Skip to content

Commit 89e06eb

Browse files
committed
update module
1 parent 456d0c9 commit 89e06eb

2 files changed

Lines changed: 54 additions & 115 deletions

File tree

learn-pr/wwl-sci/design-solutions-security-operations/includes/2-design-security-operations-capabilities-hybrid-multicloud-environments.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ This centralized visibility eliminates the need for security teams to switch bet
104104
As a cybersecurity architect, workspace topology is a key decision that affects both monitoring and logging effectiveness. From a monitoring perspective, consider:
105105

106106
- **Threat correlation** - Security analysts need to correlate events across identities, endpoints, and network traffic. Data in separate workspaces requires cross-workspace queries, which are slower and more complex.
107-
- **Alert context** - When an alert fires, analysts need surrounding context from related logs. Fragmented workspaces mean analysts may miss critical context during investigations.
107+
- **Alert context** - When an alert fires, analysts need the surrounding context from related logs. Fragmented workspaces mean analysts may miss critical context during investigations.
108108
- **Detection rules** - Analytics rules and detection logic work most efficiently when all relevant data sources are in the same workspace.
109109

110110
The next unit covers workspace architecture in more depth, including log retention tiers, cost optimization, and compliance considerations.

learn-pr/wwl-sci/design-solutions-security-operations/includes/3-design-centralized-logging-auditing.md

Lines changed: 53 additions & 114 deletions
Original file line numberDiff line numberDiff line change
@@ -36,60 +36,72 @@ The Microsoft Cloud Security Benchmark (MCSB) provides guidance on designing log
3636
3737
## Microsoft solutions for centralized logging
3838

39-
### Azure Monitor Logs
39+
### Log Analytics workspaces
40+
41+
Log Analytics workspaces serve as the central repository for log data in Microsoft's security architecture. Both Azure Monitor and Microsoft Sentinel store their data in Log Analytics workspaces—Microsoft Sentinel is essentially a security solution that runs on top of a Log Analytics workspace.
42+
43+
When designing your logging strategy, consider:
44+
45+
- **What to log**: Security events, resource logs, activity logs, application logs, and network flow logs
46+
- **Where to store**: Single workspace for correlation benefits, or multiple workspaces for data residency, access control, or cost optimization
47+
- **How long to retain**: Configure retention per table based on compliance requirements and investigation needs
4048

41-
Azure Monitor Logs is the foundational logging platform that collects and stores log data from Azure resources, on-premises systems, and multicloud environments. Understanding Azure Monitor Logs is essential before designing Microsoft Sentinel solutions, as Sentinel builds on this foundation.
49+
Because both services share the same workspace foundation, you can query and correlate operational data (collected via Azure Monitor) with security data (collected via Microsoft Sentinel data connectors) in a unified experience.
4250

43-
#### Log types in Azure Monitor
51+
#### Azure Monitor logging
52+
53+
Azure Monitor collects infrastructure and operational log data from Azure resources, virtual machines, and hybrid environments. This data flows into Log Analytics workspaces through several collection mechanisms.
54+
55+
**Log types collected by Azure Monitor:**
4456

4557
| Log type | Description | Collection method |
4658
|----------|-------------|-------------------|
47-
| **Resource logs** | Detailed operational data from Azure resources (e.g., Key Vault access, storage operations, database queries) | Diagnostic settings per resource |
59+
| **Resource logs** | Detailed operational data from Azure resources (for example, Key Vault access, storage operations, database queries) | Diagnostic settings per resource |
4860
| **Activity logs** | Subscription-level events including resource modifications, service health, and administrative actions | Automatic; use diagnostic settings to send to Log Analytics |
4961
| **Platform metrics** | Numerical performance data collected automatically from Azure resources | Automatic; use diagnostic settings for additional routing |
5062
| **Guest OS logs** | Windows events, Syslog, and performance counters from virtual machines | Azure Monitor agent with data collection rules |
5163

52-
#### Diagnostic settings
53-
54-
Diagnostic settings are the configuration mechanism for collecting logs from Azure resources. Each Azure resource requires its own diagnostic setting to send logs to destinations:
64+
**Diagnostic settings** are the configuration mechanism for collecting logs from Azure resources. Each Azure resource requires its own diagnostic setting to send logs to destinations:
5565

5666
- **Log Analytics workspace** - Enables querying with KQL, correlation with other data, and integration with Microsoft Sentinel
5767
- **Storage account** - Cost-effective archival for compliance requirements
5868
- **Event hub** - Stream to external SIEM systems or custom applications
5969
- **Partner solutions** - Send directly to integrated partner monitoring tools
6070

