **Manage collection settings at scale** while still allowing unique, scoped configurations for subsets of machines. They are independent of the workspace and independent of the virtual machine, which means they can be defined once and reused across machines and environments. See [Configure data collection for the Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-data-collection).
2717

2818
- **Build custom filters** to choose the exact events you want to ingest. The Azure Monitor Agent uses these rules to filter the data *at the source* and ingest only the events you want, while leaving everything else behind. This can save you a lot of money in data ingestion costs!
2919

30-
See below how to create data collection rules.
20+
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
21+
22+
> [!IMPORTANT]
23+
> Some connectors based on the Azure Monitor Agent (AMA) are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
3124
32-
### Prerequisites
25+
## Prerequisites
3326

3427
- You must have read and write permissions on the Microsoft Sentinel workspace.
3528

@@ -46,11 +39,12 @@ See below how to create data collection rules.
4639
|Data connector |Licensing, costs, and other information |
4740
|---------|---------|
4841
|Windows Forwarded Events|- You must have Windows Event Collection (WEC) enabled and running.<br>Install the Azure Monitor Agent on the WEC machine. <br>- We recommend installing the [Advanced Security Information Model (ASIM)](normalization.md) parsers to ensure full support for data normalization. You can deploy these parsers from the [`Azure-Sentinel` GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Parsers/ASim%20WindowsEvent) using the **Deploy to Azure** button there.|
42+
4943
- Install the related Microsoft Sentinel solution from the Content Hub in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
5044

51-
### Instructions
45+
## Create data collection rules via the GUI
5246

53-
1. From the Microsoft Sentinel navigation menu, select **Data connectors**. Select your connector from the list, and then select **Open connector page** on the details pane. Then follow the on-screen instructions under the **Instructions** tab, as described through the rest of this section.
47+
1. From Microsoft Sentinel, select **Configuration**> **Data connectors**. Select your connector from the list, and then select **Open connector page** on the details pane. Then follow the on-screen instructions under the **Instructions** tab, as described through the rest of this section.
5448

5549
1. Verify that you have the appropriate permissions as described under the **Prerequisites** section on the connector page.
5650

@@ -60,37 +54,36 @@ See below how to create data collection rules.
6054

6155
1. In the **Resources** tab, select **+Add resource(s)** to add machines to which the Data Collection Rule will apply. The **Select a scope** dialog will open, and you will see a list of available subscriptions. Expand a subscription to see its resource groups, and expand a resource group to see the available machines. You will see Azure virtual machines and Azure Arc-enabled servers in the list. You can mark the check boxes of subscriptions or resource groups to select all the machines they contain, or you can select individual machines. Select **Apply** when you've chosen all your machines. At the end of this process, the Azure Monitor Agent will be installed on any selected machines that don't already have it installed.
6256

63-
1. On the **Collect** tab, choose the events you would like to collect: select **All events** or **Custom** to specify other logs or to filter events using [XPath queries](/azure/azure-monitor/agents/data-collection-windows-events#filter-events-using-xpath-queries) (see note below). Enter expressions in the box that evaluate to specific XML criteria for events to collect, then select **Add**. You can enter up to 20 expressions in a single box, and up to 100 boxes in a rule.
57+
1. On the **Collect** tab, choose the events you would like to collect: select **All events** or **Custom** to specify other logs or to filter events using [XPath queries](/azure/azure-monitor/agents/data-collection-windows-events#filter-events-using-xpath-queries). Enter expressions in the box that evaluate to specific XML criteria for events to collect, then select **Add**. You can enter up to 20 expressions in a single box, and up to 100 boxes in a rule.
6458

65-
Learn more about [data collection rules](/azure/azure-monitor/essentials/data-collection-rule-overview) from the Azure Monitor documentation.
59+
For more information, see the [Azure Monitor documentation](/azure/azure-monitor/essentials/data-collection-rule-overview).
6660

6761
> [!NOTE]
6862
>
6963
> - The Windows Security Events connector offers two other [**pre-built event sets**](windows-security-event-id-reference.md) you can choose to collect: **Common** and **Minimal**.
7064
>
7165
> - The Azure Monitor Agent supports XPath queries for **[XPath version 1.0](/windows/win32/wes/consuming-events#xpath-10-limitations) only**.
7266
73-
1. When you've added all the filter expressions you want, select **Next: Review + create**.
67+
To test the validity of an XPath query, use the PowerShell cmdlet **Get-WinEvent** with the *-FilterXPath* parameter. For example:
7468

