Azure Sentinel News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
Azure Sentinel News
No Result
View All Result
Home SIEM

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

Azure Sentinel News Editor by Azure Sentinel News Editor
February 8, 2021
in SIEM
0
Microsoft suspends 18 Azure accounts tied to China-based hackers
4.6kViews
600 Shares Share on Facebook Share on Twitter

Over the past several weeks there’s a been a mighty movement in the Data Connector blade of Azure Sentinel, resulting in lots of new Data Connectors. As easy as it is (or not) to notice when new Data Connectors are available, it’s difficult to know when existing ones are updated. Once such recent update is valuable enough to take a look at today.

The Azure Active Directory Data Connector has been updated to include the ability to choose the following additional logs:

  • Non-interactive user sign-in Log (Preview)
  • Service principal sign-in logs (Preview)
  • Managed Identity Sign-in logs (Preview)
  • Provisioning logs (Preview)
Enable extra logs

To enable the additional ingest, open the specific Azure Active Directory Data Connector, place a checkmark beside the newly offered log files, and then click the Apply Changes button.

The ability to enable these as part of the Data Connector is excellent value. Prior to this capability, you could still enable the logs, you’d just need to do it through the Diagnostic Setting for the service. This makes it a lot easier.

There’s a couple blog posts I know of that speak specifically to monitoring Service Principal activity. In the following resource links, you can skip the instructions about the Diagnostic Setting and just start utilizing the KQL goodness provided:

  • Monitor Service Principal with Azure Sentinel by Eli Shlomo
  • Monitoring Service principal sign-ins with AzureAD and Azure Sentinel by Alex Verboon

DISCLAIMER: This feature enhancement is in Preview – meaning that things can change between Preview and Release. Take care when relying on Preview features in production.

Additionally, you may also notice that there is no longer need for any kind of AAD license (P1/P2) for Sentinel customers to stream AAD logs.

Reference: https://azurecloudai.blog/2021/02/01/azure-sentinel-can-now-analyze-all-available-azure-active-directory-log-files/

Azure Sentinel News Editor

Azure Sentinel News Editor

Related Posts

What’s new: Microsoft Teams connector in Public Preview
SIEM

Changes in How Running Hunting Queries Works in Azure Sentinel

February 11, 2021
With new release, CrowdStrike targets Google Cloud, Azure and container adopters
SIEM

How to Setup a Managed Identity for the Azure Sentinel Logic App Connector

January 21, 2021
Vectra AI and Microsoft partner on security integration
SIEM

How to Automate the Backup of Azure Sentinel Tables to Long-term Storage Using Cloud Shell

December 28, 2020
Next Post
What’s new: Microsoft Teams connector in Public Preview

Changes in How Running Hunting Queries Works in Azure Sentinel

With new release, CrowdStrike targets Google Cloud, Azure and container adopters

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

What’s new: Microsoft Teams connector in Public Preview

New Search Capability for Azure Sentinel Incidents

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

  • 21.8M Fans
  • 81 Followers

Recommended

Open Systems Augments its Cybersecurity Capabilities With Acquisition of Leading Microsoft Azure Sentinel Expert

Pinning Entire Azure Sentinel Workbooks to Azure Dashboards

2 months ago
Vectra AI and Microsoft partner on security integration

Azure Sentinel Learning Path Now Available

2 months ago
RiskIQ Joins Microsoft Intelligent Security Association

RiskIQ Joins Microsoft Intelligent Security Association

3 months ago
Vectra AI and Microsoft partner on security integration

Monitoring Windows Virtual Desktop environments (Fall 2019 release) with Azure Sentine

3 months ago

Instagram

    Please install/update and activate JNews Instagram plugin.

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

Topics

anomaly automation Azure Azure DevOps Azure Security Center Azure Sentinel Azure Sentinel API Azure Sentinel Connector BlueVoyant Call cybersecurity Detection file GitHub Hunting Huntingy IAC incident response Incident Triage infrastructure as code Investigation jupyter LAQueryLogs MDR Microsoft microsoft 365 mssp Multitenancy Notebooks Pester Playbooks PowerShell python Records Security Sentinel Sharing SIEM signin Supply Chain teams Threat hunting Watchlists Workbooks XDR
No Result
View All Result

Highlights

New Items of Note on the Azure Sentinel GitHub Repo

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

New Search Capability for Azure Sentinel Incidents

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

Changes in How Running Hunting Queries Works in Azure Sentinel

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

Trending

What’s new: Microsoft Teams connector in Public Preview
IR

How to Generate Azure Sentinel Incidents for Testing

by Azure Sentinel News Editor
February 26, 2021
0

Do you want to generate an Incident in Azure Sentinel for testing/demoing? Here’s a couple easy ways...

What’s new: Microsoft Teams connector in Public Preview

Azure Sentinel Notebooks Loses It’s Preview Tag

February 25, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

February 22, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

New Items of Note on the Azure Sentinel GitHub Repo

February 18, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

February 17, 2021

We bring you the best, latest and perfect Azure Sentinel News, Magazine, Personal Blogs, etc. Visit our landing page to see all features & demos.
LEARN MORE »

Recent News

  • How to Generate Azure Sentinel Incidents for Testing February 26, 2021
  • Azure Sentinel Notebooks Loses It’s Preview Tag February 25, 2021
  • The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting February 22, 2021

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

[mc4wp_form]

Copyright © 2020 - Azure Sentinel News

No Result
View All Result
  • Home
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence

Copyright © 2020 Azure Sentinel News