Forum Discussion

FahadAhmed's avatar
FahadAhmed
Brass Contributor
Nov 22, 2021
Solved

Collecting DNS logs from multiple DNS sources and forwarding to Azure Sentinel

Hi folks,

 

We have a scenario where one of the client has setup a windows based Log Collector to collect DNS logs from multiple DNS servers ( I am assuming they are using wincollect). Client doesnt want to install the MMA agent on all DNS servers rather wants to have the agent installed on their Log Collector (Windows Machines used for collecting logs) and use it to forward the logs to Azure Sentinel.

 

 

I have made up simple architecture diagram to explain the same. The following are my questions:

 

1. Can MMA agent forward the DNS event logs to the Azure Sentinel ( I am assuming it will take all the logs in the windows event viewer and send them to Azure Sentinel)

2. There are two possibilities interms of log collection, the collected DNS logs from multiple servers will either be stored in local files or in event viewer. Incase they are in event viewer, I think MMA agent will automatically pick them up and send to sentinel? 

3. Incase, they are stored in file locally on the server, which agent will be required? I dont see any option in sentinel to pick logs from custom locations?

 

Can any one help identifying which agent can actually pick up the logs collected and forward to sentinel.

 

Need some quick advise here.

 

Thanks

Fahad.

 

 

Resources