Skip to content

Commit 0890a4d

Browse files
authored
Merge pull request #49926 from KenMAG/main
Revised units for content freshness
2 parents 578b2c4 + c3aca0a commit 0890a4d

File tree

5 files changed

+29
-27
lines changed

5 files changed

+29
-27
lines changed

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/2-plan-for-windows-hosts-security-events-connector.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Plan for Windows hosts security events connector
44
metadata:
55
title: Plan for Windows hosts security events connector
66
description: "Plan for Windows hosts security events connector"
7-
ms.date: 08/16/2022
8-
author: wwlpublish
7+
ms.date: 04/09/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/2a-configure-data-collection-rules.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Connect using the Windows Security Events via AMA Connector
44
metadata:
55
title: Connect using the Windows Security Events via AMA Connector
66
description: "Connect using the Windows Security Events via AMA Connector"
7-
ms.date: 08/16/2022
8-
author: wwlpublish
7+
ms.date: 04/09/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,34 @@
1-
You have three Windows security events connector options to stream events from Windows devices to Microsoft Sentinel.
1+
You have two Windows security events Content Hub solution options to stream events from Windows devices to Microsoft Sentinel.
2+
3+
The first option is to install the *Windows Security Events* Content Hub solution. You can choose either of the two agent data connectors available:
24

3-
Based on your organization requirements, you have the option of installing an agent on each windows device to forward events to Microsoft Sentinel. There are two agents available:
45
- Windows Security Events via AMA Connector
56
- Security Events via Legacy Agent Connector
67

7-
The third option is to configure a Windows Event Collector device to receive events from the Windows devices. The Windows Event Collector device would then forward events to Microsoft Sentinel with the **Windows Forwarded Events connector**.
8+
The second option is to install the *Windows Forwarded Events* Content Hub solution and configure a Windows Event Collector device to receive events from the Windows devices. The Windows Event Collector device would then forward events to Microsoft Sentinel with the *Windows Forwarded Events* data connector.
89

910
> [!NOTE]
10-
> All three connectors are installed from corresponding Content Hub solutions.
11+
> Microsoft recommends installation of Windows Security Events via AMA Connector. The Legacy connector uses the Log Analytics agent which was deprecated Aug 31, 2024, and thus should only be installed where AMA isn't supported.
1112
1213
## Windows Security Events via AMA Connector vs. Security Events via Legacy Agent Connector
1314

1415
The Windows Security Events via AMA Connector has the following differences from the Security Events via Legacy Agent Connector:
1516

1617
Benefits:
17-
- Manage collection settings at scale
18+
19+
- Manage collection settings at scale
1820
- Azure Monitoring Agent shared with other solutions
1921
- Performance improvements
2022
- Security improvements
2123

2224
Limitations:
23-
- None.
25+
26+
- None.
2427

2528
Requirements:
26-
- non-Azure VM's/devices require Azure Arc.
2729

30+
- non-Azure VM's/devices require Azure Arc.
2831

2932
### Azure Arc
30-
Azure Arc is an agent installed on the device or VM that allows the device to be managed the same as an Azure VM. Azure Arc provides other functionality including running Azure based services in a hybrid environment.
33+
34+
Azure Arc uses the *Azure Connected Machine* agent (azcmagent) installed on the device or VM that allows the device to be managed the same as an Azure VM. Azure Arc provides other functionality including running Azure based services in a hybrid environment.

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/includes/2a-configure-data-collection-rules.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,33 +4,31 @@ The Windows Security Events via AMA Connector uses Data Collection Rules (DCRs)
44

55
- **Build custom filters** to choose the exact events you want to ingest. The Azure Monitor Agent uses these rules to filter the data at the source and ingest only the events you want, while leaving everything else behind.
66

7-
8-
97
## Prerequisites
108

119
- You must have read and write permissions on the Microsoft Sentinel workspace.
1210

1311
- To collect events from any system that isn't an Azure virtual machine, the system must have **Azure Arc** installed and enabled before you enable the Azure Monitor Agent-based connector.
1412

