You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/ama-migrate.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Each organization will have different metrics of success and internal migration
42
42
43
43
1. Measure the success of your proof of concept.
44
44
45
-
To help with this step, use the**AMA migration tracker** workbook, which displays the servers reporting to your workspaces, and whether they have the legacy MMA, the AMA, or both agents installed. You can also use this workbook to view the DCRs collecting events from your machines, and which events they are collecting.
45
+
To help with this step, use the**AMA migration tracker** workbook, which displays the servers reporting to your workspaces, and whether they have the legacy MMA, the AMA, or both agents installed. You can also use this workbook to view the DCRs collecting events from your machines, and which events they are collecting.
46
46
47
47
Make sure to select you subscription and resource group at the top of the workbook to show data for your environment. For example:
Copy file name to clipboardExpand all lines: articles/sentinel/connect-services-windows-based.md
+30-75Lines changed: 30 additions & 75 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,33 +3,26 @@ title: Connect Microsoft Sentinel to other Microsoft services with a Windows age
3
3
description: Learn how to connect Microsoft Sentinel to Microsoft services with Windows agent-based connections.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 07/18/2023
6
+
ms.date: 10/06/2024
7
7
ms.author: yelevin
8
8
---
9
9
10
10
# Connect Microsoft Sentinel to other Microsoft services with a Windows agent-based data connector
11
11
12
-
This article describes how to connect Microsoft Sentinel to other Microsoft services by using a Windows agent-based connections. Microsoft Sentinel uses the Azure foundation to provide built-in, service-to-service support for data ingestion from many Azure and Microsoft 365 services, Amazon Web Services, and various Windows Server services. There are a few different methods through which these connections are made.
13
-
14
-
This article presents information that is common to the group of Windows agent-based data connectors.
Some connectors based on the Azure Monitor Agent (AMA) are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21
-
22
-
The Azure Monitor Agent is currently supported only for Windows Security Events, Windows Forwarded Events, and Windows DNS Events.
12
+
This article describes how to connect Microsoft Sentinel to other Microsoft services Windows agent-based connections. Microsoft Sentinel uses the Azure Monitor Agent to provide built-in, service-to-service support for data ingestion from many Azure and Microsoft 365 services, Amazon Web Services, and various Windows Server services.
23
13
24
14
The [Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-overview) uses **Data collection rules (DCRs)** to define the data to collect from each agent. Data collection rules offer you two distinct advantages:
25
15
26
16
-**Manage collection settings at scale** while still allowing unique, scoped configurations for subsets of machines. They are independent of the workspace and independent of the virtual machine, which means they can be defined once and reused across machines and environments. See [Configure data collection for the Azure Monitor Agent](/azure/azure-monitor/agents/azure-monitor-agent-data-collection).
27
17
28
18
-**Build custom filters** to choose the exact events you want to ingest. The Azure Monitor Agent uses these rules to filter the data *at the source* and ingest only the events you want, while leaving everything else behind. This can save you a lot of money in data ingestion costs!
> Some connectors based on the Azure Monitor Agent (AMA) are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
31
24
32
-
###Prerequisites
25
+
## Prerequisites
33
26
34
27
- You must have read and write permissions on the Microsoft Sentinel workspace.
35
28
@@ -46,11 +39,12 @@ See below how to create data collection rules.
46
39
|Data connector |Licensing, costs, and other information |
47
40
|---------|---------|
48
41
|Windows Forwarded Events|- You must have Windows Event Collection (WEC) enabled and running.<br>Install the Azure Monitor Agent on the WEC machine. <br>- We recommend installing the [Advanced Security Information Model (ASIM)](normalization.md) parsers to ensure full support for data normalization. You can deploy these parsers from the [`Azure-Sentinel` GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Parsers/ASim%20WindowsEvent) using the **Deploy to Azure** button there.|
42
+
49
43
- Install the related Microsoft Sentinel solution from the Content Hub in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
50
44
51
-
### Instructions
45
+
##Create data collection rules via the GUI
52
46
53
-
1. From the Microsoft Sentinel navigation menu, select **Data connectors**. Select your connector from the list, and then select **Open connector page** on the details pane. Then follow the on-screen instructions under the **Instructions** tab, as described through the rest of this section.
