%3CLINGO-SUB%20id%3D%22lingo-sub-1046870%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1046870%22%20slang%3D%22en-US%22%3E%3CP%3ELighthouse%20has%20so%20much%20promise%20for%20MSPs%2C%20but%20I%20get%20push-back%20from%20clients%20who%20need%20to%20maintain%20PCI%20compliance.%20The%20fear%20is%20that%20delegating%20access%20control%20to%20an%20external%20partner%20by%20grating%20rights%20to%20their%20groups%20means%20that%20they%20are%20relying%20on%20the%20partner%20to%20ensure%20that%20rouge%20actors%20don't%20gain%20access.%20It%20also%20would%20presumably%20make%20auditing%20more%20difficult.%3C%2FP%3E%3CP%3EHas%20Microsoft%20addressed%20this%20concern%20anywhere%20in%20a%20whitepaper%20or%20article%3F%20I%20can't%20seem%20to%20find%20anything.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1046938%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1046938%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F469611%22%20target%3D%22_blank%22%3E%40JoshuaK%3C%2FA%3E%26nbsp%3B-%20PCI-DSS%20has%20robust%20provisions%20for%20handling%20service%20providers%20with%20access%20to%20in%20scope%20data%2C%20if%20a%20customer%20has%20PCI%20relevant%20data%20in%20Sentinel%20then%20Microsoft%20will%20already%20by%20a%20PCI%20service%20provider%20for%20them%20for%20which%20Microsoft%20has%20accreditation%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Foffering-pci-dss%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Foffering-pci-dss%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EAny%20other%20MSP%20with%20access%20to%20that%20data%20would%20also%20have%20to%20go%20through%20an%20accreditation%20and%20audit%20process%20but%20this%20is%20a%20well%20established%20path%20for%20QSAs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20for%20malicious%20actors%20gaining%20access%20via%20a%20partner%20it%20is%20a%20threat%20vector%20to%20consider%20as%20attackers%20have%20targetted%20service%20providers%20to%20gain%20access%20to%20customers%2C%20however%20it%20with%20robust%20auditing%20of%20MSP%20security%20controls%20this%20risk%20can%20be%20managed.%20In%20addition%20the%20Lighthouse%20configuration%20allows%20you%20to%20assign%20granular%20controls%20over%20what%20an%20MSP%20has%20access%20to%20meaning%20it%20could%20be%20limited%20to%20read-only%20access%20to%20Sentinel%20data%2C%20limiting%20the%20scope%20of%20impact%20in%20a%20scenario%20where%20an%20MSP%20might%20be%20breached.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1047235%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1047235%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20any%20way%20to%20easily%20deploy%20playbooks%20to%20different%20tenants%20at%20once%3F%20That%20way%20you%20can%20keep%20a%20baseline%20for%20all%20customers%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1049020%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1049020%22%20slang%3D%22en-US%22%3E%3CP%20dir%3D%22ltr%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F186539%22%20target%3D%22_blank%22%3E%40Thijs%20Lecomte%3C%2FA%3E%26nbsp%3B%3A%20you%20can%20use%20ARM.%20See%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flogic-apps%2Flogic-apps-azure-resource-manager-templates-overview%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fplatform.deloitte.com.au%2Farticles%2Fpreparing-azure-logic-apps-for-cicd%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1075337%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1075337%22%20slang%3D%22en-US%22%3E%3CP%3Ehow%20will%20the%20billing%20work%20when%20you%20have%20a%20Sentinel%20configured%20in%20CSP%20tenant%20and%20configured%20to%20ingest%20the%20data%20coming%20from%20customer%20tenants%3F%20I%20think%20as%20a%20CSP%20provider%20we%20can%20offer%20%3CSTRONG%3ESecurity%20as%20a%20Service%3C%2FSTRONG%3E%20to%20the%20ISV%20customers%20but%20just%20wondering%20about%20how%20the%20billing%20would%20work.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1077801%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1077801%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F469611%22%20target%3D%22_blank%22%3E%40JoshuaK%3C%2FA%3E%26nbsp%3B%3A%20Lighthouse%20is%20arguably%20better%20than%20the%20method%20it%20replaces.%20Keep%20in%20mind%20that%20service%20provisioning%20implies%20providing%20access%20to%20a%20contractor%3B%20the%20question%20is%20only%20how.%3CBR%20%2F%3E%3CBR%20%2F%3EUntil%20now%2C%20to%20provide%20access%20to%20a%20subcontractor%2C%20you%20had%20to%20add%20each%20employee%20of%20the%20contractor%20as%20a%20guest%20to%20your%20tenant.%20This%20fundamentally%20breaks%20any%20identity%20governance%20scheme%20and%20makes%20contractual%20protection%20harder.%20With%20lighthouse%2C%20the%20contractor%20is%20in%20charge%20of%20managing%20a%20group%20of%20which%20the%20end%20customer%20set%20permissions%20for.%20This%20more%20closely%20aligns%20with%20the%20way%20the%20contracts%20work.%20It%20also%20means%20that%20onboarding%20and%20offboarding%20contractor%20employees%20servicing%20the%20customer%20would%20follow%20the%20process%20better.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1077807%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1077807%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F494399%22%20target%3D%22_blank%22%3E%40badkid%3C%2FA%3E%26nbsp%3B%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EA%20clarification%20-%20there%20is%20no%20CSP%20tenant.%20There%20is%20a%20CSP%20subscription%20within%20the%20customer%20tenant.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20to%20your%20question%3A%20you%20may%20recall%20that%20a%20subscription%20is%20the%20billing%20unit%20in%20Azure.%20The%20CSP%20model%20implies%20that%20the%20MSSP%20is%20paying%20for%20the%20CSP%20subscription%2C%20allowing%20the%20MSSP%20to%20%22resell%22%2C%20by%20billing%20the%20customer%20and%20adding%20any%20premium%20based%20on%20added%20services%2C%20rather%20than%20having%20Microsoft%20bill%20the%20customer%20directly.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E~%20Ofer%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1078038%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1078038%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3BWhen%20I%20say%20CSP%20tenant%2C%20I%20meant%3A%20we%20being%20the%20Microsoft%20Cloud%20Solution%20Provider%2C%20we%20have%20our%20own%20subscription%20where%20sentinel%20is%20configured.%20If%20we%20configure%20the%20sentinel%20with%20the%20customer%20data%20source%20(say%20customer%20Log%20Analytics%20workspace%20-%20hosted%20on%20customers%20subscription)%2C%20we%20as%20a%20CSP%20provider%20has%20to%20bare%20the%20cost%20of%20sentinel%20data%20consumption%20rather%20than%20customer%20pays%20for%20the%20sentinel.%20Is%20that%20the%20correct%20understanding%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1078183%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1078183%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F494399%22%20target%3D%22_blank%22%3E%40badkid%3C%2FA%3E%26nbsp%3B%3A%20Yes%2C%20this%20is%20correct.