Configured Azure Sentinel - vishnupk001/CloudCore-SOC-Build-with-M365 GitHub Wiki
After setting up Azure Sentinel, the next step involved installing and configuring it using the Content Hub and Data Connectors. These configurations ensured that Azure Sentinel could receive logs from various sources for comprehensive monitoring.
Content Hub Installation
The Content Hub was used to integrate the necessary solutions and content packs into Azure Sentinel. This process allowed the inclusion of pre-built analytics, workbooks, playbooks, and hunting queries to enhance the monitoring capabilities.
Data Connectors Configuration
To enable Azure Sentinel to receive logs from diverse sources, various data connectors were installed and configured. The following data sources were integrated:
- Azure Activity: Logs related to resource management and monitoring within the Azure environment.
- Microsoft Defender for Cloud Apps: Security alerts and activities related to cloud application monitoring.
- Microsoft Defender for Office 365: Threat intelligence and alerts related to Office 365 security.
- Microsoft Defender for Cloud: Security recommendations and alerts for cloud infrastructure.
- Microsoft Entra ID Protection: Identity-based threat detections and risk events.
- Microsoft Defender XDR: Extended detection and response data for comprehensive threat analysis.
- Microsoft 365: Activity and security logs from various Microsoft 365 services.
- Microsoft Defender for Endpoint: Endpoint protection alerts and data.
- Microsoft Entra ID: Identity and access management logs.
- Windows Security Events: Logs related to system security and user activities.
By configuring these connectors, Azure Sentinel was enabled to collect data from critical sources, enhancing its ability to detect and respond to security incidents effectively.