You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/audit-sentinel-data.md
+14-17Lines changed: 14 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Audit Microsoft Sentinel queries and activities | Microsoft Docs
3
3
description: This article describes how to audit queries and activities performed in Microsoft Sentinel.
4
4
author: batamig
5
5
ms.topic: how-to
6
-
ms.date: 09/26/2024
6
+
ms.date: 11/12/2024
7
7
ms.author: bagol
8
8
9
9
#Customer intent: As a security analyst, I want to audit queries and activities in my SOC environment so that I can ensure compliance and monitor security operations effectively.
@@ -15,14 +15,12 @@ This article describes how you can view audit data for queries run and activitie
15
15
16
16
Microsoft Sentinel provides access to:
17
17
18
-
- The **AzureActivity** table, which provides details about all actions taken in Microsoft Sentinel, such as editing alert rules. The **AzureActivity** table does not log specific query data. For more information, see [Auditing with Azure Activity logs](#auditing-with-azure-activity-logs).
18
+
- The **AzureActivity** table, which provides details about all actions taken in Microsoft Sentinel, such as editing alert rules. The **AzureActivity** table doesn't log specific query data. For more information, see [Auditing with Azure Activity logs](#auditing-with-azure-activity-logs).
19
19
20
20
- The **LAQueryLogs** table, which provides details about the queries run in Log Analytics, including queries run from Microsoft Sentinel. For more information, see [Auditing with LAQueryLogs](#auditing-with-laquerylogs).
21
21
22
22
> [!TIP]
23
-
> In addition to the manual queries described in this article, Microsoft Sentinel provides a built-in workbook to help you audit the activities in your SOC environment.
24
-
>
25
-
> In the Microsoft Sentinel **Workbooks** area, search for the **Workspace audit** workbook.
23
+
> In addition to the manual queries described in this article, we recommend that you use the built-in **Workspace audit** workbook help you audit the activities in your SOC environment. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md).
26
24
27
25
## Prerequisites
28
26
@@ -34,13 +32,16 @@ Microsoft Sentinel provides access to:
34
32
35
33
Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azure/azure-monitor/essentials/platform-logs-overview), where the **AzureActivity** table includes all actions taken in your Microsoft Sentinel workspace.
36
34
37
-
You can use the **AzureActivity** table when auditing activity in your SOC environment with Microsoft Sentinel.
35
+
Use the **AzureActivity** table when auditing activity in your SOC environment with Microsoft Sentinel.
38
36
39
37
**To query the AzureActivity table**:
40
38
41
-
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table called `AzureActivity`. In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)** page. In the Defender portal, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page. For more information, see
39
+
1. Install the **Azure Activity solution for Sentinel** solution and connect the [Azure Activity](./data-connectors/azure-activity.md) data connector to start streaming audit events into a new table called `AzureActivity`.
40
+
41
+
1. Query the data using Kusto Query Language (KQL), like you would any other table:
42
42
43
-
1. Query the data using KQL, like you would any other table.
43
+
- In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)** page.
44
+
- In Microsoft's unified security operations platform, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page.
44
45
45
46
The **AzureActivity** table includes data from many services, including Microsoft Sentinel. To filter in only data from Microsoft Sentinel, start your query with the following code:
46
47
@@ -96,9 +97,7 @@ Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azu
You can also use the Azure Activity logs to check for user authorizations and licenses.
100
-
101
-
For example, the following table lists selected operations found in Azure Activity logs with the specific resource the log data is pulled from.
100
+
You can also use the Azure Activity logs to check for user authorizations and licenses. For example, the following table lists selected operations found in Azure Activity logs with the specific resource the log data is pulled from.
102
101
103
102
|Operation name| Resource type|
104
103
|----|----|
@@ -161,7 +160,7 @@ The following sections show more sample queries to run on the **LAQueryLogs** ta
161
160
162
161
### The number of queries run where the response wasn't "OK"
163
162
164
-
The following **LAQueryLogs** table query shows the number of queries run, where anything other than an HTTP response of **200 OK** was received. For example, this number will include queries that had failed to run.
163
+
The following **LAQueryLogs** table query shows the number of queries run, where anything other than an HTTP response of **200 OK** was received. For example, this number includes queries that had failed to run.
165
164
166
165
```kql
167
166
LAQueryLogs
@@ -200,7 +199,7 @@ LAQueryLogs
200
199
201
200
## Configuring alerts for Microsoft Sentinel activities
202
201
203
-
You may want to use Microsoft Sentinel auditing resources to create proactive alerts.
202
+
You might want to use Microsoft Sentinel auditing resources to create proactive alerts.
204
203
205
204
For example, if you have sensitive tables in your Microsoft Sentinel workspace, use the following query to notify you each time those tables are queried:
206
205
@@ -234,8 +233,6 @@ Use Microsoft Sentinel's own features to monitor events and actions that occur w
234
233
235
234
-**Monitor data connector health** using the [Connector Health Push Notification Solution](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Send-ConnectorHealthStatus) playbook to watch for stalled or stopped ingestion, and send notifications when a connector has stopped collecting data or machines have stopped reporting.