%20This%20is%20the%20goal%20of%20the%20CSP%20model%3A%20enabling%20partners%20to%20bear%20the%20cost%20and%20charge%20the%20customer%20themselves.%20Note%20that%20Lighthouse%20does%20not%20require%20a%20CSP%20subscription%20and%20works%20with%20a%20regular%20subscription%20at%20the%20customer%20tenant.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1116212%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1116212%22%20slang%3D%22en-US%22%3E%3CP%3Ewe%20are%20using%20lighthouse%20for%20an%20enterprise%20that%20has%20multiple%20tenants.%20in%20this%20case%20we%20would%20like%20to%20query%20all%20log%20workspace.%20eg.%20union%20syslog%20*.%20is%20this%20posisble.%20we%20have%2030%20%2B%20tenants%20and%20this%20would%20be%20helpful%20to%20create%20a%20central%20workspace.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1116877%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1116877%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F131423%22%20target%3D%22_blank%22%3E%40Brendon%20Lobo%3C%2FA%3E%26nbsp%3B%3A%20It%20is%20possible.%20That%20said%2C%20while%2030%2B%20tenants%20are%20sometimes%20needed%2C%20in%20general%2C%20it%20seems%20like%20a%20tenant%20reduction%20is%20due.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1117307%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1117307%22%20slang%3D%22en-US%22%3E%3CP%3Ewhat%20is%20the%20syntax%20to%20run%20such%20query%3F%20yes%20light%20house%20is%20helping%20with%20step%201%20of%20discovery%20and%20management.%20once%20we%20have%20tenant%20related%20settings%20migrated%20we%20will%20move%20subscriptions.%20stating%20that%20light%20house%20and%20multi%20tenant%20is%20giving%20us%20an%20opportunity%20to%20monitor%20but%20give%20freedom.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1117781%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1117781%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F131423%22%20target%3D%22_blank%22%3E%40Brendon%20Lobo%3C%2FA%3E%26nbsp%3B%3A%20the%20syntax%20uses%20the%20workspace%20keyword%20as%20demonstrated%20in%20this%20blog%20post.%20You%20can%20union%20more%20than%20two%20tables.%20To%20make%20this%20easier%20for%20individual%20analysts%20or%20content%20creators%2C%20you%20can%20encapsulate%20the%20union%20part%20of%20the%20query%20in%20a%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Flog-query%2Ffunctions%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Efunction%3C%2FA%3E.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1152729%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1152729%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20considering%20using%20Lighthouse%20to%20manage%20multiple%20customers%20Sentinels%20and%20we%20are%20trying%20to%20evaluate%20what%20would%20be%20the%20additional%20cost%20in%20our%20%3CSPAN%3Esubscription%20%3F%20what%20level%20of%20data%20comes%20from%20the%20managed%20Sentinels%20%3F%20I%20realize%20there%20is%20no%20cost%20to%20the%20service%20itself%20but%20what%20about%20the%20data%20coming%20from%20the%20managed%20instances%20%3F%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1164722%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1164722%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F545999%22%20target%3D%22_blank%22%3E%40JF_68%3C%2FA%3E%26nbsp%3Bthe%20cost%20is%20incurred%20at%20the%20subscription%20where%20the%20Sentinel%20Workspace%20resides.%20Do%20if%20you%20have%20Tenant%20A%20with%20a%20Sentinel%20Workspace%2C%20and%20then%20you%20use%20Lighthouse%20to%20give%20Tenant%20B%20access%20to%20that%20workspace%20the%20costs%20associated%20with%20the%20Sentinel%20Workspace%20and%20the%20data%20remain%20with%20Tenant%20A.%3CBR%20%2F%3EWhen%20you%20provide%20access%20using%20Lighthouse%20you%20are%20not%20actually%20moving%20any%20of%20the%20data%20or%20resources%20you%20are%20simply%20giving%20a%20section%20of%20another%20tenant%20access%20to%20the%20resource.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHope%20this%20helps.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1164972%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1164972%22%20slang%3D%22en-US%22%3E%3CP%3Elittle%20confusing%20%3A)%3C%2Fimg%3E%20Sorry!%20Let's%20say%20I%20have%20a%20subscription%20called%20%22Provider%22%20which%20hosts%20the%20Sentinel%20Workspace.%20Now%2C%20I%20provide%20access%20to%20that%20access%20to%20customer%20subscription%20say%20%22Customer1%22%20which%20sends%20the%20logs%20to%20the%20Sentinel%20workspace%20hosted%20under%20%22Provider%22%20subscription.%20My%20understanding%20is%2C%20Sentinel%20cost%20will%20be%20incurred%20in%20%22Provider%22%20subscription%20and%20NOT%20in%20%22Customer1%22%20subscription.%20I%20think%20now%20the%20challenge%20is%2C%20how%20to%20do%20the%20cross%20charging%20to%20the%20customer.%20Tags%20will%20solve%20the%20costing%20issue%20but%20still%2C%20as%20a%20CSP%20provider%20we%20need%20to%20figure%20out%20how%20to%20consolidate%20the%20billing%20for%20the%20charges%20across%20Customer1%20subscription%20and%20Provider%20subscription.%20HOpe%20that%20helps!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECheers%3C%2FP%3E%3CP%3EDeepak%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1164996%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1164996%22%20slang%3D%22en-US%22%3EDeepak%2C%20I%20think%20the%20simple%20answer%20here%20is%20that%20services%20which%20incur%20costs%20go%20into%20customer%20subscriptions%20rather%20than%20provider%20ones.%20Lighthouse%20is%20just%20delegated%20access%20to%20the%20data%20in%20a%20customer%20subscription%20for%20providers.%20In%20your%20example%20above%2C%20Sentinel%20is%20deployed%20to%20Customer%201%20and%20Provider%20is%20simply%20given%20access%20to%20the%20Sentinel%20data%20stored%20inside%20Customer%201's%20subscription.%20Tooling%20allows%20Provider%20to%20aggregate%20and%20report%20off%20of%20data%20across%20multiple%20customers%20without%20storing%20their%20own%20copy%20of%20that%20data.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1306671%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1306671%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F113210%22%20target%3D%22_blank%22%3E%40Pete%20Bryan%3C%2FA%3E%26nbsp%3BOne%20question.%20Assuming%20azure%20light%20house%20is%20in%20place.%20How%20do%20I%20know%20which%20incident%20in%20azure%20sentinel%20belongs%20to%20which%20tenant%2Fsubscription%3F%20I%20see%20tags%20option%20that%20is%20only%20the%20way%20to%20configure%20and%20identify%3F%20I%20also%20recall%20the%20preview%20feature%26nbsp%3B%3C%2FP%3E%3CDIV%3EAzure%20Sentinel%20Cross-Tenant%2FCross-Workspace%20Incidents%20View.%20Assuming%20this%20will%20solve%20my%20requirement.%20Please%20confirm.%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1312596%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1312596%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F419828%22%20target%3D%22_blank%22%3E%40Pavan_Gelli%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20are%20correct%3A%20the%20solution%20as%20described%20here%20does%20not%20consolidate%20incidents%20to%20a%20single%20workspace%2C%20hence%20no%20need%20to%20identify%20the%20workspace%20for%20an%20incindet.