Forum Discussion

unixdespair's avatar
unixdespair
Copper Contributor
Mar 01, 2019

Adding On-Prem Domain Controller Event Logs

We've added several sources (ASA, syslog, multiple Azure sources) .. what is the best way to get our on-prem domain controllers to feed into Sentinel?

  • endakelly's avatar
    endakelly
    Brass Contributor

    unixdespair If you've got an Azure Security Centre standard subscription, you can install the Microsoft Monitoring Agent and link it to ASC. This will collect logs from the machine. You can then connect ASC to Sentinel.

    • mayilragavan's avatar
      mayilragavan
      Copper Contributor

      jspaid1592 

       

      Hi, so you had proposed two solution for this... As we have installed Azure ATP sensor in our DC's, will that be fine to forward all the events to Azure ATP to Sentinel?

       

      Can you please provide me the method which is apart for Log analytics?

       

      Or Log Analytics is the only solution as now?

      • jspaid1592's avatar
        jspaid1592
        Copper Contributor

        mayilragavan, AATP won't forward the logs from the machines. Just roll-up alerts from AATP itself. That's why you still have to put the MMA agent on the DC VMs; that will load the raw logs into the workspace.

      • ghedico's avatar
        ghedico
        Copper Contributor

        I was just wondering the same thing.

         

        I found a document about setting up the Windows security events connector (https://docs.microsoft.com/en-us/azure/sentinel/connect-windows-security-events) but it didn't say what else needs to be done.

         

        In your Sentinel workspace if you click 'Workspace Settings' there's a "Get started with Log Analytics" section and link "Windows, Linux and other sources" where you can download the agent and get the workspace ID.

         

        I've hit my free tier limit so I can't quite test it yet, but I'll try it later.

         

         

Resources