Forum Discussion
Separating Logs for RBAC
Hi,
I'm in the process of setting up Sentinel with a number of log sources being sent via CEF. It appears that all the logs will go into the CommonSecurityEvents table which I need to separate out. Ideally I'd like to maintain a single Log Analytics workspace and have separate tables for each source (VPN/Firewall,WebGW etc) so I can grant each team access to the tables they need to query.
Is there a way to have the CEF events from a specific on-prem collector write to a specific table? Or is there a better to be separating out these log sources in the same workspace?
12 Replies
- Lewis-HIron ContributorThe easiest way to get started is to view the activity logs with the Azure portal. The following screenshot shows an example of role assignment operations in the activity log. It also includes an option to download the logs as a CSV file.
Activity logs using the portal - screenshot
The activity log in the portal has several filters. - Ofer_Shezaf
Microsoft
- SimonRBrass Contributor
Ofer_Shezaf thanks for this, I'd rather not deploy LogStash if I don't have to, the only reason for separate table would be if I couldn't split the logs in any other way, but it looks like resource RBAC might work for us.
Based on what I've read from you link, I'd need a separate collector VM for each access boundary. For example if both the firewall and web proxy logs will only be accessed by the Network team then I'll send them via the same Collector VM.
Is there a way to set the resource ID on an on-prem collector without using Azure Arc? I'd like to get up and running with this and while Arc maybe a long term solution for us if I can test without it that would be great.
Simon
- Ofer_Shezaf
Microsoft
SimonR : You got things right. No options I am aware of not listed in the blog post.