Forum Discussion

challengelogic's avatar
challengelogic
Copper Contributor
Feb 13, 2021
Solved

Setting the security event option - 'Common' events

Hello community   I wonder if you can help me out? I am trying to find where to set the security event option for Windows events (All, Common, Minimal, None). The documentation states: Go to Securi...
  • ibnmbodji's avatar
    Feb 14, 2021

    challengelogic 

    Set up the Windows Security Events connector

    To collect your Windows security events in Azure Sentinel:

    1. From the Azure Sentinel navigation menu, select Data connectors. From the list of connectors, click on Security Events, and then on the Open connector page button on the lower right. Then follow the on-screen instructions under the Instructions tab, as described through the rest of this section.
    2. Verify that you have the appropriate permissions as described under the Prerequisites section on the connector page.
    3. Download and install the Log Analytics agent (also known as the Microsoft Monitoring Agent or MMA) on the machines for which you want to stream security events into Azure Sentinel.For Azure Virtual Machines:
      1. Click on Install agent on Azure Windows Virtual Machine, and then on the link that appears below.
      2. For each virtual machine that you want to connect, click on its name in the list that appears on the right, and then click Connect.
      For non-Azure Windows machines (physical, virtual on-prem, or virtual in another cloud):
      1. Click on Install agent on non-Azure Windows Machine, and then on the link that appears below.
      2. Click on the appropriate download links that appear on the right, under Windows Computers.
      3. Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the Workspace ID and Keys that appear below the download links mentioned above.
      4. For additional installation options and further details, see the Log Analytics agent documentation.

      5. Select which event set (All, Common, or Minimal) you want to stream.

      6. Click Update.

      7. To use the relevant schema in Log Analytics for Windows security events, type SecurityEvent in the query window.

        Validate Connectivity

        It may take around 20 minutes until your logs start to appear in Log Analytics.

    Full documentation :  Connect Windows security event data to Azure Sentinel | Microsoft Docs

Resources