%20The%20corss%20workspace%20incidents%20screen%20now%20in%20private%20preview%2C%20which%20Lighthouse%20extends%20to%20be%20corss-tenant%2C%20indeed%20clearly%20dispays%20the%20worksapce%20and%20tenant%20for%20each%20incident.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1401129%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1401129%22%20slang%3D%22en-US%22%3E%3CP%3EWith%20Sentinel%20in%20a%20Lighthouse%20setup%20where%20does%20the%20data%20storage%20retain%3F%20Is%20data%20retained%20in%20the%20MSP%20Managing%20tenant%20as%20well%20as%20the%20child%20tenant%20or%20will%20the%20data%20be%20retained%20in%20the%20child%20tenant%3F%20will%20that%20increase%20the%20ingestion%20and%20retention%20costs%20as%20well%20as%20potential%20security%20concerns%20around%20data%20leaving%20a%20customer%20tenant.%20We%20had%20some%20issues%20in%20our%20AWS%20environment%20when%20we%20tried%20to%20multi%20tenant%20a%20solution%20but%20customers%20pushed%20back%20because%20of%20the%20Data%20moving%20from%20a%20customer%20account%20to%20one%20of%20our%20managed%20accounts%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1401580%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1401580%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F672130%22%20target%3D%22_blank%22%3E%40LeeAMurphy%3C%2FA%3E%26nbsp%3B%3A%20the%20data%20stays%20at%20the%20%22child%22%20tenant%20and%20therefore%20does%20not%20affect%20pricing.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1430222%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1430222%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F113210%22%20target%3D%22_blank%22%3E%40Pete%20Bryan%3C%2FA%3E%26nbsp%3B%3A%20As%20I%20tried%20to%20click%20on%20slide%20link%2C%20it%20gives%20me%20a%20warning%20that%20its%20a%20malicious%20website.%20Could%20you%20please%20update%20the%20link%20to%20some%20secure%20repository%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1430425%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1430425%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F494450%22%20target%3D%22_blank%22%3E%40Deepanshu_Marwah%3C%2FA%3E%26nbsp%3B%3A%20I%20am%20not%20sure%20which%20linked%20you%20rererred%20to%2C%20but%20I%20went%20through%20the%20links%20and%20found%20one%20that%20included%20a%20safelink%2C%20probably%20copied%20from%20outlook.%20I%20updated%20it.%20Let%20me%20know%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1430432%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1430432%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_blank%22%3E%40Ofer_Shezaf%3C%2FA%3E%26nbsp%3Bits%20working%20alright%20now%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1448035%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Monitor%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1448035%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%20for%20the%20great%20info%3B%20sharing%20with%20my%20Linkedin%20Network%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1043899%22%20slang%3D%22en-US%22%3EUsing%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Investigate%20Attacks%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1043899%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Lighthouse%20provides%20capability%20for%20cross-tenancy%20management%20of%20Azure%20services%20for%20Managed%20Service%20Providers%20(MSPs)%20and%20organizations%20with%20multiple%20Azure%20tenants%2C%20all%20from%20a%20single%20Azure%20portal.%20Azure%20Lighthouse%20is%20integrated%20with%20Azure%20Sentinel%20allowing%20organizations%20to%20easily%20manage%20Azure%20Sentinel%20workspaces%20from%20across%20multiple%20tenants.%20In%20this%20blog%20we%20will%20show%20you%20how%20to%20configure%20Azure%20Lighthouse%2C%20and%20how%20to%20use%20its%20capabilities%20to%20investigate%20an%20attack%20as%20it%20targets%20several%20customers%20at%20once.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%3CFONT%20color%3D%22%233366FF%22%3EFor%20further%20and%20up-to-date%20information%20about%20Azure%20Sentinel%20Multi-worksapce%20and%20Multi-tenant%20capablities%20and%20MSSP%20best%20practices%20refer%20to%20module%203%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fazure-sentinel%2Fbecome-an-azure-sentinel-ninja-the-complete-level-400-training%2Fba-p%2F1246310%22%20target%3D%22_self%22%3EAzure%20Sentinel%20Ninja%20training%3C%2FA%3E%20and%20in%20particular%3A%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CEM%3E%3CFONT%20color%3D%22%233366FF%22%3EDocumentation%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Fextend-sentinel-across-workspaces-tenants%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EExtend%20Azure%20Sentinel%20across%20workspaces%20and%20tenants%3C%2FA%3E%3C%2FFONT%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3CLI%3E%3CEM%3E%3CFONT%20color%3D%22%233366FF%22%3EWebinar%3A%26nbsp%3BCloud%20architecture%20and%20multi-workspace%2Ftenant%20support%20(%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FhwahlwgJPnE%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EYoutube%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2F1drv.ms%2Fb%2Fs!AnEPjr8tHcNmgkkYuxOITkGSI7x8%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPresentation%3C%2FA%3E)%3C%2FFONT%3E%3C%2FEM%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFull%20documentation%20on%20Azure%20Lighthouse%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEnabling%20Azure%20Lighthouse%20for%20Sentinel%20requires%20configuration%20on%20both%20the%20%3CSTRONG%3Emanaging%20tenant%3C%2FSTRONG%3E%20and%20%3CSTRONG%3Ecustomer%20tenant%3C%2FSTRONG%3E%20(for%20the%20purpose%20of%20this%20blog%20we%20will%20refer%20to%20customer%20tenant%20to%20describe%20the%20tenant%20to%20be%20managed%2C%20whether%20this%20is%20an%20external%20customer%20or%20separate%20internal%20tenant)%2C%20we%20will%20address%20these%20elements%20separately.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%221.png%22%20style%3D%22width%3A%20377px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F159782iD5575B60CCECDD74%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%221.png%22%20alt%3D%22Lighthouse%20Architecture%20Diagram%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ELighthouse%20Architecture%20Diagram%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1441303424%22%20id%3D%22toc-hId--1441303424%22%20id%3D%22toc-hId--1441303424%22%3EManaging%20Tenant%20Configuration%3C%2FH2%3E%0A%3CP%3ESeveral%20items%20are%20needed%20to%20configure%20Lighthouse%20for%20Azure%20Sentinel%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EThe%20tenant%20ID%20of%20the%20%3CSTRONG%3Emanaging%20tenant%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3EThe%20ID%20of%20the%20Azure%20AD%20group%20in%20the%20managing%20tenant%20that%20you%20wish%20to%20have%20access%20to%20Azure%20Sentinel%20in%20the%20customer%20tenant.%20It%20is%20advised%20that%20a%20specific%20Azure%20AD%20group%20is%20created%20for%20this%20purpose.