You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/audit-sentinel-data.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Audit Microsoft Sentinel queries and activities | Microsoft Docs
3
3
description: This article describes how to audit queries and activities performed in Microsoft Sentinel.
4
-
author: limwainstein
4
+
author: batamig
5
5
ms.topic: how-to
6
-
ms.date: 01/09/2023
7
-
ms.author: lwainstein
6
+
ms.date: 09/26/2024
7
+
ms.author: bagol
8
8
---
9
9
10
10
# Audit Microsoft Sentinel queries and activities
@@ -22,6 +22,12 @@ Microsoft Sentinel provides access to:
22
22
>
23
23
> In the Microsoft Sentinel **Workbooks** area, search for the **Workspace audit** workbook.
24
24
25
+
## Prerequisites
26
+
27
+
- Before you can successfully run the sample queries in this article, you need to have relevant data in your Microsoft Sentinel workspace to query on and access to Microsoft Sentinel.
28
+
29
+
For more information, see [Configure Microsoft Sentinel content](configure-content.md) and [Roles and permissions in Microsoft Sentinel](roles.md).
30
+
25
31
## Auditing with Azure Activity logs
26
32
27
33
Microsoft Sentinel's audit logs are maintained in the [Azure Activity Logs](/azure/azure-monitor/essentials/platform-logs-overview), where the **AzureActivity** table includes all actions taken in your Microsoft Sentinel workspace.
@@ -30,9 +36,9 @@ You can use the **AzureActivity** table when auditing activity in your SOC envir
30
36
31
37
**To query the AzureActivity table**:
32
38
33
-
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table in the **Logs**screen called AzureActivity.
39
+
1. Connect the [Azure Activity](./data-connectors/azure-activity.md) data source to start streaming audit events into a new table called `AzureActivity`. In the Azure portal, query this table in the **[Logs](hunts-custom-queries.md)**page. In the Defender portal, query this table in the **Investigation & response > Hunting > [Advanced hunting](/defender-xdr/advanced-hunting-overview)** page. For more information, see
34
40
35
-
1.Then, query the data using KQL, like you would any other table.
41
+
1.Query the data using KQL, like you would any other table.
36
42
37
43
The **AzureActivity** table includes data from many services, including Microsoft Sentinel. To filter in only data from Microsoft Sentinel, start your query with the following code:
38
44
@@ -129,7 +135,8 @@ LAQueryLogs data includes information such as:
129
135
- Performance data on each query run
130
136
131
137
> [!NOTE]
132
-
> - The **LAQueryLogs** table only includes queries that have been run in the Logs blade of Microsoft Sentinel. It does not include the queries run by scheduled analytics rules, using the **Investigation Graph** or in the Microsoft Sentinel **Hunting** page.
138
+
> - The **LAQueryLogs** table only includes queries that have been run in the Logs blade of Microsoft Sentinel. It does not include the queries run by scheduled analytics rules, using the **Investigation Graph**, in the Microsoft Sentinel **Hunting** page, or in the Defender portal's **Advanced hunting** page. <!--is this correct?-->
139
+
>
133
140
> - There may be a short delay between the time a query is run and the data is populated in the **LAQueryLogs** table. We recommend waiting about 5 minutes to query the **LAQueryLogs** table for audit data.
134
141
135
142
**To query the LAQueryLogs table**:
@@ -207,14 +214,9 @@ LAQueryLogs
207
214
208
215
Use Microsoft Sentinel's own features to monitor events and actions that occur within Microsoft Sentinel.
209
216
210
-
-**Monitor with workbooks**. The following workbooks were built to monitor workspace activity:
211
-
212
-
-**Workspace Auditing**. Includes information about which users in the environment are performing actions, which actions they have performed, and more.
213
-
-**Analytics Efficiency**. Provides insight into which analytic rules are being used, which MITRE tactics are most covered, and incidents generated from the rules.
214
-
-**Security Operations Efficiency**. Presents metrics on SOC team performance, incidents opened, incidents closed, and more. This workbook can be used to show team performance and highlight any areas that might be lacking that require attention.
215
-
-**Data collection health monitoring**. Helps watch for stalled or stopped ingestions.
217
+
-**Monitor with workbooks**. Several built-in Microsoft Sentinel workbooks can help you monitor workspace activity, including information about the users working in your workspace, the analytics rules being used, the MITRE tactics most covered, stalled or stopped ingestions, and SOC team performance.
216
218
217
-
For more information, see [Commonly used Microsoft Sentinel workbooks](top-workbooks.md).
