Skip to content

Commit ec54bc6

Browse files
authored
Merge pull request #290273 from batamig/freshness-nov
nov freshness
2 parents 5625e2a + 8bf011f commit ec54bc6

28 files changed

+501
-711
lines changed

articles/sentinel/TOC.yml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@
313313
href: data-connectors/azure-cognitive-search.md
314314
- name: Azure DDoS Protection
315315
href: data-connectors/azure-ddos-protection.md
316-
- name: Azure Event Hub
316+
- name: Azure Event Hubs
317317
href: data-connectors/azure-event-hub.md
318318
- name: Azure Firewall
319319
href: data-connectors/azure-firewall.md
@@ -703,8 +703,6 @@
703703
href: connect-dns-ama.md
704704
- name: Logstash plugin with Data Collection Rules
705705
href: connect-logstash-data-connection-rules.md
706-
- name: Microsoft Sentinel Data Collector API
707-
href: connect-rest-api-template.md
708706
- name: Connection instructions for service
709707
items:
710708
- name: Amazon Web Services logs
@@ -1065,8 +1063,8 @@
10651063
href: enroll-simplified-pricing-tier.md
10661064
- name: Optimize costs with pre-purchase plan
10671065
href: billing-pre-purchase-plan.md
1068-
- name: Tutorial - Configure data retention policy
1069-
href: configure-data-retention.md
1066+
- name: Manage data retention
1067+
href: /azure/azure-monitor/logs/data-retention-configure?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
10701068
- name: Auxiliary logs use cases
10711069
href: basic-logs-use-cases.md
10721070
- name: Connect Microsoft Sentinel to Microsoft Defender XDR

articles/sentinel/audit-sentinel-data.md

Lines changed: 14 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Audit Microsoft Sentinel queries and activities | Microsoft Docs
33
description: This article describes how to audit queries and activities performed in Microsoft Sentinel.
44
author: batamig
55
ms.topic: how-to
6-
ms.date: 09/26/2024
6+
ms.date: 11/12/2024
77
ms.author: bagol
88

99
#Customer intent: As a security analyst, I want to audit queries and activities in my SOC environment so that I can ensure compliance and monitor security operations effectively.
@@ -15,14 +15,12 @@ This article describes how you can view audit data for queries run and activitie
1515

1616
Microsoft Sentinel provides access to:
1717

18-
- The **AzureActivity** table, which provides details about all actions taken in Microsoft Sentinel, such as editing alert rules. The **AzureActivity** table does not log specific query data. For more information, see [Auditing with Azure Activity logs](#auditing-with-azure-activity-logs).
18+
- The **AzureActivity** table, which provides details about all actions taken in Microsoft Sentinel, such as editing alert rules. The **AzureActivity** table doesn't log specific query data. For more information, see [Auditing with Azure Activity logs](#auditing-with-azure-activity-logs).
1919

2020
- The **LAQueryLogs** table, which provides details about the queries run in Log Analytics, including queries run from Microsoft Sentinel. For more information, see [Auditing with LAQueryLogs](#auditing-with-laquerylogs).
2121

2222
> [!TIP]
23-
> In addition to the manual queries described in this article, Microsoft Sentinel provides a built-in workbook to help you audit the activities in your SOC environment.
24-
>
25-
> In the Microsoft Sentinel **Workbooks** area, search for the **Workspace audit** workbook.
23+
> In addition to the manual queries described in this article, we recommend that you use the built-in **Workspace audit** workbook help you audit the activities in your SOC environment. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md).
2624
2725
## Prerequisites
2826

@@ -34,13 +32,16 @@ Microsoft Sentinel provides access to:
3432

3533
Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azure/azure-monitor/essentials/platform-logs-overview), where the **AzureActivity** table includes all actions taken in your Microsoft Sentinel workspace.
3634

37-
You can use the **AzureActivity** table when auditing activity in your SOC environment with Microsoft Sentinel.
35+
Use the **AzureActivity** table when auditing activity in your SOC environment with Microsoft Sentinel.
3836

3937
**To query the AzureActivity table**:
4038

41-
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table called `AzureActivity`. In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)** page. In the Defender portal, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page. For more information, see
39+
1. Install the **Azure Activity solution for Sentinel** solution and connect the [Azure Activity](./data-connectors/azure-activity.md) data connector to start streaming audit events into a new table called `AzureActivity`.
40+
41+
1. Query the data using Kusto Query Language (KQL), like you would any other table:
4242