%3CPRE%3E(Get-AzADGroup%20%3CFONT%20color%3D%22%23008080%22%3E-DisplayName%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%22%3CGROUP%20name%3D%22%22%3E%22%3C%2FGROUP%3E%3C%2FFONT%3E).id%E2%80%8B%3C%2FPRE%3E%0A%3C%2FLI%3E%0A%3CLI%3EThe%20ID%20of%20the%20user%20role%20that%20you%20wish%20the%20AD%20group%20to%20have%20within%20the%20customers%20tenant.%20For%20this%20you%20can%20use%20-ERR%3AREF-NOT-FOUND-built%20in%20Role%20Definitions%26nbsp%3Bsuch%20as%20Security%20Reader%2C%20or%20create%20a%20custom%20definition.%0A%3CPRE%3E(Get-AzRoleDefinition%20%3CFONT%20color%3D%22%23008080%22%3E-Name%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%E2%80%9C%3CROLE%20name%3D%22%22%3E%E2%80%9D%3C%2FROLE%3E%3C%2FFONT%3E).id%3C%2FPRE%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20core%20deployment%20of%20the%20Azure%20Lighthouse%20configuration%20will%20be%20made%20using%20this%20Azure%20Resource%20Manager%20(ARM)%20template%20-%20-ERR%3AREF-NOT-FOUND-%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.json%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.json%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20order%20to%20ensure%20this%20ARM%20template%20deploys%20the%20required%20configuration%20it%20is%20accompanied%20by%20a%20parameters%20file%20which%20you%20must%20populate%20with%20the%20ID%20details%20listed%20above.%20A%20template%20for%20this%20parameters%20file%20can%20be%20found%20here%3A%26nbsp%3B%20-ERR%3AREF-NOT-FOUND-%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.parameters.json%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2FAzure%2FAzure-Lighthouse-samples%2Fblob%2Fmaster%2Ftemplates%2Fdelegated-resource-management%2FdelegatedResourceManagement.parameters.json%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20complete%20the%20parameters%20file%2C%20update%20the%20values%20as%20follows%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EmspOfferName%20%E2%80%93%20provide%20a%20display%20name%20for%20your%20managed%20service%20offering%20(this%20can%20be%20seen%20within%20the%20customer%20tenant).%3C%2FLI%3E%0A%3CLI%3EmspOfferDescription%20%E2%80%93%20provide%20a%20description%20for%20your%20managed%20service%20offering%20(this%20can%20be%20seen%20within%20the%20customer%20tenant).%3C%2FLI%3E%0A%3CLI%3EmanagedByTenantId%20%E2%80%93%20the%20tenant%20ID%20of%20the%20managing%20tenant.%3C%2FLI%3E%0A%3CLI%3Eauthorizations%0A%3CUL%3E%0A%3CLI%3EprincipalId%20%E2%80%93%20the%20ID%20string%20of%20the%20Azure%20AD%20Group%20in%20the%20managing%20tenant%20you%20want%20to%20grant%20access.%3C%2FLI%3E%0A%3CLI%3EroleDefinitionId%20%E2%80%93%20the%20ID%20of%20the%20user%20role%20that%20you%20wish%20the%20AD%20group%20to%20have%20within%20the%20customers%20tenant.%3C%2FLI%3E%0A%3CLI%3EprincipalIdDisplayName%20%E2%80%93%20provide%20a%20name%20for%20the%20group%20being%20granted%20access%20(this%20can%20be%20seen%20within%20the%20customer%20tenant%20and%20does%20not%20have%20to%20be%20the%20same%20as%20the%20AD%20group%20name).%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EOnce%20complete%20your%20parameters%20file%20should%20look%20something%20like%20this%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F2.png%22%20border%3D%220%22%20width%3D%22692%22%20height%3D%22334%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3ENote%3A%20If%20you%20want%20to%20grant%20multiple%20groups%20access%20at%20differing%20role%20levels%2C%20you%20can%20include%20multiple%20entries%20under%20the%20authorizations%20section%E2%80%93%20see%20-ERR%3AREF-NOT-FOUND-%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fonboard-customer%3C%2FA%3E%20for%20an%20example%20of%20this.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20you%20have%20completed%20the%20parameters%20file%20you%20will%20need%20to%20provide%20the%20ARM%20template%20and%20parameters%20file%20to%20a%20user%20with%20the%20Owner%20role%20within%20the%20customer%20tenant.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1046209409%22%20id%3D%22toc-hId-1046209409%22%20id%3D%22toc-hId-1046209409%22%3ECustomer%20Tenant%20Configuration%3C%2FH2%3E%0A%3CP%3EAfter%20receiving%20the%20ARM%20template%20and%20parameters%20file%20from%20the%20managing%20tenant%2C%20the%20customer%20tenant%20%26nbsp%3Bmust%20deploy%20the%20configuration%20within%20the%20subscription%20that%20contains%20the%20Azure%20Sentinel%20workspace%20to%20be%20managed.%3C%2FP%3E%0A%3CP%3EThe%20first%20step%20in%20provisioning%20Lighthouse%20access%20within%20the%20customer%20tenant%20is%20to%20register%20the%20ManagedServices%20Resource%20in%20Azure.%20You%20can%20check%20if%20this%20is%20already%20registered%20via%20-ERR%3AREF-NOT-FOUND-PowerShell%3CFONT%20size%3D%222%22%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3Ewith%3A%3C%2FP%3E%0A%3CPRE%3EGet-AzResourceProvider%20%3CFONT%20color%3D%22%23008080%22%3E-ProviderNameSpace%3C%2FFONT%3E%20Microsoft.ManagedServices%3C%2FPRE%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3E%3CFONT%20size%3D%222%22%3E(If%20you%20are%20not%20using%20Azure%20Cloud%20Shell%20you%20will%20first%20need%20to%20run%20the%20Connect-AzAccount%20cmdlet%20to%20authenticate%20to%20Azure)%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20should%20return%20an%20output%20similar%20to%20this%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F3.png%22%20border%3D%220%22%20width%3D%22674%22%20height%3D%22346%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20the%20RegistrationState%20does%20not%20read%20%E2%80%98Registered%E2%80%99%20%26nbsp%3Bfor%20all%20Workspaces%20in%20the%20output%20run%20the%20following%20command%20in%20PowerShell%20to%20register%20the%20service%3A%3C%2FP%3E%0A%3CPRE%3ERegister-AzResourceProvider%20%3CFONT%20color%3D%22%23008080%22%3E-ProviderNamespace%3C%2FFONT%3E%20Microsoft.ManagedServices%3C%2FPRE%3E%0A%3CP%3EOnce%20the%20ManagedServices%20Resource%20is%20registered%20you%20can%20deploy%20the%20Lighthouse%20ARM%20template%20with%20the%20correct%20parameters%20provided%20by%20the%20managing%20tenant.%20First%20select%20the%20subscription%20that%20the%20Azure%20Sentinel%20workspace%20to%20be%20managed%20is%20part%20of%20using%3A%3C%2FP%3E%0A%3CPRE%3ESelect-AzSubscription%20%3CFONT%20color%3D%22%23008080%22%3E-SubscriptionId%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%E2%80%98%3CYOUR%20subscription%3D%22%22%20id%3D%22%22%3E%E2%80%99%3C%2FYOUR%3E%3C%2FFONT%3E%3C%2FPRE%3E%0A%3CP%3EThen%20deploy%20the%20ARM%20template%20with%3A%3C%2FP%3E%0A%3CPRE%3ENew-AzDeployment%20%3CFONT%20color%3D%22%23008080%22%3E-Name%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CDEPLOYMENTNAME%3E%3C%2FDEPLOYMENTNAME%3E%3C%2FFONT%3E%20%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-Location%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CAZUREREGION%3E%3C%2FAZUREREGION%3E%3C%2FFONT%3E%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-TemplateFile%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CPATH%20to%3D%22%22%20arm%3D%22%22%20template%3D%22%22%3E%3C%2FPATH%3E%3C%2FFONT%3E%20%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-TemplateParameterFile%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E%3CPATH%20to%3D%22%22%20parameters%3D%22%22%20file%3D%22%22%3E%3C%2FPATH%3E%3C%2FFONT%3E%60%0A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%3CFONT%20color%3D%22%23008080%22%3E-Verbose%3C%2FFONT%3E%3C%2FPRE%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3E%3CFONT%20size%3D%222%22%3E(You%20can%20deploy%20in%20any%20region%2C%20if%20you%20are%20unsure%20you%20can%20use%20the%20region%20your%20Azure%20Sentinel%20workspace%20is%20deployed%20in.)