Skip to content

Commit 3a004af

Browse files
author
Ken Lawson
committed
Updated unit to for the AMA data connector.
1 parent c3aca0a commit 3a004af

File tree

2 files changed

+48
-16
lines changed

2 files changed

+48
-16
lines changed
Lines changed: 48 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
1-
The Security Events via Legacy Agent connector lets you stream all security events from your Windows systems (servers and workstations, physical and virtual) to your Microsoft Sentinel workspace. This enables you to view Windows security events in your dashboards, use them to create custom alerts, and rely on them to improve your investigations. You now have more insight into your organization's network and expanding your security operations capabilities. You can select which events to stream from among the following sets:
1+
The *Windows Security Events via AMA* connector lets you stream all security events from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to view dashboards, create custom alerts, and improve investigation. These events give you more insight into your organizations network and improves your security operation capabilities.
22

3-
- All events - All Windows security and AppLocker events.
3+
- All Security Events - All Windows security and AppLocker events.
44

55
- Common - A standard set of events for auditing purposes. A full user audit trail is included in this set. For example, it contains both user sign-in and user sign-out events (event IDs 4624, 4634). There are also auditing actions such as security group changes, key domain controller Kerberos operations, and other types of events in line with accepted best practices.
66

77
- The Common event set may contain some types of events that aren't so common. This is because the main point of the Common set is to reduce the volume of events to a more manageable level while still maintaining full audit trail capability.
88

99
- Minimal - A small set of events that might indicate potential threats. This set doesn't contain a full audit trail. It covers only events that might indicate a successful breach and other significant events with low rates of occurrence. For example, it contains successful and failed user logons (event IDs 4624, 4625). Still, it doesn't contain sign-out information (4634), which, while important for auditing, isn't meaningful for breach detection and has a relatively high volume. Most of this set's data volume comprises sign-in events and process creation events (event ID 4688).
1010

11-
- None - No security or AppLocker events. (This setting is used to disable the connector.)
11+
- Custom - Custom allows you to specify other logs or to filter events using XPath queries.
12+
13+
>**Note:** Query the *SecurityEvents* table in Microsoft Sentinel *Logs* to see the events collected by the connector.
14+
15+
- The *Windows Security Events via AMA* connector uses Data Collection Rules (DCRs) to define the data to collect, and installs the Azure Monitor Agent (AMA) extension on the selected machines.
1216

1317
:::image type="content" source="../media/security-events-connector.png" alt-text="Screenshot of the Security Events Connector Page." lightbox="../media/security-events-connector.png":::
1418

@@ -18,40 +22,68 @@ To view the connector page:
1822

1923
1. Select **Data connectors page**.
2024

21-
1. Select **Security Events via Legacy Agent**.
25+
1. Select **Windows Security Events via AMA**.
2226

23-
1. Then select the **Open connector** page on the preview pane.
27+
1. Then select the **Open connector page** button on the preview pane.
2428

2529
1. Verify that you have the appropriate permissions as described under Prerequisites.
2630

27-
1. Select **Install agent on Azure Windows Virtual Machine**, and then on the link that appears below.
31+
1. In the *Configuration* section, select the **+Create data collection rule** button.
32+
33+
1. Enter a *Rule name*, select the appropriate *Subscription* and *Resource group* where the data collection rule (DCR) will be created.
34+
35+
1.vSelect **Next: Resources**.
36+
37+
1. Expand your *Subscription* under *Scope* on the *Resources* tab.
38+
39+
>**Hint:** You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
40+
41+
1. Expand the resource group, and then select Azure virtual machines.
42+
43+
1. Select **Next: Collect**.
2844

29-
1. For each virtual machine that you want to connect, select its name in the list that appears on the right, and then select **Connect**.
45+
1. Review the different Security Event collection option. The default is Keep *All Security Events*.
3046

31-
1. Select which event set ([All, Common, or Minimal](/azure/sentinel/connect-windows-security-events?azure-portal=true)) you want to stream.
47+
1. Select **Next: Review + create**.
3248

33-
1. Select **Apply Changes**.
49+
1. Select **Create** to save the Data Collection Rule.
50+
51+
1. Wait a minute and then select **Refresh** to see the new data collection rule listed.
3452

3553
## Connect non-Azure Windows Machines
3654

55+
In this task, you add an Azure Arc connected, non-Azure Windows virtual machine to Microsoft Sentinel.
56+
57+
>**Note:** The *Windows Security Events via AMA* data connector requires Azure Arc for non-Azure devices.
58+
59+
1. Make sure you are in the *Windows Security Events via AMA* data connector configuration in your Microsoft Sentinel workspace.
60+
3761
To view the connector page:
3862

3963
1. Select **Data connectors** page.
4064

41-
1. Select **Security Events via Legacy Agent**.
65+
1. Select **Windows Security Events via AMA**.
4266

4367
1. Then select the **Open connector** page on the preview pane.
4468

4569
1. Verify that you have the appropriate permissions as described under Prerequisites.
4670

47-
1. Select **Install agent on non-Azure Windows Machine**, and then on the link that appears below.
71+
1. In the *Configuration* section, edit the previously completed *data collection rule* by selecting the *pencil* icon.
72+
73+
1. Expand your *Subscription* under *Scope* on the *Resources* tab.
74+
75+
>**Hint:** You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
76+
77+
1. Expand the resource group, and then select Azure virtual machines.
78+
79+
>**Important:** If you do not see any non-Azure Windows machines, open *Azure Arc* to verify the machines are connected to Azure Arc.
4880
49-
1. Select the appropriate download links that appear on the right, under Windows Computers.
81+
1. Select **Next: Collect**.
5082

51-
1. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the Workspace ID and Keys that appear below the download links mentioned above.
83+
1. Review the different Security Event collection option. The default is Keep *All Security Events*.
5284

53-
1. Select which event set (All, Common, or Minimal) you want to stream.
85+
1. Select **Next: Review + create**.
5486

55-
1. Select **Apply Changes**.
87+
1. Select **Create** to save the Data Collection Rule.
5688

57-
:::image type="content" source="../media/agent-download.png" alt-text="Screenshot of the Log Analytics agent download." lightbox="../media/agent-download.png":::
89+
1. Wait a minute and then select **Refresh** to see the new data collection rule listed.
271 KB
Loading

0 commit comments

Comments
 (0)