My previous blog posts discussed collecting events from Azure PaaS resources and networking and security sources. But what about collecting from servers? Whether deployed in the cloud, on-prem VMs or even physical machines, those are probably still the biggest attack surface and therefore the most common sources of events.
To collect events from servers wherever those are deployed, use the Azure Log Analytics agent (also called "MMA" for Microsoft Monitoring Agent). The agent supports collecting from Windows machines as well as Linux. The agent can be installed manually or provisioned in Azure using Microsoft VM extensions for Windows or Linux.
The agent supports the following Sentinel connectors:
Once you enabled them through the Sentinel's Data Connectors, they will be collected by every agent configured to send data to the workspace.
However, the agent is not limited to this telemetry:
In addition you can collect on-prem telemetry not using the agent for the following sources:
A few more tips:
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.