Step 3. Ingest data sources and configure incident detection in Microsoft Sentinel

After you've completed designing and implementing your Microsoft Sentinel workspace(s), you can proceed to ingest data sources and configure incident detection.

Data connectors are configured to enable data ingestion into the workspace. After enabling key data points to be ingested into Sentinel, User and Entity Behavior Analytics (UEBA) and Analytic Rules must also be enabled to capture anomalous and malicious activities. Analytic Rules dictate how Alerts and Incidents are generated in your Sentinel instance. Tailoring Analytic Rules to your environment and organizational needs through entity mapping allows you to produce high-fidelity incidents and reduce alert fatigue.

Before you begin

Confirm the installation method, roles required, and licenses needed to turn on data connectors. For more information, see Find your Microsoft Sentinel data connector.

The following table is a summary of the prerequisites required to ingest key Azure and data connectors:

Resource Type Installation Method Role/Permissions/License Needed
Microsoft Entra ID Native Data connector Security Admin/Global Admin

Sign-in Logs require Microsoft Entra ID P1 or P2 license
Other logs don't require P1 or P2
Microsoft Entra ID Protection Native Data Connector Security Admin/Global Admin

License: Microsoft Entra ID P2
Azure Activity Azure Policy Owner role required on subscriptions
Microsoft Defender XDR Native Data Connector Security Admin/Global Admin

License: Microsoft 365 E5, Microsoft 365 A5 or any other Microsoft Defender XDR eligible license
Microsoft Defender for Cloud Native Data Connector Security Reader

To enable bi-directional sync, Contributor/Security Admin role is required on the subscription.
Microsoft Defender for Identity Native Data Connector Security Admin/Global admin

License: Microsoft Defender for Identity
Microsoft Defender for Office 365 Native Data Connector Security Admin/Global admin

License: Microsoft Defender for Office 365 Plan 2
Office 365 Native Data Connector Security Admin/Global admin
Microsoft Defender for IoT Contributor to subscription with IoT hubs
Microsoft Defender for Cloud Apps Native Data Connector Security Admin/Global admin

License: Microsoft Defender for Cloud Apps
Microsoft Defender for Endpoint Native Data Connector Security Admin/Global admin

License: Microsoft Defender for Endpoint
Windows Security Events through Azure Monitor Agent (AMA) Native Data Connector with Agent Read/Write on Log Analytics Workspace
Syslog Native Data Connector with Agent Read/Write Log Analytics Workspace

Step 1: Turn on data connectors

Use the following recommendations to get started with configuring data connectors:

  1. Focus on setting up free data sources to ingest:

    1. Azure Activity Logs: Ingesting Azure Activity Logs is critical in enabling Sentinel to provide a single-pane of glass view across the environment.

    2. Office 365 Audit Logs, including all SharePoint activity, Exchange admin activity, and Teams.

    3. Security alerts, including alerts from Microsoft Defender for Cloud, Microsoft Defender XDR, Microsoft Defender for Office 365, Microsoft Defender for Identity, and Microsoft Defender for Endpoint:

      1. Ingesting security alerts into Sentinel enables it to be the "central pane of incident management" across the environment.

      2. Incident investigation starts in Sentinel and should continue in the Microsoft Defender portal or Defender for Cloud, if deeper analysis is required.

      Note

      If you have enabled the Microsoft Defender XDR connector, a bi-directional sync between 365 Defender Incidents and Sentinel is automatically established. To avoid creating duplicate incidents for the same alerts, we recommend that customer turn off all Microsoft incident creation rules for Microsoft Defender XDR-integrated products (Defender for Endpoint, Defender for Identity, Defender for Office 365, Defender for Cloud Apps, and Microsoft Entra ID Protection). For more information, see Microsoft Defender XDR incidents and Microsoft incident creation rules.

    4. Microsoft Defender for Cloud Apps Alerts.

    For more information, see Free data sources.

    The following table lists the free data sources you can enable in Microsoft Sentinel:

    Tip

    For more information on the most up-to-date Sentinel pricing, see Microsoft Sentinel Pricing.

