Skip to content

Commit 456d0c9

Browse files
committed
update module
1 parent 8067d0f commit 456d0c9

4 files changed

Lines changed: 69 additions & 42 deletions

learn-pr/wwl-sci/design-solutions-security-operations/2-design-security-operations-capabilities-hybrid-multicloud-environments.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ metadata:
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 12
11+
durationInMinutes: 11
1212
content: |
1313
[!include[](includes/2-design-security-operations-capabilities-hybrid-multicloud-environments.md)]

learn-pr/wwl-sci/design-solutions-security-operations/3-design-centralized-logging-auditing.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,6 @@ metadata:
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 17
11+
durationInMinutes: 20
1212
content: |
1313
[!include[](includes/3-design-centralized-logging-auditing.md)]

learn-pr/wwl-sci/design-solutions-security-operations/includes/2-design-security-operations-capabilities-hybrid-multicloud-environments.md

Lines changed: 14 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Organizations operating across hybrid, multicloud, and edge environments face unique challenges in security monitoring. Designing effective monitoring solutions requires a unified approach that extends visibility and control across all environments while optimizing costs and reducing operational complexity.
22

3-
**Monitoring** focuses on real-time visibility into system health, performance, and security threats. It answers the question "What's happening now?" and enables immediate detection and response. This differs from logging, which focuses on recording events for later analysis, compliance, and forensics.
3+
**Monitoring** focuses on real-time visibility into system health, performance, and security threats. It answers the question "What's happening now?" and enables immediate detection and response. **Logging** focuses on recording events for later analysis, compliance, and forensics—answering "What happened?" These are complementary capabilities, and monitoring solutions may also provide logging capabilities in support of a unified platform. This unit focuses on the real-time monitoring aspects; the next unit covers logging and auditing in detail, including workspace design and data retention strategies.
44

55
## Design guidance for hybrid and multicloud monitoring
66

@@ -11,8 +11,7 @@ When designing monitoring solutions for hybrid and multicloud environments, cons
1111
- **Extend governance and operations** using cloud controls that can reach on-premises, multicloud, and edge deployments.
1212
- **Design for data residency and compliance** requirements that may dictate where monitoring data must be stored.
1313

14-
> [!IMPORTANT]
15-
> Insufficient capabilities in operation tools can require teams to replicate processes using different cloud controls across platforms. A unified operations approach eliminates these inefficiencies.
14+
![Diagram that shows how unified operations extends cloud controls to hybrid, multicloud, and edge deployments.](../media/primary-cloud-provider-extended.png)
1615

1716
## Microsoft solutions for hybrid and multicloud monitoring
1817

@@ -29,26 +28,26 @@ Azure Arc extends the Azure platform to manage and govern infrastructure across
2928

3029
### Azure Monitor for unified observability
3130

32-
Azure Monitor provides comprehensive monitoring for resources across cloud and on-premises environments:
31+
Azure Monitor provides comprehensive monitoring for resources across cloud and on-premises environments. While Azure Monitor supports both real-time monitoring and log collection, this section focuses on the monitoring capabilities. Log Analytics workspace design and log retention strategies are covered in the next unit.
3332

3433
| Capability | Description |
3534
|------------|-------------|
36-
| **Data collection** | Collect metrics, logs, and traces from Azure, on-premises, and multicloud sources using the Azure Monitor agent |
35+
| **Metrics** | Collect and analyze numerical performance data from Azure, on-premises, and multicloud sources for real-time visibility |
3736
| **VM insights** | Monitor operating system performance and discover application components across hybrid machines |
3837
| **Container insights** | Use Azure Arc-enabled Kubernetes for consistent monitoring of AKS, AWS EKS, and GCP GKE clusters |
39-
| **Log Analytics** | Centralize logs in workspaces for analysis, alerting, and long-term retention |
38+
| **Dashboards and workbooks** | Visualize real-time performance metrics and create interactive reports for operational visibility |
4039

4140
The Azure Monitor agent can be deployed to both Azure VMs and Azure Arc-enabled servers, using the same data collection rules across all environments.
4241

4342
### Data collection rules for hybrid environments
4443

45-
Data collection rules (DCRs) are the foundation of consistent monitoring across hybrid and multicloud environments. DCRs define:
44+
Data collection rules (DCRs) define what telemetry to collect and where to send it, enabling consistent monitoring across hybrid and multicloud environments. From a monitoring perspective, DCRs enable:
4645

47-
- **What data to collect** - Specify performance counters, Windows events, Syslog, and custom logs
48-
- **How to transform data** - Filter and transform data before ingestion to reduce costs
49-
- **Where to send data** - Route data to Log Analytics workspaces, Azure Monitor metrics, or multiple destinations
46+
- **Consistent telemetry collection** - Apply the same collection configuration to Azure VMs, Arc-enabled servers in AWS/GCP, and on-premises machines
47+
- **Real-time data routing** - Stream performance counters and security events to Azure Monitor for immediate alerting and visualization
48+
- **Data transformation** - Filter and transform data before ingestion to focus on security-relevant telemetry
5049

