Skip to content

Commit 6c116cf

Browse files
authored
Merge pull request #49930 from KenMAG/main
Updated unit to use the AMA data connector.
2 parents 0890a4d + 8ab286f commit 6c116cf

File tree

3 files changed

+54
-19
lines changed

3 files changed

+54
-19
lines changed

learn-pr/wwl-sci/connect-windows-hosts-to-azure-sentinel/2b-connect-windows-hosts.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Connect using the Security Events via Legacy Agent Connector
44
metadata:
55
title: Connect using the Security Events via Legacy Agent Connector
66
description: "Connect using the Security Events via Legacy Agent Connector"
7-
ms.date: 08/16/2022
8-
author: wwlpublish
7+
ms.date: 04/09/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
azureSandbox: false
Lines changed: 52 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,19 @@
1-
The Security Events via Legacy Agent connector lets you stream all security events from your Windows systems (servers and workstations, physical and virtual) to your Microsoft Sentinel workspace. This enables you to view Windows security events in your dashboards, use them to create custom alerts, and rely on them to improve your investigations. You now have more insight into your organization's network and expanding your security operations capabilities. You can select which events to stream from among the following sets:
1+
The *Windows Security Events via AMA* connector lets you stream all security events from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to view dashboards, create custom alerts, and improve investigation. These events give you more insight into your organizations network and improve your security operation capabilities.
22

3-
- All events - All Windows security and AppLocker events.
3+
- All Security Events - All Windows security and AppLocker events.
44

55
- Common - A standard set of events for auditing purposes. A full user audit trail is included in this set. For example, it contains both user sign-in and user sign-out events (event IDs 4624, 4634). There are also auditing actions such as security group changes, key domain controller Kerberos operations, and other types of events in line with accepted best practices.
66

7-
- The Common event set may contain some types of events that aren't so common. This is because the main point of the Common set is to reduce the volume of events to a more manageable level while still maintaining full audit trail capability.
7+
- The Common event set can contain some types of events that aren't so common. This is because the main point of the Common set is to reduce the volume of events to a more manageable level while still maintaining full audit trail capability.
88

99
- Minimal - A small set of events that might indicate potential threats. This set doesn't contain a full audit trail. It covers only events that might indicate a successful breach and other significant events with low rates of occurrence. For example, it contains successful and failed user logons (event IDs 4624, 4625). Still, it doesn't contain sign-out information (4634), which, while important for auditing, isn't meaningful for breach detection and has a relatively high volume. Most of this set's data volume comprises sign-in events and process creation events (event ID 4688).
1010

11-
- None - No security or AppLocker events. (This setting is used to disable the connector.)
11+
- Custom - Custom allows you to specify other logs or to filter events using XPath queries.
12+
13+
> [!NOTE]
14+
> Query the *SecurityEvents* table in Microsoft Sentinel *Logs* to see the events collected by the connector.
15+
16+
- The *Windows Security Events via AMA* connector uses Data Collection Rules (DCRs) to define the data to collect, and installs the Azure Monitor Agent (AMA) extension on the selected machines.
1217

1318
:::image type="content" source="../media/security-events-connector.png" alt-text="Screenshot of the Security Events Connector Page." lightbox="../media/security-events-connector.png":::
1419

@@ -18,40 +23,70 @@ To view the connector page:
1823

1924
1. Select **Data connectors page**.
2025

21-
1. Select **Security Events via Legacy Agent**.
26+
1. Select **Windows Security Events via AMA**.
2227

23-
1. Then select the **Open connector** page on the preview pane.
28+
1. Then select the **Open connector page** button on the preview pane.
2429

2530
1. Verify that you have the appropriate permissions as described under Prerequisites.
2631

27-
1. Select **Install agent on Azure Windows Virtual Machine**, and then on the link that appears below.
32+
1. In the *Configuration* section, select the **+Create data collection rule** button.
33+
34+
1. Enter a *Rule name*, select the appropriate *Subscription* and *Resource group* where the data collection rule (DCR) will be created.
35+
36+
1. Select **Next: Resources**.
37+
38+
1. Expand your *Subscription* under *Scope* on the *Resources* tab.
39+
40+
> [!TIP]
41+
> You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
42+
43+
1. Expand the resource group, and then select Azure virtual machines.
2844

29-
1. For each virtual machine that you want to connect, select its name in the list that appears on the right, and then select **Connect**.
45+
1. Select **Next: Collect**.
3046

31-
1. Select which event set ([All, Common, or Minimal](/azure/sentinel/connect-windows-security-events?azure-portal=true)) you want to stream.
47+
1. Review the different Security Event collection option. The default is Keep *All Security Events*.
3248

33-
1. Select **Apply Changes**.
49+
1. Select **Next: Review + create**.
50+
51+
1. Select **Create** to save the Data Collection Rule.
52+
53+
1. Wait a minute and then select **Refresh** to see the new data collection rule listed.
3454

3555
## Connect non-Azure Windows Machines
3656

57+
In this task, you add an Azure Arc connected, non-Azure Windows virtual machine to Microsoft Sentinel.
58+
59+
> [!NOTE]
60+
> The *Windows Security Events via AMA* data connector requires Azure Arc for non-Azure devices.
61+
3762
To view the connector page:
3863

3964
1. Select **Data connectors** page.
4065

41-
1. Select **Security Events via Legacy Agent**.
66+
1. Select **Windows Security Events via AMA**.
4267

4368
1. Then select the **Open connector** page on the preview pane.
4469

4570
1. Verify that you have the appropriate permissions as described under Prerequisites.
4671

47-
1. Select **Install agent on non-Azure Windows Machine**, and then on the link that appears below.
72+
1. In the *Configuration* section, edit the previously completed *data collection rule* by selecting the *pencil* icon.
73+
74+
1. Expand your *Subscription* under *Scope* on the *Resources* tab.
75+
76+
> [!TIP]
77+
> You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
78+
79+
1. Expand the resource group, and then select Azure virtual machines.
80+
81+
> [!IMPORTANT]
82+
> If you don't see any non-Azure Windows machines, open *Azure Arc* to verify the machines are connected to Azure Arc.
4883
49-
1. Select the appropriate download links that appear on the right, under Windows Computers.
84+
1. Select **Next: Collect**.
5085

51-
1. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the Workspace ID and Keys that appear below the download links mentioned above.
86+
1. Review the different Security Event collection option. The default is Keep *All Security Events*.
5287

53-
1. Select which event set (All, Common, or Minimal) you want to stream.
88+
1. Select **Next: Review + create**.
5489

55-
1. Select **Apply Changes**.
90+
1. Select **Create** to save the Data Collection Rule.
5691

57-
:::image type="content" source="../media/agent-download.png" alt-text="Screenshot of the Log Analytics agent download." lightbox="../media/agent-download.png":::
92+
1. Wait a minute and then select **Refresh** to see the new data collection rule listed.
271 KB
Loading

0 commit comments

Comments
 (0)