Aug 09 2020
12:27 PM
- last edited on
Dec 23 2021
04:50 AM
by
TechCommunityAP
Aug 09 2020
12:27 PM
- last edited on
Dec 23 2021
04:50 AM
by
TechCommunityAP
Hi all,
I am currently wondering about a project for one of our customers and would be happy to hear about your opinion.
We have been monitoring Windows Server with Event log, having them extended by SysMon. Now we are happy to have Azure ATP + Defender ATP available for the DCs / Servers. What do you think - should we still continue collecting event logs with SysMon and Monitoring Agent?
Thanks for your input!
Ralph
Aug 09 2020 02:07 PM
@Ralph Göbel My personal opinion is if the amount of data being ingested does not cost you too much money, and only you or your customer can really determine that, it is worth ingestion. I would have rather have the data and not need it than vice versa.
Aug 10 2020 11:04 AM
Jan 06 2021 01:46 PM
Good evening.
I have a doubt.
The logs of the tables that Defender can send to Sentinel, as if it were a sysmon, is it possible to collect the logs that the Event Viewer generates?
That is, a Login Event_id 4624, or password lockout, for example, is it possible to collect via Defender / Sysmon or do I still need the Sentinle MMA agent installed to collect these logs?
Jan 07 2021 10:13 AM
Jan 07 2021 10:55 AM
Se recebo os logs via defender, que são semelhantes aos logs do sysmon, ainda preciso receber os logs do Event Viewer?
That is, a login log (4624), for example, does it come via defender or via symon, or does this log come only via installed MMA agent?
Jan 08 2021 12:05 AM