219
+
For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](monitor-your-data.md) and [Commonly used Microsoft Sentinel workbooks](top-workbooks.md)
218
220
219
221
-**Watch for ingestion delay**. If you have concerns about ingestion delay, [set a variable in an analytics rule](ingestion-delay.md) to represent the delay.
Copy file name to clipboardExpand all lines: articles/sentinel/configure-data-retention.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: cwatson-cat
5
5
ms.author: cwatson
6
6
ms.service: microsoft-sentinel
7
7
ms.topic: tutorial
8
-
ms.date: 01/05/2023
8
+
ms.date: 09/26/2024
9
9
ms.custom: template-tutorial
10
10
#Customer intent: As an Azure account administrator, I want to archive older but less used data to save retention costs.
11
11
---
@@ -69,14 +69,16 @@ In your Log Analytics workspace, change the interactive retention policy of the
69
69
70
70
## Review interactive and total retention policies
71
71
72
-
On the **Tables** page for the table you updated, review the field values for **Interactive retention** and **Total retention**.
72
+
On the **Tables** page, for the table you updated, review the field values for **Interactive retention** and **Total retention**.
73
73
74
74
:::image type="content" source="media/configure-data-retention/data-retention-archive-period.png" alt-text="Screenshot of the table view that shows the interactive retention and archive period columns.":::
75
75
76
76
## Clean up resources
77
77
78
78
No resources were created but you might want to restore the data retention settings you changed.
79
79
80
+
Depending on the settings set for your entire workspace, the settings updated in this tutorial might incur additional charges. To avoid these charges, restore the settings to their original values.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-defender-for-cloud.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,19 +3,15 @@ title: Ingest Microsoft Defender for Cloud subscription-based alerts to Microsof
3
3
description: Learn how to connect security alerts from Microsoft Defender for Cloud and stream them into Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 11/09/2021
6
+
ms.date: 09/26/2024
7
7
ms.author: yelevin
8
8
---
9
9
10
10
# Ingest Microsoft Defender for Cloud alerts to Microsoft Sentinel
11
11
12
-
[Microsoft Defender for Cloud](/azure/defender-for-cloud/)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multicloud workloads.
12
+
[Microsoft Defender for Cloud](/azure/defender-for-cloud/)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multicloud workloads. The **Microsoft Defender for Cloud** connector allows you to ingest [security alerts from Defender for Cloud](/azure/defender-for-cloud/alerts-reference) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
13
13
14
-
This connector allows you to ingest [security alerts from Defender for Cloud](/azure/defender-for-cloud/alerts-reference) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
15
-
16
-
As [Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription, this data connector is also enabled or disabled separately for each subscription.
17
-
18
-
The new **Tenant-based Microsoft Defender for Cloud connector**, in PREVIEW, allows you to collect Defender for Cloud alerts over your entire tenant, without having to enable each subscription separately. It also leverages [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) (formerly Microsoft 365 Defender) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
14
+
[Microsoft Defender for Cloud Defender plans](/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads) are enabled per subscription. While Microsoft Sentinel's legacy connector for Defender for Cloud Apps is also configured per subscription, the **Tenant-based Microsoft Defender for Cloud** connector, in preview, allows you to collect Defender for Cloud alerts over your entire tenant without having to enable each subscription separately. The tenant-based connector also works with [Defender for Cloud's integration with Microsoft Defender XDR](ingest-defender-for-cloud-incidents.md) to ensure that all of your Defender for Cloud alerts are fully included in any incidents you receive through [Microsoft Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md).
@@ -45,25 +41,27 @@ Enabling **bi-directional sync** will automatically sync the status of original
45
41
46
42
## Connect to Microsoft Defender for Cloud
47
43
48
-
1.In Microsoft Sentinel, select **Data connectors** from the navigation menu.
44
+
1.After installing the solution, in Microsoft Sentinel, select **Configuration > Data connectors**.
49
45
50
-
1. From the data connectors gallery, select **Microsoft Defender for Cloud**, and select **Open connector page** in the details pane.
46
+
1. From the **Data connectors** page, select the either the **Subscription-based Microsoft Defender for Cloud (Legacy)** or the **Tenant-based Microsoft Defender for Cloud (Preview)** connector, and then select **Open connector page**.
