|
1 | 1 | System Monitor (Sysmon) is a Windows system service, and device driver that remains resident across system reboots to monitor and log system activity to the Windows event log once installed on a system. It provides detailed information about process creations, network connections, and changes to file creation time. By collecting the events it generates using Windows Event Collection or SIEM agents and then analyzing them, you can identify malicious or anomalous activity and understand how intruders and malware operate on your network.
|
2 | 2 |
|
3 |
| ->[!Note] |
4 |
| ->Installing and configuring Sysmon is out of the scope of this training. Because Sysmon is a telemetry tool that many organizations use, it's essential to know how to configure the Log Analytics Agent and Workspace to collect the Sysmon events. |
| 3 | + > [!NOTE] |
| 4 | + > Installing and configuring Sysmon is out of the scope of this training. For more information on Sysmon, see [Sysinternals Sysmon](/sysinternals/downloads/sysmon). |
5 | 5 |
|
6 |
| -After connecting the Sysmon agent to the windows machine, perform the following to enable Microsoft Sentinel to query the logs: |
| 6 | +After connecting the Sysmon agent to the windows machine, you install the *Windows Forwarded Events* Content hub solution which includes the *Windows Forwarded Events* data connector. The data connector allows you to stream all Windows Event Forwarding (WEF) logs from the Windows Servers connected to your Microsoft Sentinel workspace using Azure Monitor Agent (AMA). In the data connector configuration, you create *Data collection rules* (DCRs) to collect metrics and logs from the client operating system. Perform the following steps to create a DCR and enable Microsoft Sentinel to query the logs: |
7 | 7 |
|
8 |
| -1. Go to your Azure portal. |
| 8 | +## Install the solution |
9 | 9 |
|
10 |
| -1. Select **Log Analytics workspaces** from Azure services. |
| 10 | +Start by installing the solution that contains the data connector. |
11 | 11 |
|
12 |
| -1. Select your Log Analytics workspace for Sentinel. |
| 12 | +1. For Microsoft Sentinel in the Azure portal, under **Content management**, select **Content hub**. For Microsoft Sentinel in the Defender portal, select **Microsoft Sentinel** > **Content management** > **Content hub**. |
13 | 13 |
|
14 |
| -1. In the Settings area, select **Legacy agents management**. |
| 14 | +1. Search for and select **Windows Forwarded Events**. |
15 | 15 |
|
16 |
| -1. On, the Windows event logs tab select **+ Add windows event log**. |
| 16 | +1. On the details pane, select **Install**. |
17 | 17 |
|
18 |
| -1. In the **Add windows event log** search box, enter: *Microsoft-Windows-Sysmon/Operational*. Sysmon isn't in the list by default. |
| 18 | +## Configure the data connector |
19 | 19 |
|
20 |
| -1. Then select the **Apply** button |
| 20 | +After the solution is installed, connect the data connector. |
21 | 21 |
|
22 |
| -This connection can also be made from within Sentinel under **Settings > Workspace settings > Legacy agents management**. Once configured, the Sysmon events will be available in the Event table. |
| 22 | +1. In the Microsoft Sentinel navigation menu expand **Configuration**, and select **Data connectors**. |
23 | 23 |
|
24 |
| -:::image type="content" source="../media/sysmon.png" alt-text="Screenshot of Log Analytics Sysmon configuration." lightbox="../media/sysmon.png"::: |
| 24 | +1. Select the **Windows Forwarded Events** Data connector. |
25 | 25 |
|
| 26 | +1. Select **+Create data collections rule**. |
| 27 | + |
| 28 | + :::image type="content" source="../media/windows-forwarded-events.png" lightbox="../media/windows-forwarded-events.png" alt-text="Screenshot that shows the Basics tab for a new data collection rule."::: |
| 29 | + |
| 30 | +1. Fill in the following fields of the *Basic* tab: |
| 31 | + |
| 32 | + | Setting | Description | |
| 33 | + |:---|:---| |
| 34 | + | **Rule Name** | A name for the DCR. The name should be something descriptive that helps you identify the rule. | |
| 35 | + | **Subscription** | The subscription to store the DCR. The subscription doesn't need to be the same subscription as the virtual machines. | |
| 36 | + | **Resource group** | A resource group to store the DCR. The resource group doesn't need to be the same resource group as the virtual machines. | |
| 37 | + |
| 38 | +1. Select **Next:Resources >**. |
| 39 | + |
| 40 | +1. In the *Resources* tab, expand the **Scope** column, and expand the Microsoft Azure subscription. |
| 41 | + |
| 42 | +1. Expand the resource group or groups, and select the virtual machines you want to connect to Microsoft Sentinel. |
| 43 | + |
| 44 | +1. Select the **Next: Collect >** button, and select **Custom** radio button. |
| 45 | + |
| 46 | +1. As an example, you can enter the following events log location (XPath format) to collect Sysmon events: |
| 47 | + |
| 48 | + ```xml |
| 49 | + Microsoft-Windows-Sysmon/Operational!* |
| 50 | + ``` |
| 51 | + |
| 52 | +1. Select the **Add** button to add the Sysmon events log location. |
| 53 | + |
| 54 | +1. Select the **Next: Review + create >** button, after validation passes, select **Create**. |
| 55 | + |
| 56 | + :::image type="content" source="../media/sysmon-log-location.png" alt-text="Screenshot of Log Analytics Sysmon configuration." lightbox="../media/sysmon-log-location.png"::: |
| 57 | + |
| 58 | + > [!NOTE] |
| 59 | + > At the end of this process, the Azure Monitor Agent is installed on any selected machines that don't already have the agent. |
| 60 | + |
| 61 | +1. After the DCR is created, select the **Refresh** button to see the rule. You can also edit or delete existing rules from the **Configuration** section of the connector page. |
| 62 | + |
| 63 | +This connector can use the Advanced Security Information Model (ASIM). Microsoft recommends that you use the ASIM normalization. For more information on ASIM, see [Advanced Security Information Model (ASIM)](/azure/sentinel/normalization). |
| 64 | + |
| 65 | +1. On the **Windows Forwarded Events** connector page, **Configuration** section, select the **Deploy** button. |
| 66 | + |
| 67 | +1. Fill-in the required fields of the **Custom deployment** ARM template, and select **Review + create**. |
| 68 | + |
| 69 | +1. When validation passes, select **Create**. |
0 commit comments