%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20deployed%20correctly%20the%20output%20should%20look%20like%20this%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F4%2520(2).png%22%20border%3D%220%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20confirm%20if%20this%20deployment%20has%20been%20successful%20navigate%20to%20the%20Azure%20Portal%20and%20search%20for%20%3CSTRONG%3EService%20Providers%3C%2FSTRONG%3E.%20In%20here%20select%20%3CSTRONG%3EService%20provider%20offers%20%3C%2FSTRONG%3Ewhere%20you%20should%20see%20the%20details%20of%20the%20configuration%20you%20just%20deployed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3ENote%3A%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22padding-left%3A%2030px%3B%22%3E%3CEM%3EThere%20are%20also%20options%20to%20publish%20an%20MSP%20offering%20as%20a%20service%20via%20the%20Azure%20Marketplace%20and%20Cloud%20Partner%20Portal%20enabling%20customers%20to%20purchase%20and%20onboard%20the%20resources%20via%20the%20Azure%20portal%20rather%20than%20having%20to%20deploy%20an%20ARM%20template%20as%20described%20above.%20This%20process%20requires%20the%20MSP%20to%20publish%20several%20additional%20details%20about%20their%20service.%20For%20details%20regarding%20this%20process%20please%20see%20this%20documentation%20-%20%3C%2FEM%3E-ERR%3AREF-NOT-FOUND-%3CEM%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fpublish-managed-services-offers%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Flighthouse%2Fhow-to%2Fpublish-managed-services-offers%3C%2FA%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--761245054%22%20id%3D%22toc-hId--761245054%22%20id%3D%22toc-hId--761245054%22%3EManaging%20Tenants%3C%2FH2%3E%0A%3CP%3EOnce%20the%20customer%20tenant%20has%20deployed%20the%20Lighthouse%20configuration%20the%20managing%20tenant%20can%20also%20validate%20the%20deployment%20by%20navigating%20to%20the%20%3CSTRONG%3EService%20Provider%20Portal%3C%2FSTRONG%3E%26nbsp%3B%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3Eand%20opening%20the%20%3CSTRONG%3ECustomers%3C%2FSTRONG%3E%20tab.%20Here%20you%20should%20see%20a%20list%20of%20customer%20tenants%20who%20have%20successfully%20deployed%20your%20Lighthouse%20configuration.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ETo%20view%20customer%20resources%20within%20the%20managing%20tenant%E2%80%99s%20Azure%20Portal%20open%20the%20portal%20and%20select%20the%20Directory%20%2B%20subscription%20filter%20at%20the%20top%20of%20the%20page%2C%20here%20you%20should%20see%20the%20customer%20tenant%20directories%20and%20subscriptions%20on-boarded%20for%20you%20to%20select%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F7.png%22%20border%3D%220%22%20width%3D%22414%22%20height%3D%22338%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F8.png%22%20border%3D%220%22%20width%3D%22407%22%20height%3D%2296%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20selected%20the%20customer%20tenants%20Workspaces%20will%20appear%20in%20your%20Azure%20Sentinel%20workspaces%20list%20alongside%20your%20own%20workspaces.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECurrently%20most%20features%20within%20Azure%20Sentinel%20are%20directly%20tied%20to%20a%20single%20workspace%2C%20however%20it%20is%20possible%20to%20query%20multiple%20tenant%E2%80%99s%20workspaces%20with%20one%20unified%20query%20in%20order%20to%20investigate%20and%20hunt%20for%20threats%20that%20might%20be%20impacting%20several%20tenants%20at%20once.%26nbsp%3B%20To%20do%20this%20you%20can%20use%20the%20union%20operator%20to%20merge%20a%20table%20from%20one%20workspace%20with%20another.%20For%20example%2C%20if%20you%20wanted%20to%20see%20a%20list%20of%20all%20security%20alerts%20from%20the%20last%20week%20from%20two%20workspaces%20you%20would%20use%20the%20following%20query%3A%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20color%3D%22%230000FF%22%3Eunion%3C%2FFONT%3E%20SecurityAlert%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E'%3CSECOND%20workspace%3D%22%22%20name%3D%22%22%3E'%3C%2FSECOND%3E%3C%2FFONT%3E).SecurityAlert%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20TimeGenerated%20%26gt%3B%20ago(%3CFONT%20color%3D%22%23339966%22%3E7%3C%2FFONT%3Ed)%3C%2FPRE%3E%0A%3CP%3EThis%20can%20also%20be%20extended%20to%20any%20number%20of%20workspaces%20simply%20by%20adding%20more%20workspaces%20to%20the%20union%20query%3A%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20color%3D%22%230000FF%22%3Eunion%20%3C%2FFONT%3ESecurityAlert%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E'%3CSECOND%20workspace%3D%22%22%20name%3D%22%22%3E'%3C%2FSECOND%3E%3C%2FFONT%3E).SecurityAlert%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E%E2%80%98%3CTHIRD%20workspace%3D%22%22%20name%3D%22%22%3E%E2%80%99%3C%2FTHIRD%3E%3C%2FFONT%3E).SecurityAlert%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20TimeGenerated%20%26gt%3B%20ago(%3CFONT%20color%3D%22%23339966%22%3E7%3C%2FFONT%3Ed)%3C%2FPRE%3E%0A%3CP%3EThe%20result%20set%20will%20appear%20as%20a%20single%20table%2C%20but%20you%20can%20use%20the%20TenantId%20field%20to%20identity%20which%20customer%20each%20item%20comes%20from.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1726267779%22%20id%3D%22toc-hId-1726267779%22%20id%3D%22toc-hId-1726267779%22%3ETracking%20an%20attack%20across%20multiple%20customer%20tenants%3C%2FH2%3E%0A%3CP%3EExposed%20management%20endpoints%20on%20the%20internet%20are%20a%20regular%20attack%20target.%20Often%20attackers%20will%20scan%20the%20internet%20for%20exposed%20endpoints%20and%20then%20attempt%20to%20login%20using%20common%20credentials%20in%20the%20hopes%20of%20gaining%20access%20to%20at%20least%20some%20hosts.%20As%20a%20multi-customer%20monitoring%20team%2C%20it%20is%20common%20to%20see%20such%20attacks%20impacting%20several%20tenants%20simultaneously%20as%20commodity%20attackers%20indiscriminately%20attack%20any%20exposed%20interface%20they%20can%20find.%3C%2FP%3E%0A%3CP%3EIn%20this%20example%20we%20start%20with%20an%20alert%20in%20one%20of%20our%20customer%E2%80%99s%20workspaces%20for%20an%20attempted%20brute%20force%20attempt%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F9.png%22%20border%3D%220%22%20width%3D%22766%22%20height%3D%22423%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUpon%20inspecting%20the%20logs%20associated%20with%20this%20alert%20we%20can%20see%20all%20the%20attempts%20are%20coming%20from%20the%20same%20IP%20address%3A%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F10.png%22%20border%3D%220%22%20width%3D%22765%22%20height%3D%22427%22%20%2F%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20quickly%20assess%20if%20there%20is%20an%20impact%20from%20this%20activity%20we%20want%20to%20see%20if%20that%20IP%20address%20has%20successfully%20logged%20into%20any%20hosts%20in%20the%20environment.