You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/2-design-security-operations-capabilities-hybrid-multicloud-environments.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/2-design-security-operations-capabilities-hybrid-multicloud-environments.md
+14-30Lines changed: 14 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
Organizations operating across hybrid, multicloud, and edge environments face unique challenges in security monitoring. Designing effective monitoring solutions requires a unified approach that extends visibility and control across all environments while optimizing costs and reducing operational complexity.
2
2
3
-
**Monitoring** focuses on real-time visibility into system health, performance, and security threats. It answers the question "What's happening now?" and enables immediate detection and response. This differs from logging, which focuses on recording events for later analysis, compliance, and forensics.
3
+
**Monitoring** focuses on real-time visibility into system health, performance, and security threats. It answers the question "What's happening now?" and enables immediate detection and response. **Logging**focuses on recording events for later analysis, compliance, and forensics—answering "What happened?" These are complementary capabilities, and monitoring solutions may also provide logging capabilities in support of a unified platform. This unit focuses on the real-time monitoring aspects; the next unit covers logging and auditing in detail, including workspace design and data retention strategies.
4
4
5
5
## Design guidance for hybrid and multicloud monitoring
6
6
@@ -11,8 +11,7 @@ When designing monitoring solutions for hybrid and multicloud environments, cons
11
11
-**Extend governance and operations** using cloud controls that can reach on-premises, multicloud, and edge deployments.
12
12
-**Design for data residency and compliance** requirements that may dictate where monitoring data must be stored.
13
13
14
-
> [!IMPORTANT]
15
-
> Insufficient capabilities in operation tools can require teams to replicate processes using different cloud controls across platforms. A unified operations approach eliminates these inefficiencies.
14
+

16
15
17
16
## Microsoft solutions for hybrid and multicloud monitoring
18
17
@@ -29,26 +28,26 @@ Azure Arc extends the Azure platform to manage and govern infrastructure across
29
28
30
29
### Azure Monitor for unified observability
31
30
32
-
Azure Monitor provides comprehensive monitoring for resources across cloud and on-premises environments:
31
+
Azure Monitor provides comprehensive monitoring for resources across cloud and on-premises environments. While Azure Monitor supports both real-time monitoring and log collection, this section focuses on the monitoring capabilities. Log Analytics workspace design and log retention strategies are covered in the next unit.
33
32
34
33
| Capability | Description |
35
34
|------------|-------------|
36
-
|**Data collection**| Collect metrics, logs, and traces from Azure, on-premises, and multicloud sources using the Azure Monitor agent|
35
+
|**Metrics**| Collect and analyze numerical performance data from Azure, on-premises, and multicloud sources for real-time visibility|
37
36
|**VM insights**| Monitor operating system performance and discover application components across hybrid machines |
38
37
|**Container insights**| Use Azure Arc-enabled Kubernetes for consistent monitoring of AKS, AWS EKS, and GCP GKE clusters |
39
-
|**Log Analytics**|Centralize logs in workspaces for analysis, alerting, and long-term retention|
38
+
|**Dashboards and workbooks**|Visualize real-time performance metrics and create interactive reports for operational visibility|
40
39
41
40
The Azure Monitor agent can be deployed to both Azure VMs and Azure Arc-enabled servers, using the same data collection rules across all environments.
42
41
43
42
### Data collection rules for hybrid environments
44
43
45
-
Data collection rules (DCRs) are the foundation of consistent monitoring across hybrid and multicloud environments. DCRs define:
44
+
Data collection rules (DCRs) define what telemetry to collect and where to send it, enabling consistent monitoring across hybrid and multicloud environments. From a monitoring perspective, DCRs enable:
46
45
47
-
-**What data to collect** - Specify performance counters, Windows events, Syslog, and custom logs
48
-
-**How to transform data** - Filter and transform data before ingestion to reduce costs
49
-
-**Where to send data** - Route data to Log Analytics workspaces, Azure Monitor metrics, or multiple destinations
46
+
-**Consistent telemetry collection** - Apply the same collection configuration to Azure VMs, Arc-enabled servers in AWS/GCP, and on-premises machines
47
+
-**Real-time data routing** - Stream performance counters and security events to Azure Monitor for immediate alerting and visualization
48
+
-**Data transformation** - Filter and transform data before ingestion to focus on security-relevant telemetry
50
49
51
-
Using DCRs, you can apply the same collection configuration to Azure VMs, Arc-enabled servers in AWS/GCP, and on-premises machines—ensuring consistent telemetry across all environments.
