You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/2-plan-for-windows-hosts-security-events-connector.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ title: Plan for Windows hosts security events connector
4
4
metadata:
5
5
title: Plan for Windows hosts security events connector
6
6
description: "Plan for Windows hosts security events connector"
You have three Windows security events connector options to stream events from Windows devices to Microsoft Sentinel.
1
+
You have two Windows security events Content Hub solution options to stream events from Windows devices to Microsoft Sentinel.
2
+
3
+
The first option is to install the *Windows Security Events* Content Hub solution. You can choose either of the two agent data connectors available:
2
4
3
-
Based on your organization requirements, you have the option of installing an agent on each windows device to forward events to Microsoft Sentinel. There are two agents available:
4
5
- Windows Security Events via AMA Connector
5
6
- Security Events via Legacy Agent Connector
6
7
7
-
The third option is to configure a Windows Event Collector device to receive events from the Windows devices. The Windows Event Collector device would then forward events to Microsoft Sentinel with the **Windows Forwarded Eventsconnector**.
8
+
The second option is to install the *Windows Forwarded Events* Content Hub solution and configure a Windows Event Collector device to receive events from the Windows devices. The Windows Event Collector device would then forward events to Microsoft Sentinel with the *Windows Forwarded Events* data connector.
8
9
9
10
> [!NOTE]
10
-
> All three connectors are installed from corresponding Content Hub solutions.
11
+
> Microsoft recommends installation of Windows Security Events via AMA Connector. The Legacy connector uses the Log Analytics agent which was deprecated Aug 31, 2024, and thus should only be installed where AMA isn't supported.
11
12
12
13
## Windows Security Events via AMA Connector vs. Security Events via Legacy Agent Connector
13
14
14
15
The Windows Security Events via AMA Connector has the following differences from the Security Events via Legacy Agent Connector:
15
16
16
17
Benefits:
17
-
- Manage collection settings at scale
18
+
19
+
- Manage collection settings at scale
18
20
- Azure Monitoring Agent shared with other solutions
19
21
- Performance improvements
20
22
- Security improvements
21
23
22
24
Limitations:
23
-
- None.
25
+
26
+
- None.
24
27
25
28
Requirements:
26
-
- non-Azure VM's/devices require Azure Arc.
27
29
30
+
- non-Azure VM's/devices require Azure Arc.
28
31
29
32
### Azure Arc
30
-
Azure Arc is an agent installed on the device or VM that allows the device to be managed the same as an Azure VM. Azure Arc provides other functionality including running Azure based services in a hybrid environment.
33
+
34
+
Azure Arc uses the *Azure Connected Machine* agent (azcmagent) installed on the device or VM that allows the device to be managed the same as an Azure VM. Azure Arc provides other functionality including running Azure based services in a hybrid environment.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/includes/2a-configure-data-collection-rules.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,33 +4,31 @@ The Windows Security Events via AMA Connector uses Data Collection Rules (DCRs)
4
4
5
5
-**Build custom filters** to choose the exact events you want to ingest. The Azure Monitor Agent uses these rules to filter the data at the source and ingest only the events you want, while leaving everything else behind.
6
6
7
-
8
-
9
7
## Prerequisites
10
8
11
9
- You must have read and write permissions on the Microsoft Sentinel workspace.
12
10
13
11
- To collect events from any system that isn't an Azure virtual machine, the system must have **Azure Arc** installed and enabled before you enable the Azure Monitor Agent-based connector.
14
12
15
-
This includes:
13
+
These include:
16
14
17
-
- Windows servers installed on physical machines
18
-
- Windows servers installed on on-premises virtual machines
19
-
- Windows servers installed on virtual machines in non-Azure clouds
15
+
- Windows servers installed on physical machines
16
+
- Windows servers installed on on-premises virtual machines
17
+
- Windows servers installed on virtual machines in non-Azure clouds
20
18
21
19
## Connect Windows Hosts
22
20
21
+
1. From the Microsoft Sentinel navigation menu, select Data connectors.
23
22
24
-
1. From the Microsoft Sentinel navigation menu, select Data connectors.
25
-
1. Select the Windows Security Events via AMA connector from the list, and then select Open connector page on the details pane.
23
+
1. Select the Windows Security Events via AMA connector from the list, and then select Open connector page on the details pane.
26
24
27
25
1. Verify that you have the appropriate permissions as described under the Prerequisites section on the connector page.
28
26
29
-
1. Under Configuration, select +Add data collection rule. The Create data collection rule wizard will open to the right.
27
+
1. Under Configuration, select +Add data collection rule. The Create data collection rule wizard opens.
30
28
31
29
1. Under Basics, enter a Rule name and specify a Subscription and Resource group where the data collection rule (DCR) will be created. This doesn't have to be the same resource group or subscription the monitored machines and their associations are in, as long as they are in the same tenant.
32
30
33
-
1. In the Resources tab, select +Add resource(s) to add machines to which the Data Collection Rule will apply. The Select a scope dialog will open, and you'll see a list of available subscriptions. Expand a subscription to see its resource groups, and expand a resource group to see the available machines. You'll see Azure virtual machines and Azure Arc-enabled servers in the list. You can mark the check boxes of subscriptions or resource groups to select all the machines they contain, or you can select individual machines. Select Apply when you've chosen all your machines. At the end of this process, the Azure Monitor Agent will be installed on any selected machines that don't already have it installed.
31
+
1. In the Resources tab, select +Add resource(s) to add machines to which the Data Collection Rule will apply. The Select a scope dialog opens, and you see a list of available subscriptions. Expand a subscription to see its resource groups, and expand a resource group to see the available machines. You see Azure virtual machines and Azure Arc-enabled servers in the list. You can mark the check boxes of subscriptions or resource groups to select all the machines they contain, or you can select individual machines. Select Apply when you've chosen all your machines. At the end of this process, the Azure Monitor Agent is installed on any selected machines that don't already have the agent.
34
32
35
33
1. On the Collect tab, choose the events you would like to collect. Select:
36
34
- All security events
@@ -41,7 +39,7 @@ This includes:
41
39
> [!NOTE]
42
40
>Custom allows you to specify other logs or to filter events using XPath queries. For XPath queries you can enter up to 20 expressions in a single box, and up to 100 boxes in a rule. The Azure Monitor agent supports XPath queries for XPath version 1.0 only.
43
41
44
-
1. When you've added all the filter expressions you want, select Next: Review + create.
42
+
1. When you add all the filter expressions you want, select Next: Review + create.
45
43
46
44
1. When you see the "Validation passed" message, select Create.
47
45
@@ -51,7 +49,7 @@ You'll see all your data collection rules (including those created through the A
51
49
52
50
Use the PowerShell cmdlet Get-WinEvent with the -FilterXPath parameter to test the validity of an XPath query. The following script shows an example:
title: Connect Windows hosts to Microsoft Sentinel
5
5
description: "Connect Windows hosts to Microsoft Sentinel"
6
-
ms.date: 08/16/2022
7
-
author: wwlpublish
6
+
ms.date: 04/09/2025
7
+
author: KenMAG
8
8
ms.author: kelawson
9
9
ms.topic: module
10
10
ms.service: microsoft-sentinel
11
11
title: Connect Windows hosts to Microsoft Sentinel
12
12
summary: One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.
13
13
abstract: |
14
-
Upon completion of this module, the learner will be able to:
14
+
Upon completion of this module, the learner is able to:
15
15
- Connect Azure Windows Virtual Machines to Microsoft Sentinel
16
16
- Connect non-Azure Windows hosts to Microsoft Sentinel
17
17
- Configure Log Analytics agent to collect Sysmon events
0 commit comments