43-
1. Query the data using KQL, like you would any other table.
43+
- In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)** page.
44+
- In Microsoft's unified security operations platform, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page.
4445

4546
The **AzureActivity** table includes data from many services, including Microsoft Sentinel. To filter in only data from Microsoft Sentinel, start your query with the following code:
4647

@@ -96,9 +97,7 @@ Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azu
9697
|**Updated** | Alert rules<br>Bookmarks <br> Cases <br> Data connectors <br>Incidents <br>Incident comments <br>Threat intelligence reports <br> Workbooks <br>Workflow |
9798

9899

99-
You can also use the Azure Activity logs to check for user authorizations and licenses.
100-
101-
For example, the following table lists selected operations found in Azure Activity logs with the specific resource the log data is pulled from.
100+
You can also use the Azure Activity logs to check for user authorizations and licenses. For example, the following table lists selected operations found in Azure Activity logs with the specific resource the log data is pulled from.
102101

103102
|Operation name| Resource type|
104103
|----|----|
@@ -161,7 +160,7 @@ The following sections show more sample queries to run on the **LAQueryLogs** ta
161160
162161
### The number of queries run where the response wasn't "OK"
163162
164-
The following **LAQueryLogs** table query shows the number of queries run, where anything other than an HTTP response of **200 OK** was received. For example, this number will include queries that had failed to run.
163+
The following **LAQueryLogs** table query shows the number of queries run, where anything other than an HTTP response of **200 OK** was received. For example, this number includes queries that had failed to run.
165164
166165
```kql
167166
LAQueryLogs
@@ -200,7 +199,7 @@ LAQueryLogs
200199

201200
## Configuring alerts for Microsoft Sentinel activities
202201

203-
You may want to use Microsoft Sentinel auditing resources to create proactive alerts.
202+
You might want to use Microsoft Sentinel auditing resources to create proactive alerts.
204203

205204
For example, if you have sensitive tables in your Microsoft Sentinel workspace, use the following query to notify you each time those tables are queried:
206205

@@ -234,8 +233,6 @@ Use Microsoft Sentinel's own features to monitor events and actions that occur w
234233

235234
- **Monitor data connector health** using the [Connector Health Push Notification Solution](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Send-ConnectorHealthStatus) playbook to watch for stalled or stopped ingestion, and send notifications when a connector has stopped collecting data or machines have stopped reporting.
236235

237-
## Next steps
238-
239-
In Microsoft Sentinel, use the **Workspace audit** workbook to audit the activities in your SOC environment.
236+
## Next step
240237

241-
For more information, see [Visualize and monitor your data](monitor-your-data.md).
238+
In Microsoft Sentinel, use the **Workspace audit** workbook to audit the activities in your SOC environment. For more information, see [Visualize and monitor your data](monitor-your-data.md).

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Actions can be defined to run when the conditions (see above) are met. You can d
189189

190190
- Changing the status of an incident, keeping your workflow up to date.
191191

192-
- When changing to “closed,” specifying the [closing reason](investigate-cases.md#closing-an-incident) and adding a comment. This helps you keep track of your performance and effectiveness, and fine-tune to reduce [false positives](false-positives.md).
192+
- When changing to “closed,” specifying the [closing reason](investigate-cases.md#close-an-incident) and adding a comment. This helps you keep track of your performance and effectiveness, and fine-tune to reduce [false positives](false-positives.md).
193193

194194
- Changing the severity of an incident – you can reevaluate and reprioritize based on the presence, absence, values, or attributes of entities involved in the incident.
195195

articles/sentinel/best-practices-data.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Best practices for data collection in Microsoft Sentinel
33
description: Learn about best practices to employ when connecting data sources to Microsoft Sentinel.
44
author: yelevin
55
ms.author: yelevin
6-
ms.topic: conceptual
7-
ms.date: 01/09/2023
6+
ms.topic: concept-article
7+
ms.date: 11/12/2024
88

99

1010
#Customer intent: As a security analyst, I want to implement best practices for Microsoft Sentinel data collection so that I can optimize log ingestion, reduce costs, and enhance security monitoring.
@@ -21,7 +21,7 @@ Learn how to [prioritize your data connectors](prioritize-data-connectors.md) as