75-
1. When you see the "Validation passed" message, select **Create**.
69+
```powershell
70+
$XPath = '*[System[EventID=1035]]'
71+
Get-WinEvent -LogName 'Application' -FilterXPath $XPath
72+
```
7673
77-
You'll see all your data collection rules (including those created through the API) under **Configuration** on the connector page. From there you can edit or delete existing rules.
74+
- If events are returned, the query is valid.
75+
- If you receive the message "No events were found that match the specified selection criteria," the query may be valid, but there are no matching events on the local machine.
76+
- If you receive the message "The specified query is invalid," the query syntax is invalid.
77+
78+
1. When you've added all the filter expressions you want, select **Next: Review + create**.
7879
79-
> [!TIP]
80-
> Use the PowerShell cmdlet **Get-WinEvent** with the *-FilterXPath* parameter to test the validity of an XPath query. The following script shows an example:
81-
>
82-
> ```powershell
83-
> $XPath = '*[System[EventID=1035]]'
84-
> Get-WinEvent -LogName 'Application' -FilterXPath $XPath
85-
> ```
86-
>
87-
> - If events are returned, the query is valid.
88-
> - If you receive the message "No events were found that match the specified selection criteria," the query may be valid, but there are no matching events on the local machine.
89-
> - If you receive the message "The specified query is invalid," the query syntax is invalid.
80+
1. When you see the **Validation passed** message, select **Create**.
9081
91-
### Create data collection rules using the API
82+
You'll see all your data collection rules, including those [created through the API](#create-data-collection-rules-using-the-api), under **Configuration** on the connector page. From there you can edit or delete existing rules.
9283
93-
You can also create data collection rules using the API ([see schema](/rest/api/monitor/data-collection-rules)), which can make life easier if you're creating many rules (if you're an MSSP, for example). Here's an example (for the [Windows Security Events via AMA](./data-connectors/windows-security-events-via-ama.md) connector) that you can use as a template for creating a rule:
84+
## Create data collection rules using the API
85+
86+
You can also create data collection rules using the API, which can make life easier if you're creating many rules, such as if you're an MSSP. Here's an example (for the [Windows Security Events via AMA](./data-connectors/windows-security-events-via-ama.md) connector) that you can use as a template for creating a rule:
9487
9588
**Request URL and header**
9689
@@ -139,48 +132,10 @@ PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/m
139132
}
140133
```
141134

142-
See this [complete description of data collection rules](/azure/azure-monitor/essentials/data-collection-rule-overview) from the Azure Monitor documentation.
143-
144-
### Prerequisites
145-
146-
- You must have read and write permissions on the Log Analytics workspace, and any workspace that contains machines you want to collect logs from.
147-
- You must have the **Log Analytics Contributor** role on the SecurityInsights (Microsoft Sentinel) solution on those workspaces, in addition to any Microsoft Sentinel roles.
148-
149-
### Instructions
150-
151-
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
152-
153-
1. Select your service (**DNS** or **Windows Firewall**) and then select **Open connector page**.
154-
155-
1. Install and onboard the agent on the device that generates the logs.
156-
157-
| Machine type | Instructions |
158-
| --------- | --------- |
159-
| **For an Azure Windows VM** | 1. Under **Choose where to install the agent**, expand **Install agent on Azure Windows virtual machine**. <br><br>2. Select the **Download & install agent for Azure Windows Virtual machines >** link. <br><br>3. In the **Virtual machines** blade, select a virtual machine to install the agent on, and then select **Connect**. Repeat this step for each VM you wish to connect. |
160-
| **For any other Windows machine** | 1. Under **Choose where to install the agent**, expand **Install agent on non-Azure Windows Machine** <br><br>2. Select the **Download & install agent for non-Azure Windows machines >** link. <br><br>3. In the **Agents management** blade, on the **Windows servers** tab, select the **Download Windows Agent** link for either 32-bit or 64-bit systems, as appropriate. <br><br>4. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the **Workspace ID and Keys** that appear below the download links in the previous step. |
161-
162-
To allow Windows systems without the necessary internet connectivity to still stream events to Microsoft Sentinel, download and install the **Log Analytics Gateway** on a separate machine, using the **Download Log Analytics Gateway** link on the **Agents Management** page, to act as a proxy. You still need to install the Azure Monitor Agent on each Windows system whose events you want to collect.
163-
164-
For more information on this scenario, see the [**Log Analytics gateway** documentation](/azure/azure-monitor/agents/gateway).
165-
166-
For additional installation options and further details, see the [**Azure Monitor Agent** documentation](/azure/azure-monitor/agents/azure-monitor-agent-windows-client).
167-
168-
### Determine the logs to send
169-
170-
For the Windows DNS Server and Windows Firewall connectors, select the **Install solution** button. For the legacy Security Events connector, choose the **event set** you wish to send and select **Update**. For more information, see [Windows security event sets that can be sent to Microsoft Sentinel](windows-security-event-id-reference.md).
171-
172-
You can find and query the data for these services using the table names in their respective sections in the [Data connectors reference](data-connectors-reference.md) page.
173-
174-
### Troubleshoot your Windows DNS Server data connector
175-
176-
If your DNS events don't show up in Microsoft Sentinel:
177-
178-
1. Make sure that DNS analytics logs on your servers are [enabled](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn800669(v=ws.11)#to-enable-dns-diagnostic-logging).
179-
1. Go to Azure DNS Analytics.
180-
1. In the **Configuration** area, change any of the settings and save your changes. Change your settings back if you need to, and then save your changes again.
181-
1. Check your Azure DNS Analytics to make sure that your events and queries display properly.
135+
For more information, see:
182136

183-
For more information, see [Gather insights about your DNS infrastructure with the DNS Analytics Preview solution](/previous-versions/azure/azure-monitor/insights/dns-analytics).
137+
- [Data collection rules (DCRs) in Azure Monitor](/azure/azure-monitor/essentials/data-collection-rule-overview)
138+
- [Data collection rules API schema](/rest/api/monitor/data-collection-rules)
184139

185140
## Next steps
186141

0 commit comments

Comments
 (0)