51
47
52
48
1. Under **Configuration**, you will see a list of the subscriptions in your tenant, and the status of their connection to Microsoft Defender for Cloud. Select the **Status** toggle next to each subscription whose alerts you want to stream into Microsoft Sentinel. If you want to connect several subscriptions at once, you can do this by marking the check boxes next to the relevant subscriptions and then selecting the **Connect** button on the bar above the list.
53
49
54
-
> [!NOTE]
55
-
> - The check boxes and **Connect** toggles will be active only on the subscriptions for which you have the required permissions.
56
-
> - The **Connect** button will be active only if at least one subscription's check box has been marked.
50
+
- The check boxes and **Connect** toggles are active only on the subscriptions for which you have the [required permissions](#prerequisites).
51
+
- The **Connect** button is active only if at least one subscription's check box has been marked.
57
52
58
53
1. To enable bi-directional sync on a subscription, locate the subscription in the list, and choose **Enabled** from the drop-down list in the **Bi-directional sync** column. To enable bi-directional sync on several subscriptions at once, mark their check boxes and select the **Enable bi-directional sync** button on the bar above the list.
59
54
60
-
> [!NOTE]
61
-
> - The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
62
-
> - The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
55
+
- The check boxes and drop-down lists will be active only on the subscriptions for which you have the [required permissions](#prerequisites).
56
+
- The **Enable bi-directional sync** button will be active only if at least one subscription's check box has been marked.
57
+
58
+
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector).
59
+
60
+
The value for each subscription in this column are either blank (meaning no Defender plans are enabled), **All enabled**, or **Some enabled**. Those that say **Some enabled** also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable.
63
61
64
-
1. In the **Microsoft Defender plans** column of the list, you can see if Microsoft Defender plans are enabled on your subscription (a prerequisite for enabling the connector). The value for each subscription in this column will either be blank (meaning no Defender plans are enabled), "All enabled," or "Some enabled." Those that say "Some enabled" will also have an **Enable all** link you can select, that will take you to your Microsoft Defender for Cloud configuration dashboard for that subscription, where you can choose Defender plans to enable. The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether.
62
+
The **Enable Microsoft Defender for all subscriptions** link button on the bar above the list will take you to your Microsoft Defender for Cloud Getting Started page, where you can choose on which subscriptions to enable Microsoft Defender for Cloud altogether. For example:
65
63
66
-
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration":::
64
+
:::image type="content" source="./media/connect-defender-for-cloud/azure-defender-config.png" alt-text="Screenshot of Microsoft Defender for Cloud connector configuration":::<!--this image is out of date-->
67
65
68
66
1. You can select whether you want the alerts from Microsoft Defender for Cloud to automatically generate incidents in Microsoft Sentinel. Under **Create incidents**, select **Enabled** to turn on the default analytics rule that automatically [creates incidents from alerts](create-incidents-from-alerts.md). You can then edit this rule under **Analytics**, in the **Active rules** tab.
Copy file name to clipboardExpand all lines: articles/sentinel/data-transformation.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ Ingestion-time data transformation currently has the following known issues for
114
114
115
115
- Data transformations using *workspace transformation DCRs* are supported only per table, and not per connector.
116
116
117
-
There can only be one workspace transformation DCR for an entire workspace. Within that DCR, each table can use a separate input stream with its own transformation. However, if you have two different MMA-based data connectors sending data to the *Syslog* table, they will both have to use the same input stream configuration in the DCR. Splitting data to multiple destinations (Log Analytics workspaces) with a workspace transformation DCR is not possible.
117
+
There can only be one workspace transformation DCR for an entire workspace. Within that DCR, each table can use a separate input stream with its own transformation. However, if you have two different MMA-based data connectors sending data to the *Syslog* table, they will both have to use the same input stream configuration in the DCR. Splitting data to multiple destinations (Log Analytics workspaces) with a workspace transformation DCR is not possible.<!--how to fix for AMA?-->
118
118
119
119
- The following configurations are supported only via API:
120
120
@@ -130,10 +130,9 @@ Ingestion-time data transformation currently has the following known issues for
130
130
131
131
## Related content
132
132
133
-
[Get started configuring ingestion-time data transformation in Microsoft Sentinel](configure-data-transformation.md).
134
-
135
-
Learn more about Microsoft Sentinel data connector types. For more information, see:
133
+
For more information, see:
136
134
135
+
-[Transform or customize data at ingestion time in Microsoft Sentinel (preview)](configure-data-transformation.md)
137
136
-[Microsoft Sentinel data connectors](connect-data-sources.md)
138
137
-[Find your Microsoft Sentinel data connector](data-connectors-reference.md)
0 commit comments