%20However%2C%20as%20we%20suspect%20this%20attack%20might%20be%20wider%20than%20just%20one%20of%20our%20customers%2C%20we%20can%20also%20simultaneously%20query%20our%20other%20workspaces%20for%20the%20same%20IP%20address.%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20color%3D%22%230000FF%22%3Eunion%20%3C%2FFONT%3ESyslog%2C%20workspace(%3CFONT%20color%3D%22%23FF0000%22%3E'%3CCUSTOMER2%20workspace%3D%22%22%20name%3D%22%22%3E'%3C%2FCUSTOMER2%3E%3C%2FFONT%3E).Syslog%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20TimeGenerated%20%26gt%3B%20ago(%3CFONT%20color%3D%22%23339966%22%3E7%3C%2FFONT%3Ed)%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20ProcessName%20%3D%3D%20%22sshd%22%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Eextend%3C%2FFONT%3E%20LogonIP%20%3D%20extract(%3CFONT%20color%3D%22%23FF0000%22%3E%22(%5B0-9%5D%7B1%2C3%7D%5C%5C.%5B0-9%5D%7B1%2C3%7D%5C%5C.%5B0-9%5D%7B1%2C3%7D%5C%5C.%5B0-9%5D%7B1%2C3%7D)%22%3C%2FFONT%3E%2C%20%3CFONT%20color%3D%22%23339966%22%3E1%3C%2FFONT%3E%2C%20SyslogMessage)%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20SyslogMessage%20%3CFONT%20color%3D%22%230000FF%22%3Econtains%3C%2FFONT%3E%20%3CFONT%20color%3D%22%23FF0000%22%3E'Accepted'%3C%2FFONT%3E%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Ewhere%3C%2FFONT%3E%20LogonIP%20%3D%3D%20%22174.116.122.126%22%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Eextend%3C%2FFONT%3E%20Customer%20%3D%20iif(TenantId%20%3D%3D%20%3CFONT%20color%3D%22%23FF0000%22%3E%22%3CCUSTOMER2%20tenant%3D%22%22%20id%3D%22%22%3E%22%2C%20%22Customer2%22%2C%20%22Customer1%22%3C%2FCUSTOMER2%3E%3C%2FFONT%3E)%0A%7C%20%3CFONT%20color%3D%22%230000FF%22%3Eproject%3C%2FFONT%3E%20TimeGenerated%2C%20Customer%2C%20Computer%2C%20LogonIP%2C%20SyslogMessage%20%3C%2FPRE%3E%0A%3CP%3EThe%20results%20of%20this%20query%20shows%20us%20that%20whilst%20there%20was%20no%20impact%20for%20the%20customer%20where%20we%20saw%20the%20Brute%20Force%20alert%20there%20were%202%20successful%20logons%20for%20that%20IP%20address%20in%20another%20customer%20environment%2C%20highlighting%20these%20as%20events%20to%20investigate%20further.%3C%2FP%3E%0A%3CP%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.azureedge.net%2Flithium%2FAzureSentinel%2F12-3-19%2F11.png%22%20border%3D%220%22%20width%3D%22764%22%20height%3D%22369%22%20%2F%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--81186684%22%20id%3D%22toc-hId--81186684%22%20id%3D%22toc-hId--81186684%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1888641147%22%20id%3D%22toc-hId--1888641147%22%20id%3D%22toc-hId--1888641147%22%3ESummary%3C%2FH2%3E%0A%3CP%3EA%20key%20principle%20to%20effective%20and%20scalable%20security%20operations%20is%20streamlining%20the%20security%20analysts%E2%80%99%20job%20so%20that%20they%20can%20focus%20on%20threat%20detection%20and%20response.%20Azure%20Lighthouse%E2%80%99s%20integration%20with%20Azure%20Sentinel%20simplifies%20management%20of%20workspaces%20from%20multiple%20Azure%20tenants%2C%20whether%20they%20be%20external%20customer%20tenants%20or%20other%20tenants%20used%20internally%20within%20an%20organization%2C%20so%20that%20analysts%20can%20easily%20and%20effectively%20monitor%20multiple%20environments%20at%20once.%20In%20addition%2C%20the%20union%20operator%20within%20KQL%20allows%20analysts%20to%20query%20multiple%20environments%20at%20once%2C%20and%20track%20threats%20across%20them%20without%20having%20to%20repeat%20analysis.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20want%20to%20know%20more%20about%20using%20Azure%20Sentinel%20in%20a%20multi-tenant%20or%26nbsp%3B%20Managed%20Service%20Provider%20environment%26nbsp%3B-ERR%3AREF-NOT-FOUND-%40Ofer_Shezaf%26nbsp%3Brecently%20ran%20a%20really%20useful%20webinar%20on%20this%20subject.%20A%20recording%20of%20this%20can%20be%20found%20on%20-ERR%3AREF-NOT-FOUND-YouTube%2C%20and%20the%20slides%20are%20available%20-ERR%3AREF-NOT-FOUND-here.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESpecial%20thanks%20must%20also%20go%20to%26nbsp%3B-ERR%3AREF-NOT-FOUND-%40Yaniv%20Shasha%20from%20the%20Azure%20Sentinel%20CxE%20team%20for%20his%20contribution%20to%20this%20blog%20and%20his%20work%20with%20Azure%20Lighthouse.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1043899%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Lighthouse%20provides%20capability%20for%20cross-tenancy%20management%20of%20Azure%20services%20for%20Managed%20Service%20Providers%20(MSPs)%20and%20organizations%20with%20multiple%20Azure%20tenants%2C%20all%20from%20a%20single%20Azure%20portal.%20Azure%20Lighthouse%20is%20integrated%20with%20Azure%20Sentinel%20allowing%20organizations%20to%20easily%20manage%20Azure%20Sentinel%20workspaces%20from%20across%20multiple%20tenants.%20In%20this%20blog%20we%20will%20show%20you%20how%20to%20configure%20Azure%20Lighthouse%2C%20and%20how%20to%20use%20its%20capabilities%20to%20investigate%20an%20attack%20as%20it%20targets%20several%20customers%20at%20once.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1043899%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInvestigation%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1486158%22%20slang%3D%22en-US%22%3ERe%3A%20Using%20Azure%20Lighthouse%20and%20Azure%20Sentinel%20to%20Investigate%20Attacks%20Across%20Multiple%20Tenants%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1486158%22%20slang%3D%22en-US%22%3E%3CP%3E%40%3CSPAN%20class%3D%22UserName%20lia-user-name%20lia-user-rank-Microsoft%20lia-component-message-view-widget-author-username%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F293879%22%20target%3D%22_self%22%3E%3CSPAN%20class%3D%22%22%3EOfer_Shezaf%3C%2FSPAN%3E%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20have%20several%20customer's%20tenants%20on-boarded%20into%20Lighthouse.%26nbsp%3B%20In%20our%20Lighthouse%20tenant%2C%20we%20can%20see%20all%20incidents%20in%20Sentinel.%26nbsp%3B%20However%2C%20we%20can't%20see%20the%20Owner%20of%20the%20incident.%26nbsp%3B%20Error%20is%20%22Missing%20required%20permissions%20to%20list%20tenant%20users.%22%26nbsp%3B%20Is%20it%20possible%20to%20see%20who%20was%20assigned%20an%20incident%20within%20Lighthouse%2C%20ore%20can%20this%20only%20be%20seen%20within%20the%20customer's%20tenant%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Users.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F200732i2D697CC642ACAC8E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Users.png%22%20alt%3D%22Users.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Azure Lighthouse provides capability for cross-tenancy management of Azure services for Managed Service Providers (MSPs) and organizations with multiple Azure tenants, all from a single Azure portal. Azure Lighthouse is integrated with Azure Sentinel allowing organizations to easily manage Azure Sentinel workspaces from across multiple tenants. In this blog we will show you how to configure Azure Lighthouse, and how to use its capabilities to investigate an attack as it targets several customers at once.

