You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Security Events via Legacy Agent connector lets you stream all security events from your Windows systems (servers and workstations, physical and virtual) to your Microsoft Sentinel workspace. This enables you to view Windows security events in your dashboards, use them to create custom alerts, and rely on them to improve your investigations. You now have more insight into your organization's network and expanding your security operations capabilities. You can select which events to stream from among the following sets:
1
+
The *Windows Security Events via AMA*connector lets you stream all security events from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to view dashboards, create custom alerts, and improve investigation. These events give you more insight into your organization’s network and improve your security operation capabilities.
2
2
3
-
- All events - All Windows security and AppLocker events.
3
+
- All Security Events - All Windows security and AppLocker events.
4
4
5
5
- Common - A standard set of events for auditing purposes. A full user audit trail is included in this set. For example, it contains both user sign-in and user sign-out events (event IDs 4624, 4634). There are also auditing actions such as security group changes, key domain controller Kerberos operations, and other types of events in line with accepted best practices.
6
6
7
-
- The Common event set may contain some types of events that aren't so common. This is because the main point of the Common set is to reduce the volume of events to a more manageable level while still maintaining full audit trail capability.
7
+
- The Common event set can contain some types of events that aren't so common. This is because the main point of the Common set is to reduce the volume of events to a more manageable level while still maintaining full audit trail capability.
8
8
9
9
- Minimal - A small set of events that might indicate potential threats. This set doesn't contain a full audit trail. It covers only events that might indicate a successful breach and other significant events with low rates of occurrence. For example, it contains successful and failed user logons (event IDs 4624, 4625). Still, it doesn't contain sign-out information (4634), which, while important for auditing, isn't meaningful for breach detection and has a relatively high volume. Most of this set's data volume comprises sign-in events and process creation events (event ID 4688).
10
10
11
-
- None - No security or AppLocker events. (This setting is used to disable the connector.)
11
+
- Custom - Custom allows you to specify other logs or to filter events using XPath queries.
12
+
13
+
> [!NOTE]
14
+
> Query the *SecurityEvents* table in Microsoft Sentinel *Logs* to see the events collected by the connector.
15
+
16
+
- The *Windows Security Events via AMA* connector uses Data Collection Rules (DCRs) to define the data to collect, and installs the Azure Monitor Agent (AMA) extension on the selected machines.
12
17
13
18
:::image type="content" source="../media/security-events-connector.png" alt-text="Screenshot of the Security Events Connector Page." lightbox="../media/security-events-connector.png":::
14
19
@@ -18,40 +23,70 @@ To view the connector page:
18
23
19
24
1. Select **Data connectors page**.
20
25
21
-
1. Select **Security Events via Legacy Agent**.
26
+
1. Select **Windows Security Events via AMA**.
22
27
23
-
1. Then select the **Open connector**page on the preview pane.
28
+
1. Then select the **Open connector page**button on the preview pane.
24
29
25
30
1. Verify that you have the appropriate permissions as described under Prerequisites.
26
31
27
-
1. Select **Install agent on Azure Windows Virtual Machine**, and then on the link that appears below.
32
+
1. In the *Configuration* section, select the **+Create data collection rule** button.
33
+
34
+
1. Enter a *Rule name*, select the appropriate *Subscription* and *Resource group* where the data collection rule (DCR) will be created.
35
+
36
+
1. Select **Next: Resources**.
37
+
38
+
1. Expand your *Subscription* under *Scope* on the *Resources* tab.
39
+
40
+
> [!TIP]
41
+
> You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
42
+
43
+
1. Expand the resource group, and then select Azure virtual machines.
28
44
29
-
1.For each virtual machine that you want to connect, select its name in the list that appears on the right, and then select **Connect**.
45
+
1.Select **Next: Collect**.
30
46
31
-
1.Select which event set ([All, Common, or Minimal](/azure/sentinel/connect-windows-security-events?azure-portal=true)) you want to stream.
47
+
1.Review the different Security Event collection option. The default is Keep *All Security Events*.
32
48
33
-
1. Select **Apply Changes**.
49
+
1. Select **Next: Review + create**.
50
+
51
+
1. Select **Create** to save the Data Collection Rule.
52
+
53
+
1. Wait a minute and then select **Refresh** to see the new data collection rule listed.
34
54
35
55
## Connect non-Azure Windows Machines
36
56
57
+
In this task, you add an Azure Arc connected, non-Azure Windows virtual machine to Microsoft Sentinel.
58
+
59
+
> [!NOTE]
60
+
> The *Windows Security Events via AMA* data connector requires Azure Arc for non-Azure devices.
61
+
37
62
To view the connector page:
38
63
39
64
1. Select **Data connectors** page.
40
65
41
-
1. Select **Security Events via Legacy Agent**.
66
+
1. Select **Windows Security Events via AMA**.
42
67
43
68
1. Then select the **Open connector** page on the preview pane.
44
69
45
70
1. Verify that you have the appropriate permissions as described under Prerequisites.
46
71
47
-
1. Select **Install agent on non-Azure Windows Machine**, and then on the link that appears below.
72
+
1. In the *Configuration* section, edit the previously completed *data collection rule* by selecting the *pencil* icon.
73
+
74
+
1. Expand your *Subscription* under *Scope* on the *Resources* tab.
75
+
76
+
> [!TIP]
77
+
> You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
78
+
79
+
1. Expand the resource group, and then select Azure virtual machines.
80
+
81
+
> [!IMPORTANT]
82
+
> If you don't see any non-Azure Windows machines, open *Azure Arc* to verify the machines are connected to Azure Arc.
48
83
49
-
1. Select the appropriate download links that appear on the right, under Windows Computers.
84
+
1. Select **Next: Collect**.
50
85
51
-
1.Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the Workspace ID and Keys that appear below the download links mentioned above.
86
+
1.Review the different Security Event collection option. The default is Keep *All Security Events*.
52
87
53
-
1. Select which event set (All, Common, or Minimal) you want to stream.
88
+
1. Select **Next: Review + create**.
54
89
55
-
1. Select **Apply Changes**.
90
+
1. Select **Create** to save the Data Collection Rule.
56
91
57
-
:::image type="content" source="../media/agent-download.png" alt-text="Screenshot of the Log Analytics agent download." lightbox="../media/agent-download.png":::
92
+
1. Wait a minute and then select **Refresh** to see the new data collection rule listed.
0 commit comments