2121

2222
## Filter your logs before ingestion
2323

24-
You may want to filter the logs collected, or even log content, before the data is ingested into Microsoft Sentinel. For example, you may want to filter out logs that are irrelevant or unimportant to security operations, or you may want to remove unwanted details from log messages. Filtering message content may also be helpful when trying to drive down costs when working with Syslog, CEF, or Windows-based logs that have many irrelevant details.
24+
You might want to filter the logs collected, or even log content, before the data is ingested into Microsoft Sentinel. For example, you might want to filter out logs that are irrelevant or unimportant to security operations, or you might want to remove unwanted details from log messages. Filtering message content might also be helpful when trying to drive down costs when working with Syslog, CEF, or Windows-based logs that have many irrelevant details.
2525

2626
Filter your logs using one of the following methods:
2727

@@ -37,7 +37,7 @@ Filter your logs using one of the following methods:
3737
3838
## Alternative data ingestion requirements
3939

40-
Standard configuration for data collection may not work well for your organization, due to various challenges. The following tables describe common challenges or requirements, and possible solutions and considerations.
40+
Standard configuration for data collection might not work well for your organization, due to various challenges. The following tables describe common challenges or requirements, and possible solutions and considerations.
4141

4242
> [!NOTE]
4343
> Many solutions listed in the following sections require a custom data connector. For more information, see [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md).
@@ -48,12 +48,12 @@ Standard configuration for data collection may not work well for your organizati
4848

4949
|Challenge / Requirement |Possible solutions |Considerations |
5050
|---------|---------|---------|
51-
|**Requires log filtering** | Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features aren't supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, make updates in resources such as threat hunting queries and analytics rules |
51+
|**Requires log filtering** | Use Logstash <br><br>Use Azure Functions <br><br> Use LogicApps <br><br> Use custom code (.NET, Python) | While filtering can lead to cost savings, and ingests only the required data, some Microsoft Sentinel features aren't supported, such as [UEBA](identify-threats-with-entity-behavior-analytics.md), [entity pages](entity-pages.md), [machine learning](bring-your-own-ml.md), and [fusion](fusion.md). <br><br>When configuring log filtering, make updates in resources such as threat hunting queries and analytics rules. |
5252
|**Agent cannot be installed** |Use Windows Event Forwarding, supported with the [Azure Monitor Agent](connect-windows-security-events.md#connector-options) | Using Windows Event forwarding lowers load-balancing events per second from the Windows Event Collector, from 10,000 events to 500-1000 events.|
5353
|**Servers do not connect to the internet** | Use the [Log Analytics gateway](/azure/azure-monitor/agents/gateway) | Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
54-
|**Requires tagging and enrichment at ingestion** |Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support RBAC for custom tables <br><br>Microsoft Sentinel doesn’t support row-level RBAC <br><br>**Tip**: You may want to adopt cross workspace design and functionality for Microsoft Sentinel. |
54+
|**Requires tagging and enrichment at ingestion** |Use Logstash to inject a ResourceID <br><br>Use an ARM template to inject the ResourceID into on-premises machines <br><br>Ingest the resource ID into separate workspaces | Log Analytics doesn't support role-based access control (RBAC) for custom tables. <br><br>Microsoft Sentinel doesn’t support row-level RBAC. <br><br>**Tip**: You might want to adopt cross workspace design and functionality for Microsoft Sentinel. |
5555
|**Requires splitting operation and security logs** | Use the [Microsoft Monitor Agent or Azure Monitor Agent](connect-windows-security-events.md) multi-home functionality | Multi-home functionality requires more deployment overhead for the agent. |
56-
|**Requires custom logs** | Collect files from specific folder paths <br><br>Use API ingestion <br><br>Use PowerShell <br><br>Use Logstash | You may have issues filtering your logs. <br><br>Custom methods aren't supported. <br><br>Custom connectors may require developer skills. |
56+
|**Requires custom logs** | Collect files from specific folder paths <br><br>Use API ingestion <br><br>Use PowerShell <br><br>Use Logstash | You might have issues filtering your logs. <br><br>Custom methods aren't supported. <br><br>Custom connectors might require developer skills. |
5757

5858

5959
