03-01-2019 02:22 PM
We've added several sources (ASA, syslog, multiple Azure sources) .. what is the best way to get our on-prem domain controllers to feed into Sentinel?
03-01-2019 02:32 PM
A good way would be to use Azure ATP and connect Sentinel to that solution.
Additionally, you could install the on-prem Log Analytics agent:
https://docs.microsoft.com/en-us/azure/azure-monitor/learn/quick-collect-windows-computer
03-01-2019 02:51 PM
03-05-2019 02:30 AM
I was just wondering the same thing.
I found a document about setting up the Windows security events connector (https://docs.microsoft.com/en-us/azure/sentinel/connect-windows-security-events) but it didn't say what else needs to be done.
In your Sentinel workspace if you click 'Workspace Settings' there's a "Get started with Log Analytics" section and link "Windows, Linux and other sources" where you can download the agent and get the workspace ID.
I've hit my free tier limit so I can't quite test it yet, but I'll try it later.
11-26-2019 02:46 AM
Hi, so you had proposed two solution for this... As we have installed Azure ATP sensor in our DC's, will that be fine to forward all the events to Azure ATP to Sentinel?
Can you please provide me the method which is apart for Log analytics?
Or Log Analytics is the only solution as now?