47
+
1. From Microsoft Sentinel, select**Configuration**>**Data connectors**. Select your connector from the list, and then select **Open connector page** on the details pane. Then follow the on-screen instructions under the **Instructions** tab, as described through the rest of this section.
54
48
55
49
1. Verify that you have the appropriate permissions as described under the **Prerequisites** section on the connector page.
56
50
@@ -60,37 +54,36 @@ See below how to create data collection rules.
60
54
61
55
1. In the **Resources** tab, select **+Add resource(s)** to add machines to which the Data Collection Rule will apply. The **Select a scope** dialog will open, and you will see a list of available subscriptions. Expand a subscription to see its resource groups, and expand a resource group to see the available machines. You will see Azure virtual machines and Azure Arc-enabled servers in the list. You can mark the check boxes of subscriptions or resource groups to select all the machines they contain, or you can select individual machines. Select **Apply** when you've chosen all your machines. At the end of this process, the Azure Monitor Agent will be installed on any selected machines that don't already have it installed.
62
56
63
-
1. On the **Collect** tab, choose the events you would like to collect: select **All events** or **Custom** to specify other logs or to filter events using [XPath queries](/azure/azure-monitor/agents/data-collection-windows-events#filter-events-using-xpath-queries) (see note below). Enter expressions in the box that evaluate to specific XML criteria for events to collect, then select **Add**. You can enter up to 20 expressions in a single box, and up to 100 boxes in a rule.
57
+
1. On the **Collect** tab, choose the events you would like to collect: select **All events** or **Custom** to specify other logs or to filter events using [XPath queries](/azure/azure-monitor/agents/data-collection-windows-events#filter-events-using-xpath-queries). Enter expressions in the box that evaluate to specific XML criteria for events to collect, then select **Add**. You can enter up to 20 expressions in a single box, and up to 100 boxes in a rule.
64
58
65
-
Learn more about [data collection rules](/azure/azure-monitor/essentials/data-collection-rule-overview) from the Azure Monitor documentation.
59
+
For more information, see the [Azure Monitor documentation](/azure/azure-monitor/essentials/data-collection-rule-overview).
66
60
67
61
> [!NOTE]
68
62
>
69
63
> - The Windows Security Events connector offers two other [**pre-built event sets**](windows-security-event-id-reference.md) you can choose to collect: **Common** and **Minimal**.
70
64
>
71
65
> - The Azure Monitor Agent supports XPath queries for **[XPath version 1.0](/windows/win32/wes/consuming-events#xpath-10-limitations) only**.
72
66
73
-
1. When you've added all the filter expressions you want, select **Next: Review + create**.
67
+
To test the validity of an XPath query, use the PowerShell cmdlet **Get-WinEvent** with the *-FilterXPath* parameter. For example:
74
68
75
-
1. When you see the "Validation passed" message, select **Create**.
You'll see all your data collection rules (including those created through the API) under **Configuration** on the connector page. From there you can edit or delete existing rules.
74
+
- If events are returned, the query is valid.
75
+
- If you receive the message "No events were found that match the specified selection criteria," the query may be valid, but there are no matching events on the local machine.
76
+
- If you receive the message "The specified query is invalid," the query syntax is invalid.
77
+
78
+
1. When you've added all the filter expressions you want, select **Next: Review + create**.
78
79
79
-
> [!TIP]
80
-
> Use the PowerShell cmdlet **Get-WinEvent** with the *-FilterXPath* parameter to test the validity of an XPath query. The following script shows an example:
> - If you receive the message "No events were found that match the specified selection criteria," the query may be valid, but there are no matching events on the local machine.
89
-
> - If you receive the message "The specified query is invalid," the query syntax is invalid.
80
+
1. When you see the **Validation passed** message, select **Create**.
90
81
91
-
### Create data collection rules using the API
82
+
You'll see all your data collection rules, including those [created through the API](#create-data-collection-rules-using-the-api), under **Configuration** on the connector page. From there you can edit or delete existing rules.