51-
Using DCRs, you can apply the same collection configuration to Azure VMs, Arc-enabled servers in AWS/GCP, and on-premises machines—ensuring consistent telemetry across all environments.
50+
DCRs ensure that security teams have consistent visibility across all environments, regardless of where resources are hosted.
5251

5352
### Alerting for hybrid and multicloud resources
5453

@@ -57,7 +56,7 @@ Azure Monitor provides alerting capabilities that work consistently across hybri
5756
| Alert type | Use case |
5857
|------------|----------|
5958
| **Metric alerts** | Near-real-time alerts comparing collected values to static or dynamic thresholds using machine learning |
60-
| **Log query alerts** | Identify issues by analyzing log data across multiple servers using KQL queries |
59+
| **Log search alerts** | Identify issues by analyzing log data across multiple servers using KQL queries |
6160
| **Activity log alerts** | Monitor Azure resource operations and service health events |
6261

6362
Alerts can trigger action groups to notify teams, run automation runbooks, or invoke Logic Apps for automated remediation.
@@ -96,28 +95,19 @@ The Microsoft Defender portal provides a unified view of security monitoring dat
9695
This centralized visibility eliminates the need for security teams to switch between multiple consoles when monitoring hybrid environments, reducing mean time to detect (MTTD) threats.
9796

9897
> [!NOTE]
99-
> This unit focuses on infrastructure monitoring across hybrid and multicloud environments. Microsoft 365 productivity workloads (email, files, identity, collaboration) have their own monitoring capabilities through Microsoft Defender XDR services, and is covered in [Design solutions for securing Microsoft 365](/training/modules/design-solutions-secure-microsoft-365/). The Defender portal serves as the convergence point where infrastructure and productivity monitoring combine for unified incident correlation and response.
98+
> This unit focuses on infrastructure monitoring across hybrid and multicloud environments. Microsoft 365 productivity workloads (email, files, identity, collaboration) have their own monitoring capabilities through Microsoft Defender XDR services, and are covered in [Design solutions for securing Microsoft 365](/training/modules/design-solutions-secure-microsoft-365/). The Defender portal serves as the convergence point where infrastructure and productivity monitoring combine for unified incident correlation and response.
10099
101100
## Architect-level design considerations
102101

103102
### Workspace architecture decisions
104103

105-
As a cybersecurity architect, one of your key decisions is workspace topology. This decision directly impacts your monitoring effectiveness because:
104+
As a cybersecurity architect, workspace topology is a key decision that affects both monitoring and logging effectiveness. From a monitoring perspective, consider:
106105

107106
- **Threat correlation** - Security analysts need to correlate events across identities, endpoints, and network traffic. Data in separate workspaces requires cross-workspace queries, which are slower and more complex.
108107
- **Alert context** - When an alert fires, analysts need surrounding context from related logs. Fragmented workspaces mean analysts may miss critical context during investigations.
109108
- **Detection rules** - Analytics rules and detection logic work most efficiently when all relevant data sources are in the same workspace.
110-
- **Cost efficiency** - Commitment tier pricing applies per workspace, so consolidation can reduce costs, but data egress charges may offset savings if sources are geographically dispersed.
111109

112-
Consider these patterns:
113-
114-
| Pattern | When to use | Trade-offs |
115-
|---------|-------------|------------|
116-
| **Single workspace** | Small to medium organizations, need for cross-environment correlation | Simplified management, but may not meet data residency requirements |
117-
| **Regional workspaces** | Data sovereignty requirements, geographically distributed operations | Meets compliance needs, but reduces cross-region correlation |
118-
| **Workload-specific workspaces** | Strict access control requirements, chargeback models | Granular access control, but increases management overhead |
119-
120-
For most hybrid and multicloud scenarios, a primary workspace with Azure Lighthouse for multi-tenant visibility provides the best balance of centralization and flexibility.
110+
The next unit covers workspace architecture in more depth, including log retention tiers, cost optimization, and compliance considerations.
121111

122112
### Agent deployment strategy at scale
123113

@@ -143,12 +133,6 @@ Plan for scenarios where monitoring agents may be unavailable:
143133
- Use Azure Private Link for Log Analytics workspaces to keep monitoring traffic off the public internet
144134
- Plan for network latency when determining workspace placement—high latency can affect real-time alerting
145135

146-
### Cost optimization strategies
147-
148-
- Use commitment tiers when consolidating monitoring data to reduce per-GB ingestion costs
149-
- Consider workspace placement to minimize egress charges
150-
- Leverage storage tiers appropriately—use analytics tier for real-time detection and data lake tier for long-term retention (covered in detail in the next unit)
151-
152136
## Design considerations summary
153137

154138
| Factor | Consideration |

0 commit comments

Comments
 (0)