 

For further and up-to-date information about Azure Sentinel Multi-worksapce and Multi-tenant capablities and MSSP best practices refer to module 3 of the Azure Sentinel Ninja training and in particular:

 

Full documentation on Azure Lighthouse can be found here. 

 

Enabling Azure Lighthouse for Sentinel requires configuration on both the managing tenant and customer tenant (for the purpose of this blog we will refer to customer tenant to describe the tenant to be managed, whether this is an external customer or separate internal tenant), we will address these elements separately.

Lighthouse Architecture DiagramLighthouse Architecture Diagram

 

Managing Tenant Configuration

Several items are needed to configure Lighthouse for Azure Sentinel:

  • The tenant ID of the managing tenant.
  • The ID of the Azure AD group in the managing tenant that you wish to have access to Azure Sentinel in the customer tenant. It is advised that a specific Azure AD group is created for this purpose.
    (Get-AzADGroup -DisplayName "<Group Name>").id​
  • The ID of the user role that you wish the AD group to have within the customers tenant. For this you can use built in Role Definitions such as Security Reader, or create a custom definition.
    (Get-AzRoleDefinition -Name “<Role Name>”).id

 

The core deployment of the Azure Lighthouse configuration will be made using this Azure Resource Manager (ARM) template - https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/delegated-resource-managemen...

 

In order to ensure this ARM template deploys the required configuration it is accompanied by a parameters file which you must populate with the ID details listed above. A template for this parameters file can be found here:  https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/delegated-resource-managemen...

 

To complete the parameters file, update the values as follows:

  • mspOfferName – provide a display name for your managed service offering (this can be seen within the customer tenant).
  • mspOfferDescription – provide a description for your managed service offering (this can be seen within the customer tenant).
  • managedByTenantId – the tenant ID of the managing tenant.
  • authorizations
    • principalId – the ID string of the Azure AD Group in the managing tenant you want to grant access.
    • roleDefinitionId – the ID of the user role that you wish the AD group to have within the customers tenant.
    • principalIdDisplayName – provide a name for the group being granted access (this can be seen within the customer tenant and does not have to be the same as the AD group name).

Once complete your parameters file should look something like this:

 

Note: If you want to grant multiple groups access at differing role levels, you can include multiple entries under the authorizations section– see https://docs.microsoft.com/en-us/azure/lighthouse/how-to/onboard-customer for an example of this.

 

Once you have completed the parameters file you will need to provide the ARM template and parameters file to a user with the Owner role within the customer tenant.

 

Customer Tenant Configuration

After receiving the ARM template and parameters file from the managing tenant, the customer tenant  must deploy the configuration within the subscription that contains the Azure Sentinel workspace to be managed.

The first step in provisioning Lighthouse access within the customer tenant is to register the ManagedServices Resource in Azure. You can check if this is already registered via PowerShell with:

Get-AzResourceProvider -ProviderNameSpace Microsoft.ManagedServices

(If you are not using Azure Cloud Shell you will first need to run the Connect-AzAccount cmdlet to authenticate to Azure)

 

This should return an output similar to this:

 

If the RegistrationState does not read ‘Registered’  for all Workspaces in the output run the following command in PowerShell to register the service:

Register-AzResourceProvider -ProviderNamespace Microsoft.ManagedServices

Once the ManagedServices Resource is registered you can deploy the Lighthouse ARM template with the correct parameters provided by the managing tenant. First select the subscription that the Azure Sentinel workspace to be managed is part of using:

Select-AzSubscription -SubscriptionId ‘<Your Subscription ID>’

Then deploy the ARM template with:

New-AzDeployment -Name <deploymentName> `

                 -Location <AzureRegion>`

                 -TemplateFile <Path to ARM template> `

                 -TemplateParameterFile <Path to parameters file>`

                 -Verbose

(You can deploy in any region, if you are unsure you can use the region your Azure Sentinel workspace is deployed in.)

 

If deployed correctly the output should look like this:

 

To confirm if this deployment has been successful navigate to the Azure Portal and search for Service Providers. In here select Service provider offers where you should see the details of the configuration you just deployed.

 

Note:

There are also options to publish an MSP offering as a service via the Azure Marketplace and Cloud Partner Portal enabling customers to purchase and onboard the resources via the Azure portal rather than having to deploy an ARM template as described above. This process requires the MSP to publish several additional details about their service. For details regarding this process please see this documentation - https://docs.microsoft.com/en-us/azure/lighthouse/how-to/publish-managed-services-offers

 

Managing Tenants

Once the customer tenant has deployed the Lighthouse configuration the managing tenant can also validate the deployment by navigating to the Service Provider Portal and opening the Customers tab. Here you should see a list of customer tenants who have successfully deployed your Lighthouse configuration.

To view customer resources within the managing tenant’s Azure Portal open the portal and select the Directory + subscription filter at the top of the page, here you should see the customer tenant directories and subscriptions on-boarded for you to select:

 

 

Once selected the customer tenants Workspaces will appear in your Azure Sentinel workspaces list alongside your own workspaces.

 

Currently most features within Azure Sentinel are directly tied to a single workspace, however it is possible to query multiple tenant’s workspaces with one unified query in order to investigate and hunt for threats that might be impacting several tenants at once.  To do this you can use the union operator to merge a table from one workspace with another. For example, if you wanted to see a list of all security alerts from the last week from two workspaces you would use the following query:

union SecurityAlert, workspace('<Second Workspace Name>').SecurityAlert
| where TimeGenerated > ago(7d)

This can also be extended to any number of workspaces simply by adding more workspaces to the union query:

union SecurityAlert, workspace('<Second Workspace Name>').SecurityAlert, workspace(‘<Third Workspace Name>’).SecurityAlert
| where TimeGenerated > ago(7d)

The result set will appear as a single table, but you can use the TenantId field to identity which customer each item comes from.

 

Tracking an attack across multiple customer tenants

Exposed management endpoints on the internet are a regular attack target. Often attackers will scan the internet for exposed endpoints and then attempt to login using common credentials in the hopes of gaining access to at least some hosts. As a multi-customer monitoring team, it is common to see such attacks impacting several tenants simultaneously as commodity attackers indiscriminately attack any exposed interface they can find.

In this example we start with an alert in one of our customer’s workspaces for an attempted brute force attempt:

 

Upon inspecting the logs associated with this alert we can see all the attempts are coming from the same IP address:

 

To quickly assess if there is an impact from this activity we want to see if that IP address has successfully logged into any hosts in the environment. However, as we suspect this attack might be wider than just one of our customers, we can also simultaneously query our other workspaces for the same IP address.

union Syslog, workspace('<Customer2 Workspace Name>').Syslog
| where TimeGenerated > ago(7d)
| where ProcessName == "sshd"
| extend LogonIP = extract("([0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3}\\.[0-9]{1,3})", 1, SyslogMessage)
| where SyslogMessage contains 'Accepted'
| where LogonIP == "174.116.122.126"
| extend Customer = iif(TenantId == "<Customer2 Tenant ID>", "Customer2", "Customer1")
| project TimeGenerated, Customer, Computer, LogonIP, SyslogMessage 

The results of this query shows us that whilst there was no impact for the customer where we saw the Brute Force alert there were 2 successful logons for that IP address in another customer environment, highlighting these as events to investigate further.

 

Summary

A key principle to effective and scalable security operations is streamlining the security analysts’ job so that they can focus on threat detection and response. Azure Lighthouse’s integration with Azure Sentinel simplifies management of workspaces from multiple Azure tenants, whether they be external customer tenants or other tenants used internally within an organization, so that analysts can easily and effectively monitor multiple environments at once. In addition, the union operator within KQL allows analysts to query multiple environments at once, and track threats across them without having to repeat analysis.

 

If you want to know more about using Azure Sentinel in a multi-tenant or  Managed Service Provider environment @Ofer_Shezaf recently ran a really useful webinar on this subject. A recording of this can be found on YouTube, and the slides are available here.

 

Special thanks must also go to @Yaniv Shasha from the Azure Sentinel CxE team for his contribution to this blog and his work with Azure Lighthouse.