61-
When designing your logging architecture:
62-
63-
- Create diagnostic settings for each resource you need to monitor
64-
- Select appropriate log categories based on security and compliance requirements
65-
- Consider using Azure Policy to automatically create diagnostic settings for new resources
66-
- Use category groups (audit, allLogs) to simplify configuration
67-
6871
> [!TIP]
6972
> Use Azure Policy with the "Deploy diagnostic settings" effect to automatically configure logging for resources as they're created. This ensures consistent log collection across your environment.
7073
71-
#### Azure Monitor agent for guest logs
72-
73-
For virtual machines and Arc-enabled servers, the Azure Monitor agent collects guest operating system logs using data collection rules (covered in the previous unit for monitoring). From a logging perspective:
74+
**Azure Monitor agent** collects guest operating system logs from virtual machines and Arc-enabled servers using data collection rules:
7475

7576
- **Windows Event Logs** - Security, Application, System, and custom logs
76-
- **Syslog** - Linux system and application logs
77+
- **Syslog** - Linux system and application logs
7778
- **Custom text logs** - Application-specific log files
7879
- **IIS logs** - Web server access and error logs
7980

80-
Data collection rules specify which logs to collect and which Log Analytics workspace to send them to, enabling consistent log collection across hybrid and multicloud environments.
81+
#### Microsoft Sentinel logging
8182

82-
### Log Analytics workspaces
83+
> [!IMPORTANT]
84+
> Microsoft Sentinel is transitioning to the Microsoft Defender portal. Starting March 31, 2027, Microsoft Sentinel will only be available in the Defender portal. Plan your workspace design with this unified experience in mind.
8385
84-
Log Analytics workspaces serve as the central repository for log data in Microsoft's security architecture. When designing your logging strategy, consider:
86+
Microsoft Sentinel uses **data connectors** to ingest security-focused data into a Log Analytics workspace. Organizations can choose to use the same workspace as Azure Monitor (for better cross-domain correlation) or a dedicated workspace (for security team isolation and cost separation). While some connectors use Azure Monitor's infrastructure (diagnostic settings and Azure Monitor agent), others use service-to-service APIs for Microsoft and third-party security products.
8587

86-
- **What to log**: Security events, resource logs, activity logs, application logs, and network flow logs
87-
- **Where to store**: Single workspace for correlation benefits, or multiple workspaces for data residency, access control, or cost optimization
88-
- **How long to retain**: Configure retention per table based on compliance requirements and investigation needs
88+
**Data connector types:**
8989

90-
Log Analytics workspaces integrate with Microsoft Sentinel for security analytics and with Azure Monitor for operational insights, allowing you to query and correlate data across both domains when needed.
90+
| Connector type | Examples | Collection mechanism |
91+
|----------------|----------|---------------------|
92+
| **Diagnostic settings-based** | Azure Firewall, Key Vault, Azure Activity | Uses same diagnostic settings as Azure Monitor |
93+
| **Azure Monitor agent-based** | Windows Security Events, Syslog/CEF from security appliances | Uses same AMA infrastructure as Azure Monitor |
94+
| **API-based/service-to-service** | Microsoft Defender XDR, Microsoft Entra ID, Office 365 | Direct service integration unique to Microsoft Sentinel |
95+
| **Custom/Logs ingestion API** | Non-Microsoft products, custom applications | REST API with data collection rules |
9196

92-
### Microsoft Sentinel log storage tiers
97+
This architecture means security architects must decide whether to enable Microsoft Sentinel on a workspace:
98+
99+
- **Log Analytics workspace without Sentinel** - For operational data that only needs querying and alerting (Azure Monitor alert rules)
100+
- **Log Analytics workspace with Sentinel enabled** - Adds SIEM capabilities (detection rules, incidents, hunting) to ALL data in the workspace, regardless of collection method
101+
102+
When Microsoft Sentinel is enabled, logs collected via Azure Monitor (diagnostic settings, AMA) become available for Microsoft Sentinel's security analytics alongside data from Sentinel-specific connectors.
103+
104+
### Microsoft Sentinel storage tiers
93105

94106
Microsoft Sentinel provides two storage tiers optimized for different use cases:
95107

@@ -115,91 +127,35 @@ The Microsoft Sentinel data lake is a fully managed, cloud-native data lake purp
115127

116128
Data in the analytics tier is automatically mirrored to the data lake tier at no extra cost when retention periods match. Organizations can choose to ingest data exclusively into the data lake tier for high-volume, lower-security-value logs.
117129

