Forum Discussion
Setting the security event option - 'Common' events
- Feb 14, 2021
Set up the Windows Security Events connector
To collect your Windows security events in Azure Sentinel:
- From the Azure Sentinel navigation menu, select Data connectors. From the list of connectors, click on Security Events, and then on the Open connector page button on the lower right. Then follow the on-screen instructions under the Instructions tab, as described through the rest of this section.
- Verify that you have the appropriate permissions as described under the Prerequisites section on the connector page.
- Download and install the Log Analytics agent (also known as the Microsoft Monitoring Agent or MMA) on the machines for which you want to stream security events into Azure Sentinel.For Azure Virtual Machines:
- Click on Install agent on Azure Windows Virtual Machine, and then on the link that appears below.
- For each virtual machine that you want to connect, click on its name in the list that appears on the right, and then click Connect.
- Click on Install agent on non-Azure Windows Machine, and then on the link that appears below.
- Click on the appropriate download links that appear on the right, under Windows Computers.
- Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the Workspace ID and Keys that appear below the download links mentioned above.
For additional installation options and further details, see the Log Analytics agent documentation.
Select which event set (All, Common, or Minimal) you want to stream.
Click Update.
To use the relevant schema in Log Analytics for Windows security events, type SecurityEvent in the query window.
Validate ConnectivityIt may take around 20 minutes until your logs start to appear in Log Analytics.
Full documentation : Connect Windows security event data to Azure Sentinel | Microsoft Docs
Set up the Windows Security Events connector
To collect your Windows security events in Azure Sentinel:
- From the Azure Sentinel navigation menu, select Data connectors. From the list of connectors, click on Security Events, and then on the Open connector page button on the lower right. Then follow the on-screen instructions under the Instructions tab, as described through the rest of this section.
- Verify that you have the appropriate permissions as described under the Prerequisites section on the connector page.
- Download and install the Log Analytics agent (also known as the Microsoft Monitoring Agent or MMA) on the machines for which you want to stream security events into Azure Sentinel.For Azure Virtual Machines:
- Click on Install agent on Azure Windows Virtual Machine, and then on the link that appears below.
- For each virtual machine that you want to connect, click on its name in the list that appears on the right, and then click Connect.
- Click on Install agent on non-Azure Windows Machine, and then on the link that appears below.
- Click on the appropriate download links that appear on the right, under Windows Computers.
- Using the downloaded executable file, install the agent on the Windows systems of your choice, and configure it using the Workspace ID and Keys that appear below the download links mentioned above.
For additional installation options and further details, see the Log Analytics agent documentation.
Select which event set (All, Common, or Minimal) you want to stream.
Click Update.
To use the relevant schema in Log Analytics for Windows security events, type SecurityEvent in the query window.
Validate ConnectivityIt may take around 20 minutes until your logs start to appear in Log Analytics.
Full documentation : Connect Windows security event data to Azure Sentinel | Microsoft Docs
ibnmbodji - Again, thank you for the clarification around this. Many thanks!
- ibnmbodjiFeb 14, 2021Iron Contributor