Skip to content

Commit 521b576

Browse files
authored
Update overview-plan.md
1 parent 9bb49a9 commit 521b576

File tree

1 file changed

+32
-15
lines changed

1 file changed

+32
-15
lines changed

unified-secops-platform/overview-plan.md

Lines changed: 32 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -86,26 +86,43 @@ For more information, see:
8686

8787
Microsoft's unified SecOps platform ingests data from first-party Microsoft services, such as Microsoft Defender for Cloud Apps and Microsoft Defender for Cloud. We recommend expanding your coverage to other data sources in your environment by adding Microsoft Sentinel data connectors.
8888

89-
- **Determine the full set of data sources you'll be ingesting data from, and the data size requirements** to help you accurately project your deployment's budget and timeline.
90-
91-
You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Microsoft Sentinel.
92-
93-
For example, you might want to use any of the following recommended data sources:
94-
95-
|Scenario |Data sources |
96-
|---------|---------|
97-
|**Azure services** | If any of the following services are deployed in Azure, use the following connectors to send these resources' Diagnostic Logs to Microsoft Sentinel: <br><br> - **Azure Firewall** <br>- **Azure Application Gateway** <br>- **Keyvault**<br> - **Azure Kubernetes Service**<br> - **Azure SQL**<br>- **Network Security Groups**<br> - **Azure-Arc Servers** <br><br>We recommend that you set up Azure Policy to require that their logs be forwarded to the underlying Log Analytics workspace. For more on information, see [Create diagnostic settings at scale using Azure Policy](/azure/azure-monitor/essentials/diagnostic-settings-policy). |
98-
|**Virtual machines** | For virtual machines hosted on-premises or in other clouds that require their logs collected, use the following data connectors: <br><br> - **Windows Security Events using AMA**<br> - Events via **Defender for Endpoint** (for server)<br>- **Syslog** |
99-
|**Network virtual appliances / on-premises sources** | For network virtual appliances or other on-premises sources that generate Common Event Format (CEF) or SYSLOG logs, use the following data connectors: <br><br>- **Syslog via AMA** <br>- **Common Event Format (CEF) via AMA** <br><br> For more information, see [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](/azure/sentinel/connect-cef-syslog-ama?branch=main&tabs=single%2Ccef%2Cportal). |
89+
### Determine your data sources
90+
91+
Determine the full set of data sources you'll be ingesting data from, and the data size requirements to help you accurately project your deployment's budget and timeline. You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Microsoft Sentinel.
92+
93+
For example, you might want to use any of the following recommended data sources:
94+
95+
- **Azure services**:
96+
- If any of the following services are deployed in Azure, use the following connectors to send these resources' Diagnostic Logs to Microsoft Sentinel:
97+
- **Azure Firewall**
98+
- **Azure Application Gateway**
99+
- **Keyvault**
100+
- **Azure Kubernetes Service**
101+
- **Azure SQL**
102+
- **Network Security Groups**
103+
- **Azure-Arc Servers**
104+
- We recommend that you set up Azure Policy to require that their logs be forwarded to the underlying Log Analytics workspace. For more information, see [Create diagnostic settings at scale using Azure Policy](/azure/azure-monitor/essentials/diagnostic-settings-policy)..
105+
106+
- **Virtual machines**:
107+
- For virtual machines hosted on-premises or in other clouds that require their logs collected, use the following data connectors:
108+
- **Windows Security Events using AMA**
109+
- Events via **Defender for Endpoint** (for server)
110+
- **Syslog**
111+
112+
- **Network virtual appliances / on-premises sources**:
113+
- For network virtual appliances or other on-premises sources that generate Common Event Format (CEF) or SYSLOG logs, use the following data connectors:
114+
- **Syslog via AMA**
115+
- **Common Event Format (CEF) via AMA**
116+
- For more information, see [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](/azure/sentinel/connect-cef-syslog-ama?branch=main&tabs=single%2Ccef%2Cportal).
100117

101118
For more information, see [Prioritize data connectors](/azure/sentinel/prioritize-data-connectors).
102119

103-
- **Plan your Microsoft Sentinel budget, considering cost implications for each planned scenario**.
120+
### Plan your budget
104121

105-
Make sure that your budget covers the cost of data ingestion for both Microsoft Sentinel and Azure Log Analytics, any playbooks that will be deployed, and so on. For more information, see:
122+
Plan your Microsoft Sentinel budget, considering cost implications for each planned scenario. Make sure that your budget covers the cost of data ingestion for both Microsoft Sentinel and Azure Log Analytics, any playbooks that will be deployed, and so on. For more information, see:
106123

107-
- [Log retention plans in Microsoft Sentinel](/azure/sentinel/log-plans)
108-
- [Plan costs and understand Microsoft Sentinel pricing and billing](/azure/sentinel/billing?tabs=simplified%2Ccommitment-tiers)
124+
- [Log retention plans in Microsoft Sentinel](/azure/sentinel/log-plans)
125+
- [Plan costs and understand Microsoft Sentinel pricing and billing](/azure/sentinel/billing?tabs=simplified%2Ccommitment-tiers)
109126

110127
## Plan roles and permissions
111128

0 commit comments

Comments
 (0)