Skip to content

Commit 161c899

Browse files
authored
Merge pull request #49960 from KenMAG/main
Updated unit to use AMA and DCRs
2 parents 8881827 + 6eef395 commit 161c899

File tree

5 files changed

+61
-17
lines changed

5 files changed

+61
-17
lines changed

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/3-collect-sysmon-event-logs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Collect Sysmon event logs
44
metadata:
55
title: Collect Sysmon event logs
66
description: "Collect Sysmon event logs"
7-
ms.date: 08/16/2022
8-
author: wwlpublish
7+
ms.date: 04/10/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
Lines changed: 56 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,69 @@
11
System Monitor (Sysmon) is a Windows system service, and device driver that remains resident across system reboots to monitor and log system activity to the Windows event log once installed on a system. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection or SIEM agents and then analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.
22

3-
>[!Note]
4-
>Installing and configuring Sysmon is out of the scope of this training. Because Sysmon is a telemetry tool that many organizations use, it's essential to know how to configure the Log Analytics Agent and Workspace to collect the Sysmon events.
3+
> [!NOTE]
4+
> Installing and configuring Sysmon is out of the scope of this training. For more information on Sysmon, see [Sysinternals Sysmon](/sysinternals/downloads/sysmon).
55
6-
After connecting the Sysmon agent to the windows machine, perform the following to enable Microsoft Sentinel to query the logs:
6+
After connecting the Sysmon agent to the windows machine, you install the *Windows Forwarded Events* Content hub solution which includes the *Windows Forwarded Events* data connector. The data connector allows you to stream all Windows Event Forwarding (WEF) logs from the Windows Servers connected to your Microsoft Sentinel workspace using Azure Monitor Agent (AMA). In the data connector configuration, you create *Data collection rules* (DCRs) to collect metrics and logs from the client operating system. Perform the following steps to create a DCR and enable Microsoft Sentinel to query the logs:
77

8-
1. Go to your Azure portal.
8+
## Install the solution
99

10-
1. Select **Log Analytics workspaces** from Azure services.
10+
Start by installing the solution that contains the data connector.
1111

12-
1. Select your Log Analytics workspace for Sentinel.
12+
1. For Microsoft Sentinel in the Azure portal, under **Content management**, select **Content hub**. For Microsoft Sentinel in the Defender portal, select **Microsoft Sentinel** > **Content management** > **Content hub**.
1313

14-
1. In the Settings area, select **Legacy agents management**.
14+
1. Search for and select **Windows Forwarded Events**.
1515

16-
1. On, the Windows event logs tab select **+ Add windows event log**.
16+
1. On the details pane, select **Install**.
1717

18-
1. In the **Add windows event log** search box, enter: *Microsoft-Windows-Sysmon/Operational*. Sysmon isn't in the list by default.
18+
## Configure the data connector
1919

20-
1. Then select the **Apply** button
20+
After the solution is installed, connect the data connector.
2121

22-
This connection can also be made from within Sentinel under **Settings > Workspace settings > Legacy agents management**. Once configured, the Sysmon events will be available in the Event table.
22+
1. In the Microsoft Sentinel navigation menu expand **Configuration**, and select **Data connectors**.
2323

24-
:::image type="content" source="../media/sysmon.png" alt-text="Screenshot of Log Analytics Sysmon configuration." lightbox="../media/sysmon.png":::
24+
1. Select the **Windows Forwarded Events** Data connector.
2525

26+
1. Select **+Create data collections rule**.
27+
28+
:::image type="content" source="../media/windows-forwarded-events.png" lightbox="../media/windows-forwarded-events.png" alt-text="Screenshot that shows the Basics tab for a new data collection rule.":::
29+
30+
1. Fill in the following fields of the *Basic* tab:
31+
32+
| Setting | Description |
33+
|:---|:---|
34+
| **Rule Name** | A name for the DCR. The name should be something descriptive that helps you identify the rule. |
35+
| **Subscription** | The subscription to store the DCR. The subscription doesn't need to be the same subscription as the virtual machines. |
36+
| **Resource group** | A resource group to store the DCR. The resource group doesn't need to be the same resource group as the virtual machines. |
37+
38+
1. Select **Next:Resources >**.
39+
40+
1. In the *Resources* tab, expand the **Scope** column, and expand the Microsoft Azure subscription.
41+
42+
1. Expand the resource group or groups, and select the virtual machines you want to connect to Microsoft Sentinel.
43+
44+
1. Select the **Next: Collect >** button, and select **Custom** radio button.
45+
46+
1. As an example, you can enter the following events log location (XPath format) to collect Sysmon events:
47+
48+
```xml
49+
Microsoft-Windows-Sysmon/Operational!*
50+
```
51+
52+
1. Select the **Add** button to add the Sysmon events log location.
53+
54+
1. Select the **Next: Review + create >** button, after validation passes, select **Create**.
55+
56+
:::image type="content" source="../media/sysmon-log-location.png" alt-text="Screenshot of Log Analytics Sysmon configuration." lightbox="../media/sysmon-log-location.png":::
57+
58+
> [!NOTE]
59+
> At the end of this process, the Azure Monitor Agent is installed on any selected machines that don't already have the agent.
60+
61+
1. After the DCR is created, select the **Refresh** button to see the rule. You can also edit or delete existing rules from the **Configuration** section of the connector page.
62+
63+
This connector can use the Advanced Security Information Model (ASIM). Microsoft recommends that you use the ASIM normalization. For more information on ASIM, see [Advanced Security Information Model (ASIM)](/azure/sentinel/normalization).
64+
65+
1. On the **Windows Forwarded Events** connector page, **Configuration** section, select the **Deploy** button.
66+
67+
1. Fill-in the required fields of the **Custom deployment** ARM template, and select **Review + create**.
68+
69+
1. When validation passes, select **Create**.

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@ uid: learn.wwl.connect-windows-hosts-to-azure-sentinel
33
metadata:
44
title: Connect Windows hosts to Microsoft Sentinel
55
description: "Connect Windows hosts to Microsoft Sentinel"
6-
ms.date: 04/09/2025
6+
ms.date: 04/11/2025
77
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Connect Windows hosts to Microsoft Sentinel
12-
summary: One of the most common logs to collect is Windows security events. Learn how Microsoft Sentinel makes this easy with the Security Events connector.
12+
summary: Two of the most common logs to collect are Windows security events and Sysmon. Learn how Microsoft Sentinel makes this easy with the Microsoft Windows Events data connectors.
1313
abstract: |
1414
Upon completion of this module, the learner is able to:
1515
- Connect Azure Windows Virtual Machines to Microsoft Sentinel
1616
- Connect non-Azure Windows hosts to Microsoft Sentinel
17-
- Configure Log Analytics agent to collect Sysmon events
17+
- Install and configure a data connector to collect Sysmon events
1818
prerequisites: |
1919
Basic knowledge of operational concepts such as monitoring, logging, and alerting.
2020
iconUrl: /training/achievements/connect-windows-hosts-to-azure-sentinel.svg
78.7 KB
Loading
296 KB
Loading

0 commit comments

Comments
 (0)