15-
This includes:
13+
These include:
1614

17-
- Windows servers installed on physical machines
18-
- Windows servers installed on on-premises virtual machines
19-
- Windows servers installed on virtual machines in non-Azure clouds
15+
- Windows servers installed on physical machines
16+
- Windows servers installed on on-premises virtual machines
17+
- Windows servers installed on virtual machines in non-Azure clouds
2018

2119
## Connect Windows Hosts
2220

21+
1. From the Microsoft Sentinel navigation menu, select Data connectors.
2322

24-
1. From the Microsoft Sentinel navigation menu, select Data connectors.
25-
1. Select the Windows Security Events via AMA connector from the list, and then select Open connector page on the details pane.
23+
1. Select the Windows Security Events via AMA connector from the list, and then select Open connector page on the details pane.
2624

2725
1. Verify that you have the appropriate permissions as described under the Prerequisites section on the connector page.
2826

29-
1. Under Configuration, select +Add data collection rule. The Create data collection rule wizard will open to the right.
27+
1. Under Configuration, select +Add data collection rule. The Create data collection rule wizard opens.
3028

3129
1. Under Basics, enter a Rule name and specify a Subscription and Resource group where the data collection rule (DCR) will be created. This doesn't have to be the same resource group or subscription the monitored machines and their associations are in, as long as they are in the same tenant.
3230

33-
1. In the Resources tab, select +Add resource(s) to add machines to which the Data Collection Rule will apply. The Select a scope dialog will open, and you'll see a list of available subscriptions. Expand a subscription to see its resource groups, and expand a resource group to see the available machines. You'll see Azure virtual machines and Azure Arc-enabled servers in the list. You can mark the check boxes of subscriptions or resource groups to select all the machines they contain, or you can select individual machines. Select Apply when you've chosen all your machines. At the end of this process, the Azure Monitor Agent will be installed on any selected machines that don't already have it installed.
31+
1. In the Resources tab, select +Add resource(s) to add machines to which the Data Collection Rule will apply. The Select a scope dialog opens, and you see a list of available subscriptions. Expand a subscription to see its resource groups, and expand a resource group to see the available machines. You see Azure virtual machines and Azure Arc-enabled servers in the list. You can mark the check boxes of subscriptions or resource groups to select all the machines they contain, or you can select individual machines. Select Apply when you've chosen all your machines. At the end of this process, the Azure Monitor Agent is installed on any selected machines that don't already have the agent.
3432

3533
1. On the Collect tab, choose the events you would like to collect. Select:
3634
- All security events
@@ -41,7 +39,7 @@ This includes:
4139
> [!NOTE]
4240
>Custom allows you to specify other logs or to filter events using XPath queries. For XPath queries you can enter up to 20 expressions in a single box, and up to 100 boxes in a rule. The Azure Monitor agent supports XPath queries for XPath version 1.0 only.
4341
44-
1. When you've added all the filter expressions you want, select Next: Review + create.
42+
1. When you add all the filter expressions you want, select Next: Review + create.
4543

4644
1. When you see the "Validation passed" message, select Create.
4745

@@ -51,7 +49,7 @@ You'll see all your data collection rules (including those created through the A
5149

5250
Use the PowerShell cmdlet Get-WinEvent with the -FilterXPath parameter to test the validity of an XPath query. The following script shows an example:
5351

54-
```PowerShell
52+
```powershell
5553
$XPath = '*[System[EventID=1035]]'
5654
Get-WinEvent -LogName 'Application' -FilterXPath $XPath
5755
```

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ uid: learn.wwl.connect-windows-hosts-to-azure-sentinel
33
metadata:
44
title: Connect Windows hosts to Microsoft Sentinel
55
description: "Connect Windows hosts to Microsoft Sentinel"
6-
ms.date: 08/16/2022
7-
author: wwlpublish
6+
ms.date: 04/09/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Connect Windows hosts to Microsoft Sentinel
1212
summary: One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.
1313
abstract: |
14-
Upon completion of this module, the learner will be able to:
14+
Upon completion of this module, the learner is able to:
1515
- Connect Azure Windows Virtual Machines to Microsoft Sentinel
1616
- Connect non-Azure Windows hosts to Microsoft Sentinel
1717
- Configure Log Analytics agent to collect Sysmon events

0 commit comments

Comments
 (0)