50
+
DCRs ensure that security teams have consistent visibility across all environments, regardless of where resources are hosted.
52
51
53
52
### Alerting for hybrid and multicloud resources
54
53
@@ -57,7 +56,7 @@ Azure Monitor provides alerting capabilities that work consistently across hybri
57
56
| Alert type | Use case |
58
57
|------------|----------|
59
58
|**Metric alerts**| Near-real-time alerts comparing collected values to static or dynamic thresholds using machine learning |
60
-
|**Log query alerts**| Identify issues by analyzing log data across multiple servers using KQL queries |
59
+
|**Log search alerts**| Identify issues by analyzing log data across multiple servers using KQL queries |
61
60
|**Activity log alerts**| Monitor Azure resource operations and service health events |
62
61
63
62
Alerts can trigger action groups to notify teams, run automation runbooks, or invoke Logic Apps for automated remediation.
@@ -96,28 +95,19 @@ The Microsoft Defender portal provides a unified view of security monitoring dat
96
95
This centralized visibility eliminates the need for security teams to switch between multiple consoles when monitoring hybrid environments, reducing mean time to detect (MTTD) threats.
97
96
98
97
> [!NOTE]
99
-
> This unit focuses on infrastructure monitoring across hybrid and multicloud environments. Microsoft 365 productivity workloads (email, files, identity, collaboration) have their own monitoring capabilities through Microsoft Defender XDR services, and is covered in [Design solutions for securing Microsoft 365](/training/modules/design-solutions-secure-microsoft-365/). The Defender portal serves as the convergence point where infrastructure and productivity monitoring combine for unified incident correlation and response.
98
+
> This unit focuses on infrastructure monitoring across hybrid and multicloud environments. Microsoft 365 productivity workloads (email, files, identity, collaboration) have their own monitoring capabilities through Microsoft Defender XDR services, and are covered in [Design solutions for securing Microsoft 365](/training/modules/design-solutions-secure-microsoft-365/). The Defender portal serves as the convergence point where infrastructure and productivity monitoring combine for unified incident correlation and response.
100
99
101
100
## Architect-level design considerations
102
101
103
102
### Workspace architecture decisions
104
103
105
-
As a cybersecurity architect, one of your key decisions is workspace topology. This decision directly impacts your monitoring effectiveness because:
104
+
As a cybersecurity architect, workspace topology is a key decision that affects both monitoring and logging effectiveness. From a monitoring perspective, consider:
106
105
107
106
-**Threat correlation** - Security analysts need to correlate events across identities, endpoints, and network traffic. Data in separate workspaces requires cross-workspace queries, which are slower and more complex.
108
107
-**Alert context** - When an alert fires, analysts need surrounding context from related logs. Fragmented workspaces mean analysts may miss critical context during investigations.
109
108
-**Detection rules** - Analytics rules and detection logic work most efficiently when all relevant data sources are in the same workspace.
110
-
-**Cost efficiency** - Commitment tier pricing applies per workspace, so consolidation can reduce costs, but data egress charges may offset savings if sources are geographically dispersed.
111
109
112
-
Consider these patterns:
113
-
114
-
| Pattern | When to use | Trade-offs |
115
-
|---------|-------------|------------|
116
-
|**Single workspace**| Small to medium organizations, need for cross-environment correlation | Simplified management, but may not meet data residency requirements |
117
-
|**Regional workspaces**| Data sovereignty requirements, geographically distributed operations | Meets compliance needs, but reduces cross-region correlation |
118
-
|**Workload-specific workspaces**| Strict access control requirements, chargeback models | Granular access control, but increases management overhead |
119
-
120
-
For most hybrid and multicloud scenarios, a primary workspace with Azure Lighthouse for multi-tenant visibility provides the best balance of centralization and flexibility.
110
+
The next unit covers workspace architecture in more depth, including log retention tiers, cost optimization, and compliance considerations.
121
111
122
112
### Agent deployment strategy at scale
123
113
@@ -143,12 +133,6 @@ Plan for scenarios where monitoring agents may be unavailable:
143
133
- Use Azure Private Link for Log Analytics workspaces to keep monitoring traffic off the public internet
144
134
- Plan for network latency when determining workspace placement—high latency can affect real-time alerting
145
135
146
-
### Cost optimization strategies
147
-
148
-
- Use commitment tiers when consolidating monitoring data to reduce per-GB ingestion costs
149
-
- Consider workspace placement to minimize egress charges
150
-
- Leverage storage tiers appropriately—use analytics tier for real-time detection and data lake tier for long-term retention (covered in detail in the next unit)
0 commit comments