118-
The data lake's built-in activity audit provides accountability for security operations activities—you can monitor who accessed data, ran notebooks, or created and modified jobs. This auditing is enabled by default and supports compliance requirements for tracking access to security data.
130+
:::image type="content" source="../media/data-lake-tiers-data-flow.png" lightbox="../media/data-lake-tiers-data-flow.png" alt-text="A block diagram that depicts the mirroring of data from analytics tier to the data lake tier.":::
119131

120132
### Data lake analytics capabilities
121133

122134
The data lake provides multiple ways to analyze historical log data:
123135

124-
| Capability | Purpose | Best for |
125-
|------------|---------|----------|
126-
| **KQL jobs** | Run one-time or scheduled asynchronous queries against data lake data with full KQL support including joins and unions | Incident investigations using historical logs, threat intelligence matching, anomaly detection across months of data |
127-
| **Summary rules** | Run scheduled aggregation jobs (bin sizes from 20 minutes to 24 hours) to precompute data into custom log tables | Aggregating network and firewall logs, creating baseline tables for detection, cost optimization for verbose logs |
128-
| **Search jobs** | Run long-running searches through up to a year of data in a table, sending results to a new Analytics table | Forensic analysis when query timeout is insufficient, searching large datasets for specific events |
129-
| **Jupyter notebooks** | Use Python-based advanced analytics with machine learning libraries | Machine learning models, complex statistical analysis, custom visualizations |
130-
131-
KQL jobs can promote data from the data lake tier to the analytics tier, enabling investigation of historical events alongside current incidents. This is valuable for zero-day threat detection and retrospective threat hunting.
132-
133-
> [!TIP]
134-
> Use KQL jobs for incident investigations, threat intelligence matching, and promoting data from data lake to analytics tier. Use summary rules for recurring aggregations that support detection rules. Use search jobs when you need to scan large datasets for specific events.
135-
136-
### Data connectors and data flow
137-
138-
When you onboard to Microsoft Sentinel data lake, your existing data connectors can send data to:
139-
140-
- **Analytics tier only** - For data requiring real-time alerting and hunting
141-
- **Analytics tier with data lake mirroring** - Default configuration for most security data
142-
- **Data lake tier only** - For high-volume logs with limited real-time security value
143-
144-
145-
:::image type="content" source="../media/data-lake-tiers-data-flow.png" lightbox="../media/data-lake-tiers-data-flow.png" alt-text="A block diagram that depicts the mirroring of data from analytics tier to the data lake tier.":::
136+
| Capability | Purpose | When to use |
137+
|------------|---------|-------------|
138+
| **KQL jobs** | Asynchronous queries with full KQL support; can promote data to analytics tier | Incident investigations, threat intelligence matching, retrospective hunting for zero-day threats |
139+
| **Summary rules** | Scheduled aggregations (20 min to 24-hr bins) into custom tables | Recurring aggregations for detection rules, cost optimization for verbose logs |
140+
| **Search jobs** | Long-running searches through up to a year of data | Forensic analysis requiring large dataset scans |
141+
| **Jupyter notebooks** | Python-based analytics with ML libraries | Machine learning models, complex statistical analysis |
146142

147143
## Microsoft Purview Audit for compliance
148144

149-
Microsoft Purview Audit provides an integrated auditing solution to help organizations respond to security events, forensic investigations, and compliance obligations.
150-
151-
### Audit capabilities
152-
153-
- **Enabled by default** for organizations with appropriate subscriptions
154-
- **Thousands of searchable audit events** across Microsoft 365 services
155-
- **Audit search tool** in the Microsoft Purview portal for investigation
156-
- **Audit Search Graph API** for programmatic access
157-
- **PowerShell cmdlets** (Search-UnifiedAuditLog) for scripted searches and automation
158-
- **Export to CSV** for analysis and reporting
159-
- **Office 365 Management Activity API** for SIEM integration with higher bandwidth for Premium
160-
161-
### Audit retention tiers
162-
163-
| Tier | Default retention | Extended retention | Use case |
164-
|------|-------------------|-------------------|----------|
165-
| **Audit (Standard)** | 180 days | N/A | General auditing needs for all users |
166-
| **Audit (Premium)** | 1 year for Exchange, SharePoint, Entra ID; 180 days for other services | Up to 10 years with add-on license | Regulatory compliance, forensic investigations |
167-
168-
> [!NOTE]
169-
> The 10-year retention requires both an E5 license and a 10-Year Audit Log Retention add-on license. Custom retention policies can specify retention by workload, activity type, or specific users.
145+
Microsoft Purview Audit provides an integrated auditing solution for Microsoft 365 services, tracking user and administrator activities to support security investigations, forensics, and compliance obligations.
170146