### On-premises Linux log collection
@@ -63,7 +63,7 @@ Standard configuration for data collection may not work well for your organizati
6363
|**Requires log filtering** | Use Syslog-NG <br><br>Use Rsyslog <br><br>Use FluentD configuration for the agent <br><br> Use the Azure Monitor Agent/Microsoft Monitoring Agent <br><br> Use Logstash | Some Linux distributions might not be supported by the agent. <br> <br>Using Syslog or FluentD requires developer knowledge. <br><br>For more information, see [Connect to Windows servers to collect security events](connect-windows-security-events.md) and [Resources for creating Microsoft Sentinel custom connectors](create-custom-connector.md). |
6464
|**Agent cannot be installed** | Use a Syslog forwarder, such as (syslog-ng or rsyslog. | |
6565
|**Servers do not connect to the internet** | Use the [Log Analytics gateway](/azure/azure-monitor/agents/gateway) | Configuring a proxy to your agent requires extra firewall rules to allow the Gateway to work. |
66-
|**Requires tagging and enrichment at ingestion** | Use Logstash for enrichment, or custom methods, such as API or Event Hubs. | You may have extra effort required for filtering. |
66+
|**Requires tagging and enrichment at ingestion** | Use Logstash for enrichment, or custom methods, such as API or Event Hubs. | You might have extra effort required for filtering. |
6767
|**Requires splitting operation and security logs** | Use the [Azure Monitor Agent](connect-windows-security-events.md) with the multi-homing configuration. | |
6868
|**Requires custom logs** | Create a custom collector using the Microsoft Monitoring (Log Analytics) agent. | |
6969

@@ -85,7 +85,7 @@ If you need to collect Microsoft Office data, outside of the standard connector
8585

8686
|Challenge / Requirement |Possible solutions |Considerations |
8787
|---------|---------|---------|
88-
|**Collect raw data from Teams, message trace, phishing data, and so on** | Use the built-in [Office 365 connector](./data-connectors/office-365.md) functionality, and then create a custom connector for other raw data. | Mapping events to the corresponding recordID may be challenging. |
88+
|**Collect raw data from Teams, message trace, phishing data, and so on** | Use the built-in [Office 365 connector](./data-connectors/office-365.md) functionality, and then create a custom connector for other raw data. | Mapping events to the corresponding recordID might be challenging. |
8989
|**Requires RBAC for splitting countries/regions, departments, and so on** | Customize your data collection by adding tags to data and creating dedicated workspaces for each separation needed.| Custom data collection has extra ingestion costs. |
9090
|**Requires multiple tenants in a single workspace** | Customize your data collection using Azure LightHouse and a unified incident view.| Custom data collection has extra ingestion costs. <br><br>For more information, see [Extend Microsoft Sentinel across workspaces and tenants](extend-sentinel-across-workspaces-tenants.md). |
9191

@@ -94,16 +94,16 @@ If you need to collect Microsoft Office data, outside of the standard connector
9494

9595
|Challenge / Requirement |Possible solutions |Considerations |
9696
|---------|---------|---------|
97-
|**Filter logs from other platforms** | Use Logstash <br><br>Use the Azure Monitor Agent / Microsoft Monitoring (Log Analytics) agent | Custom collection has extra ingestion costs. <br><br>You may have a challenge of collecting all Windows events vs only security events. |
98-
|**Agent cannot be used** | Use Windows Event Forwarding | You may need to load balance efforts across your resources. |
97+
|**Filter logs from other platforms** | Use Logstash <br><br>Use the Azure Monitor Agent / Microsoft Monitoring (Log Analytics) agent | Custom collection has extra ingestion costs. <br><br>You might have a challenge of collecting all Windows events vs only security events. |
98+
|**Agent cannot be used** | Use Windows Event Forwarding | You might need to load balance efforts across your resources. |
9999
|**Servers are in air-gapped network** | Use the [Log Analytics gateway](/azure/azure-monitor/agents/gateway) | Configuring a proxy to your agent requires firewall rules to allow the Gateway to work. |
100100
|**RBAC, tagging, and enrichment at ingestion** | Create custom collection via Logstash or the Log Analytics API. | RBAC isn't supported for custom tables <br><br>Row-level RBAC isn't supported for any tables. |
101101

102102

103-
## Next steps
103+
## Related content
104104

105105
For more information, see:
106106

107-
- [Pre-deployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md)
107+
- [Predeployment activities and prerequisites for deploying Microsoft Sentinel](prerequisites.md)
108108
- [Best practices for Microsoft Sentinel](best-practices.md)
109109
- [Connect data sources](connect-data-sources.md)

0 commit comments

Comments
 (0)