236
235
237
-
## Next steps
238
-
239
-
In Microsoft Sentinel, use the **Workspace audit** workbook to audit the activities in your SOC environment.
236
+
## Next step
240
237
241
-
For more information, see [Visualize and monitor your data](monitor-your-data.md).
238
+
In Microsoft Sentinel, use the **Workspace audit** workbook to audit the activities in your SOC environment. For more information, see [Visualize and monitor your data](monitor-your-data.md).
Copy file name to clipboardExpand all lines: articles/sentinel/automate-incident-handling-with-automation-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,7 +189,7 @@ Actions can be defined to run when the conditions (see above) are met. You can d
189
189
190
190
- Changing the status of an incident, keeping your workflow up to date.
191
191
192
-
- When changing to “closed,” specifying the [closing reason](investigate-cases.md#closing-an-incident) and adding a comment. This helps you keep track of your performance and effectiveness, and fine-tune to reduce [false positives](false-positives.md).
192
+
- When changing to “closed,” specifying the [closing reason](investigate-cases.md#close-an-incident) and adding a comment. This helps you keep track of your performance and effectiveness, and fine-tune to reduce [false positives](false-positives.md).
193
193
194
194
- Changing the severity of an incident – you can reevaluate and reprioritize based on the presence, absence, values, or attributes of entities involved in the incident.
Copy file name to clipboardExpand all lines: articles/sentinel/best-practices-data.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Best practices for data collection in Microsoft Sentinel
3
3
description: Learn about best practices to employ when connecting data sources to Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.author: yelevin
6
-
ms.topic: conceptual
7
-
ms.date: 01/09/2023
6
+
ms.topic: concept-article
7
+
ms.date: 11/12/2024
8
8
9
9
10
10
#Customer intent: As a security analyst, I want to implement best practices for Microsoft Sentinel data collection so that I can optimize log ingestion, reduce costs, and enhance security monitoring.
@@ -21,7 +21,7 @@ Learn how to [prioritize your data connectors](prioritize-data-connectors.md) as
21
21
22
22
## Filter your logs before ingestion
23
23
24
-
You may want to filter the logs collected, or even log content, before the data is ingested into Microsoft Sentinel. For example, you may want to filter out logs that are irrelevant or unimportant to security operations, or you may want to remove unwanted details from log messages. Filtering message content may also be helpful when trying to drive down costs when working with Syslog, CEF, or Windows-based logs that have many irrelevant details.
24
+
You might want to filter the logs collected, or even log content, before the data is ingested into Microsoft Sentinel. For example, you might want to filter out logs that are irrelevant or unimportant to security operations, or you might want to remove unwanted details from log messages. Filtering message content might also be helpful when trying to drive down costs when working with Syslog, CEF, or Windows-based logs that have many irrelevant details.
25
25
26
26
Filter your logs using one of the following methods:
27
27
@@ -37,7 +37,7 @@ Filter your logs using one of the following methods:
37
37
38
38
## Alternative data ingestion requirements
39
39
40
-
Standard configuration for data collection may not work well for your organization, due to various challenges. The following tables describe common challenges or requirements, and possible solutions and considerations.
40
+
Standard configuration for data collection might not work well for your organization, due to various challenges. The following tables describe common challenges or requirements, and possible solutions and considerations.
41
41
42
42
> [!NOTE]
43
43
> Many solutions listed in the following sections require a custom data connector. For more information, see [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md).