26 Comments
Senior Member

Lighthouse has so much promise for MSPs, but I get push-back from clients who need to maintain PCI compliance. The fear is that delegating access control to an external partner by grating rights to their groups means that they are relying on the partner to ensure that rouge actors don't gain access. It also would presumably make auditing more difficult.

Has Microsoft addressed this concern anywhere in a whitepaper or article? I can't seem to find anything.

Microsoft

@JoshuaK - PCI-DSS has robust provisions for handling service providers with access to in scope data, if a customer has PCI relevant data in Sentinel then Microsoft will already by a PCI service provider for them for which Microsoft has accreditation - https://docs.microsoft.com/en-us/microsoft-365/compliance/offering-pci-dss

Any other MSP with access to that data would also have to go through an accreditation and audit process but this is a well established path for QSAs.

 

As for malicious actors gaining access via a partner it is a threat vector to consider as attackers have targetted service providers to gain access to customers, however it with robust auditing of MSP security controls this risk can be managed. In addition the Lighthouse configuration allows you to assign granular controls over what an MSP has access to meaning it could be limited to read-only access to Sentinel data, limiting the scope of impact in a scenario where an MSP might be breached.

Valued Contributor

Is there any way to easily deploy playbooks to different tenants at once? That way you can keep a baseline for all customers

Microsoft

@Thijs Lecomte : you can use ARM. See here and here.

Senior Member

how will the billing work when you have a Sentinel configured in CSP tenant and configured to ingest the data coming from customer tenants? I think as a CSP provider we can offer Security as a Service to the ISV customers but just wondering about how the billing would work.

Microsoft

@JoshuaK : Lighthouse is arguably better than the method it replaces. Keep in mind that service provisioning implies providing access to a contractor; the question is only how.

Until now, to provide access to a subcontractor, you had to add each employee of the contractor as a guest to your tenant. This fundamentally breaks any identity governance scheme and makes contractual protection harder. With lighthouse, the contractor is in charge of managing a group of which the end customer set permissions for. This more closely aligns with the way the contracts work. It also means that onboarding and offboarding contractor employees servicing the customer would follow the process better.

Microsoft

@badkid :

 

A clarification - there is no CSP tenant. There is a CSP subscription within the customer tenant.

 

As to your question: you may recall that a subscription is the billing unit in Azure. The CSP model implies that the MSSP is paying for the CSP subscription, allowing the MSSP to "resell", by billing the customer and adding any premium based on added services, rather than having Microsoft bill the customer directly.

 

~ Ofer

Senior Member

@Ofer_Shezaf When I say CSP tenant, I meant: we being the Microsoft Cloud Solution Provider, we have our own subscription where sentinel is configured. If we configure the sentinel with the customer data source (say customer Log Analytics workspace - hosted on customers subscription), we as a CSP provider has to bare the cost of sentinel data consumption rather than customer pays for the sentinel. Is that the correct understanding?

Microsoft

@badkid : Yes, this is correct. This is the goal of the CSP model: enabling partners to bear the cost and charge the customer themselves. Note that Lighthouse does not require a CSP subscription and works with a regular subscription at the customer tenant.

Senior Member

we are using lighthouse for an enterprise that has multiple tenants. in this case we would like to query all log workspace. eg. union syslog *. is this posisble. we have 30 + tenants and this would be helpful to create a central workspace.

Microsoft

@Brendon Lobo : It is possible. That said, while 30+ tenants are sometimes needed, in general, it seems like a tenant reduction is due. 

Senior Member

what is the syntax to run such query? yes light house is helping with step 1 of discovery and management. once we have tenant related settings migrated we will move subscriptions. stating that light house and multi tenant is giving us an opportunity to monitor but give freedom.

Microsoft

@Brendon Lobo : the syntax uses the workspace keyword as demonstrated in this blog post. You can union more than two tables. To make this easier for individual analysts or content creators, you can encapsulate the union part of the query in a function

Regular Visitor

We are considering using Lighthouse to manage multiple customers Sentinels and we are trying to evaluate what would be the additional cost in our subscription ? what level of data comes from the managed Sentinels ? I realize there is no cost to the service itself but what about the data coming from the managed instances ?

Microsoft

@JF_68 the cost is incurred at the subscription where the Sentinel Workspace resides. Do if you have Tenant A with a Sentinel Workspace, and then you use Lighthouse to give Tenant B access to that workspace the costs associated with the Sentinel Workspace and the data remain with Tenant A.
When you provide access using Lighthouse you are not actually moving any of the data or resources you are simply giving a section of another tenant access to the resource.

 

Hope this helps.

Senior Member

little confusing :) Sorry! Let's say I have a subscription called "Provider" which hosts the Sentinel Workspace. Now, I provide access to that access to customer subscription say "Customer1" which sends the logs to the Sentinel workspace hosted under "Provider" subscription. My understanding is, Sentinel cost will be incurred in "Provider" subscription and NOT in "Customer1" subscription. I think now the challenge is, how to do the cross charging to the customer. Tags will solve the costing issue but still, as a CSP provider we need to figure out how to consolidate the billing for the charges across Customer1 subscription and Provider subscription. HOpe that helps!

 

Cheers

Deepak

Senior Member
Deepak, I think the simple answer here is that services which incur costs go into customer subscriptions rather than provider ones. Lighthouse is just delegated access to the data in a customer subscription for providers. In your example above, Sentinel is deployed to Customer 1 and Provider is simply given access to the Sentinel data stored inside Customer 1's subscription. Tooling allows Provider to aggregate and report off of data across multiple customers without storing their own copy of that data.
Occasional Contributor

@Pete Bryan One question. Assuming azure light house is in place. How do I know which incident in azure sentinel belongs to which tenant/subscription? I see tags option that is only the way to configure and identify? I also recall the preview feature 

Azure Sentinel Cross-Tenant/Cross-Workspace Incidents View. Assuming this will solve my requirement. Please confirm.
Microsoft

@Pavan_Gelli 

 

You are correct: the solution as described here does not consolidate incidents to a single workspace, hence no need to identify the workspace for an incindet. The corss workspace incidents screen now in private preview, which Lighthouse extends to be corss-tenant, indeed clearly dispays the worksapce and tenant for each incident.

Occasional Visitor

With Sentinel in a Lighthouse setup where does the data storage retain? Is data retained in the MSP Managing tenant as well as the child tenant or will the data be retained in the child tenant? will that increase the ingestion and retention costs as well as potential security concerns around data leaving a customer tenant. We had some issues in our AWS environment when we tried to multi tenant a solution but customers pushed back because of the Data moving from a customer account to one of our managed accounts

Microsoft

@LeeAMurphy : the data stays at the "child" tenant and therefore does not affect pricing.

New Contributor

Hi @Pete Bryan : As I tried to click on slide link, it gives me a warning that its a malicious website. Could you please update the link to some secure repository?

Microsoft

@Deepanshu_Marwah : I am not sure which linked you rererred to, but I went through the links and found one that included a safelink, probably copied from outlook. I updated it. Let me know 

New Contributor

Thanks @Ofer_Shezaf its working alright now

Occasional Contributor

Thanks for the great info; sharing with my Linkedin Network

New Contributor

@Ofer_Shezaf

 

We have several customer's tenants on-boarded into Lighthouse.  In our Lighthouse tenant, we can see all incidents in Sentinel.  However, we can't see the Owner of the incident.  Error is "Missing required permissions to list tenant users."  Is it possible to see who was assigned an incident within Lighthouse, ore can this only be seen within the customer's tenant?

 

 

Users.png