171-
### Audit (Premium) intelligent insights
147+
### Audit retention and design considerations
172148

173-
Audit (Premium) provides access to high-value events critical for forensic and compliance investigations:
149+
| Tier | Default retention | Extended retention | Design consideration |
150+
|------|-------------------|-------------------|---------------------|
151+
| **Audit (Standard)** | 180 days | N/A | Included with most Microsoft 365 licenses; sufficient for general auditing |
152+
| **Audit (Premium)** | One year for Exchange, SharePoint, Entra ID | Up to 10 years with add-on license | Required for regulatory compliance; includes high-value forensic events (MailItemsAccessed, SearchQueryInitiated) |
174153

175-
| Service | Intelligent insight events |
176-
|---------|---------------------------|
177-
| **Exchange Online** | MailItemsAccessed, Send, SearchQueryInitiatedExchange, MailItemsRead |
178-
| **SharePoint Online** | SearchQueryInitiatedSharePoint, FileAccessedExtended |
179-
| **Microsoft Teams** | Meeting join/leave, message events with sensitivity labels |
180-
181-
These events help determine the scope of compromise during breach investigations—for example, identifying exactly which email items an attacker accessed or what searches a compromised account performed.
182-
183-
### Custom audit log retention policies
184-
185-
As an architect, you can create custom retention policies to meet specific compliance requirements:
186-
187-
- Retain audit records based on **specific Microsoft 365 services** (Exchange, SharePoint, Entra ID)
188-
- Target **specific activities** within a service
189-
- Apply policies to **specific users** for targeted retention
190-
- Set **priority levels** when multiple policies apply to the same records
191-
192-
Organizations can have up to 50 custom audit log retention policies.
154+
Audit (Premium) provides access to intelligent insight events critical for breach investigations—such as identifying exactly which email items an attacker accessed. Custom retention policies can target specific workloads, activities, or users.
193155

194156
### Integration with Microsoft Sentinel
195157

196-
Microsoft Purview audit logs can be integrated with Microsoft Sentinel to:
197-
198-
- Centralize audit data with other security telemetry
199-
- Correlate user activities with security events
200-
- Create analytics rules for suspicious activity patterns
201-
- Maintain long-term retention through data lake tier
202-
- Use intelligent insight events in detection rules for insider threat scenarios
158+
For centralized logging architectures, integrate Microsoft Purview audit logs with Microsoft Sentinel to correlate user activities with infrastructure security events and maintain long-term retention through the data lake tier.
203159

204160
## Architect-level design considerations
205161

@@ -261,20 +217,3 @@ Design your tiering strategy based on data classification:
261217
| **Secondary security data** (firewall logs, proxy logs, NetFlow) | Data lake tier with summary rules | 1-7 years; use summary rules to aggregate into analytics tier |
262218
| **Compliance/audit data** | Analytics tier mirrored to data lake | Match regulatory requirements (often 7-10 years) |
263219
| **High-volume, low-value logs** (verbose application logs) | Data lake tier only | Based on compliance; query on-demand with KQL jobs |
264-
265-
### Design considerations summary
266-
267-
When designing your centralized logging architecture, consider:
268-
269-
| Factor | Consideration |
270-
|--------|---------------|
271-
| **Data ownership** | Assign owners responsible for each log source's access, retention, and processing |
272-
| **Retention requirements** | Align retention periods with compliance regulations and investigation needs; use data lake tier for long-term retention |
273-
| **Cost optimization** | Use appropriate storage tiers based on data value and access patterns; use commitment tiers for 100+ GB/day |
274-
| **Access control** | Implement table-level RBAC to control access to sensitive log data; use resource-context RBAC for operational data |
275-
| **Data residency** | Ensure log storage locations meet regulatory requirements; consider regional workspaces if needed |
276-
| **Integration** | Design for correlation between operational and security logs; plan Purview Audit integration with Microsoft Sentinel |
277-
| **Resilience** | Consider log multicasting to secondary workspace for critical data if regional availability is required |
278-
279-
> [!IMPORTANT]
280-
> Microsoft Sentinel is transitioning to the Microsoft Defender portal. Starting March 31, 2027, Microsoft Sentinel will only be available in the Defender portal. Plan your workspace design with this unified experience in mind.

0 commit comments

Comments
 (0)