92
83
93
-
You can also create data collection rules using the API ([see schema](/rest/api/monitor/data-collection-rules)), which can make life easier if you're creating many rules (if you're an MSSP, for example). Here's an example (for the [Windows Security Events via AMA](./data-connectors/windows-security-events-via-ama.md) connector) that you can use as a template for creating a rule:
84
+
## Create data collection rules using the API
85
+
86
+
You can also create data collection rules using the API, which can make life easier if you're creating many rules, such as if you're an MSSP. Here's an example (for the [Windows Security Events via AMA](./data-connectors/windows-security-events-via-ama.md) connector) that you can use as a template for creating a rule:
94
87
95
88
**Request URL and header**
96
89
@@ -139,48 +132,10 @@ PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/m
139
132
}
140
133
```
141
134
142
-
See this [complete description of data collection rules](/azure/azure-monitor/essentials/data-collection-rule-overview) from the Azure Monitor documentation.
143
-
144
-
### Prerequisites
145
-
146
-
- You must have read and write permissions on the Log Analytics workspace, and any workspace that contains machines you want to collect logs from.
147
-
- You must have the **Log Analytics Contributor** role on the SecurityInsights (Microsoft Sentinel) solution on those workspaces, in addition to any Microsoft Sentinel roles.
148
-
149
-
### Instructions
150
-
151
-
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
152
-
153
-
1. Select your service (**DNS** or **Windows Firewall**) and then select **Open connector page**.
154
-
155
-
1. Install and onboard the agent on the device that generates the logs.
156
-
157
-
| Machine type | Instructions |
158
-
| --------- | --------- |
159
-
|**For an Azure Windows VM**| 1. Under **Choose where to install the agent**, expand **Install agent on Azure Windows virtual machine**. <br><br>2. Select the **Download & install agent for Azure Windows Virtual machines >** link. <br><br>3. In the **Virtual machines** blade, select a virtual machine to install the agent on, and then select **Connect**. Repeat this step for each VM you wish to connect. |
160
-
|**For any other Windows machine**| 1. Under **Choose where to install the agent**, expand **Install agent on non-Azure Windows Machine** <br><br>2. Select the **Download & install agent for non-Azure Windows machines >** link. <br><br>3. In the **Agents management** blade, on the **Windows servers** tab, select the **Download Windows Agent** link for either 32-bit or 64-bit systems, as appropriate. <br><br>4. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the **Workspace ID and Keys** that appear below the download links in the previous step. |
161
-
162
-
To allow Windows systems without the necessary internet connectivity to still stream events to Microsoft Sentinel, download and install the **Log Analytics Gateway** on a separate machine, using the **Download Log Analytics Gateway** link on the **Agents Management** page, to act as a proxy. You still need to install the Azure Monitor Agent on each Windows system whose events you want to collect.
163
-
164
-
For more information on this scenario, see the [**Log Analytics gateway** documentation](/azure/azure-monitor/agents/gateway).
165
-
166
-
For additional installation options and further details, see the [**Azure Monitor Agent** documentation](/azure/azure-monitor/agents/azure-monitor-agent-windows-client).
167
-
168
-
### Determine the logs to send
169
-
170
-
For the Windows DNS Server and Windows Firewall connectors, select the **Install solution** button. For the legacy Security Events connector, choose the **event set** you wish to send and select **Update**. For more information, see [Windows security event sets that can be sent to Microsoft Sentinel](windows-security-event-id-reference.md).
171
-
172
-
You can find and query the data for these services using the table names in their respective sections in the [Data connectors reference](data-connectors-reference.md) page.
173
-
174
-
### Troubleshoot your Windows DNS Server data connector
175
-
176
-
If your DNS events don't show up in Microsoft Sentinel:
177
-
178
-
1. Make sure that DNS analytics logs on your servers are [enabled](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn800669(v=ws.11)#to-enable-dns-diagnostic-logging).
179
-
1. Go to Azure DNS Analytics.
180
-
1. In the **Configuration** area, change any of the settings and save your changes. Change your settings back if you need to, and then save your changes again.
181
-
1. Check your Azure DNS Analytics to make sure that your events and queries display properly.
135
+
For more information, see:
182
136
183
-
For more information, see [Gather insights about your DNS infrastructure with the DNS Analytics Preview solution](/previous-versions/azure/azure-monitor/insights/dns-analytics).
137
+
-[Data collection rules (DCRs) in Azure Monitor](/azure/azure-monitor/essentials/data-collection-rule-overview)
138
+
-[Data collection rules API schema](/rest/api/monitor/data-collection-rules)
0 commit comments