@@ -48,12 +48,12 @@ Standard configuration for data collection may not work well for your organizati
|**Requires log filtering**| Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features aren't supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, make updates in resources such as threat hunting queries and analytics rules |
51
+
|**Requires log filtering**| Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features aren't supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, make updates in resources such as threat hunting queries and analytics rules.|
52
52
|**Agent cannot be installed**|Use Windows Event Forwarding, supported with the [Azure Monitor Agent](connect-windows-security-events.md#connector-options)| Using Windows Event forwarding lowers load-balancing events per second from the Windows Event Collector, from 10,000 events to 500-1000 events.|
53
53
|**Servers do not connect to the internet**| Use the [Log Analytics gateway](/azure/azure-monitor/agents/gateway)| Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
54
-
|**Requires tagging and enrichment at ingestion**|Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support RBAC for custom tables <br><br>Microsoft Sentinel doesn’t support row-level RBAC <br><br>**Tip**: You may want to adopt cross workspace design and functionality for Microsoft Sentinel. |
54
+
|**Requires tagging and enrichment at ingestion**|Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support role-based access control (RBAC) for custom tables. <br><br>Microsoft Sentinel doesn’t support row-level RBAC. <br><br>**Tip**: You might want to adopt cross workspace design and functionality for Microsoft Sentinel. |
55
55
|**Requires splitting operation and security logs**| Use the [Microsoft Monitor Agent or Azure Monitor Agent](connect-windows-security-events.md) multi-home functionality | Multi-home functionality requires more deployment overhead for the agent. |
56
-
|**Requires custom logs**| Collect files from specific folder paths <br><br>Use API ingestion <br><br>Use PowerShell <br><br>Use Logstash | You may have issues filtering your logs. <br><br>Custom methods aren't supported. <br><br>Custom connectors may require developer skills. |
56
+
|**Requires custom logs**| Collect files from specific folder paths <br><br>Use API ingestion <br><br>Use PowerShell <br><br>Use Logstash | You might have issues filtering your logs. <br><br>Custom methods aren't supported. <br><br>Custom connectors might require developer skills. |
57
57
58
58
59
59
### On-premises Linux log collection
@@ -63,7 +63,7 @@ Standard configuration for data collection may not work well for your organizati
63
63
|**Requires log filtering**| Use Syslog-NG <br><br>Use Rsyslog <br><br>Use FluentD configuration for the agent <br><br> Use the Azure Monitor Agent/Microsoft Monitoring Agent <br><br> Use Logstash | Some Linux distributions might not be supported by the agent. <br> <br>Using Syslog or FluentD requires developer knowledge. <br><br>For more information, see [Connect to Windows servers to collect security events](connect-windows-security-events.md) and [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md). |
64
64
|**Agent cannot be installed**| Use a Syslog forwarder, such as (syslog-ng or rsyslog. ||
65
65
|**Servers do not connect to the internet**| Use the [Log Analytics gateway](/azure/azure-monitor/agents/gateway)| Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
66
-
|**Requires tagging and enrichment at ingestion**| Use Logstash for enrichment, or custom methods, such as API or Event Hubs. | You may have extra effort required for filtering. |
66
+
|**Requires tagging and enrichment at ingestion**| Use Logstash for enrichment, or custom methods, such as API or Event Hubs. | You might have extra effort required for filtering. |
67
67
|**Requires splitting operation and security logs**| Use the [Azure Monitor Agent](connect-windows-security-events.md) with the multi-homing configuration. ||
68
68
|**Requires custom logs**| Create a custom collector using the Microsoft Monitoring (Log Analytics) agent. ||
69
69
@@ -85,7 +85,7 @@ If you need to collect Microsoft Office data, outside of the standard connector
|**Collect raw data from Teams, message trace, phishing data, and so on**| Use the built-in [Office 365 connector](./data-connectors/office-365.md) functionality, and then create a custom connector for other raw data. | Mapping events to the corresponding recordID may be challenging. |
88
+
|**Collect raw data from Teams, message trace, phishing data, and so on**| Use the built-in [Office 365 connector](./data-connectors/office-365.md) functionality, and then create a custom connector for other raw data. | Mapping events to the corresponding recordID might be challenging. |
89
89
|**Requires RBAC for splitting countries/regions, departments, and so on**| Customize your data collection by adding tags to data and creating dedicated workspaces for each separation needed.| Custom data collection has extra ingestion costs. |
90
90
|**Requires multiple tenants in a single workspace**| Customize your data collection using Azure LightHouse and a unified incident view.| Custom data collection has extra ingestion costs. <br><br>For more information, see [Extend Microsoft Sentinel across workspaces and tenants](extend-sentinel-across-workspaces-tenants.md). |
91
91
@@ -94,16 +94,16 @@ If you need to collect Microsoft Office data, outside of the standard connector
|**Filter logs from other platforms**| Use Logstash <br><br>Use the Azure Monitor Agent / Microsoft Monitoring (Log Analytics) agent | Custom collection has extra ingestion costs. <br><br>You may have a challenge of collecting all Windows events vs only security events. |
98
-
|**Agent cannot be used**| Use Windows Event Forwarding | You may need to load balance efforts across your resources. |
97
+
|**Filter logs from other platforms**| Use Logstash <br><br>Use the Azure Monitor Agent / Microsoft Monitoring (Log Analytics) agent | Custom collection has extra ingestion costs. <br><br>You might have a challenge of collecting all Windows events vs only security events. |
98
+
|**Agent cannot be used**| Use Windows Event Forwarding | You might need to load balance efforts across your resources. |
99
99
|**Servers are in air-gapped network**| Use the [Log Analytics gateway](/azure/azure-monitor/agents/gateway)| Configuring a proxy to your agent requires firewall rules to allow the Gateway to work. |
100
100
|**RBAC, tagging, and enrichment at ingestion**| Create custom collection via Logstash or the Log Analytics API. | RBAC isn't supported for custom tables <br><br>Row-level RBAC isn't supported for any tables. |
101
101
102
102
103
-
## Next steps
103
+
## Related content
104
104
105
105
For more information, see:
106
106
107
-
-[Pre-deployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md)
107
+
-[Predeployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md)
108
108
-[Best practices for Microsoft Sentinel](best-practices.md)
0 commit comments