    Microsoft Sentinel data connector Free data type
    Azure Activity Logs AzureActivity
    Microsoft Entra ID Protection SecurityAlert (IPC)
    Office 365 OfficeActivity (SharePoint)
    OfficeActivity (Exchange)
    OfficeActivity (Teams)
    Microsoft Defender for Cloud SecurityAlert (Defender for Cloud)
    Microsoft Defender for IoT SecurityAlert (Defender for IoT)
    Microsoft Defender XDR SecurityIncident
    SecurityAlert
    Microsoft Defender for Endpoint SecurityAlert (Microsoft Defender Advanced Threat Protection (MDATP))
    Microsoft Defender for Identity SecurityAlert (Azure Advanced Threat Protection (AATP))
    Microsoft Defender for Cloud Apps SecurityAlert (Defender for Cloud Apps)
  2. To provide broader monitoring and alerting coverage, focus on the following data connectors:

    Note

    There is a charge for ingesting data from the sources listed in the section

    • Microsoft Entra ID

    • Microsoft Defender XDR connector

      • Send Microsoft Defender XDR logs to Sentinel, if any of the following are required:

        1. Leverage Fusion Alerts with Sentinel.

          • Fusion correlates data sources from multiple products to detect multi-stage attacks across the environment.
        2. Longer retention than what is offered in Microsoft Defender XDR.

        3. Automation not covered by the built-in remediations offered by Microsoft Defender for Endpoint. For more information, see Remediation actions in Microsoft Defender XDR.

  3. If deployed in Azure, use the following connectors to send these resources' Diagnostic Logs to Sentinel:

    • Azure Firewall
    • Azure Application Gateway
    • Keyvault
    • Azure Kubernetes Service
    • Azure SQL
    • Network Security Groups
    • Azure-Arc Servers

    The recommended method is setting up Azure Policy to require that their logs be forwarded to the underlying Log Analytics workspace. For more on information, see Create diagnostic settings at scale using Azure Policy.

  4. For virtual machines hosted on-premises or in other clouds that require their logs collected, use:

    • Windows Security Events using AMA
    • Security Events using Legacy Agent
    • Events via Defender for Endpoint (for server)
    • Syslog connector
  5. For Network Virtual Appliances or other on-premises sources that generate Common Event Format (CEF) or SYSLOG logs, use the following connector:

    • Common Event Format (CEF) via AMA
    • Common Event Format (CEF) via Legacy Agent

    For more information, see, Deploy a log forwarder to ingest Syslog and CEF logs to Microsoft Sentinel.

    Consider migrating from the legacy agent to the new unified Azure Monitor Agent guidance. For more information, see MIgrat from legacy agents to Azure Monitor Agent.

  6. Search in content hub for other devices, Software as a service (SaaS) apps that require logs to be sent to Sentinel. For more information, see Discover and manage Microsoft Sentinel out-of-the-box content .

Step 2: Enable User Entity Behavior Analytics

After setting up data connectors in Sentinel, make sure to enable User Entity Behavior Analysis to identify suspicious behavior that could lead to phishing exploits and eventually attacks such as ransomware. Often, anomaly detection through UEBA is the best method for detecting Zero-day exploits early on.

Data Sources required:

  • Active Directory logs (Microsoft Defender for Identity)
  • Microsoft Entra ID
    • Audit Logs
    • Azure Activity
  • Security Events
  • Sign in Logs

Using UEBA allows Microsoft Sentinel to build behavioral profiles of your organization's entities across time and peer group to identify anomalous activity. This added utility aids in an expedition of determining if an asset has been compromised. Since it identifies peer group association this can also aid in determining the blast radius of said compromise.

Step 3: Enable Analytic Rules

The brains of Sentinel come from the Analytic Rules. These are rules you set to tell Sentinel to alert you to events with a set of conditions that you consider to be important. The out-of-the-box decisions Sentinel makes are based on User Entity Behavioral Analytics (UEBA) and on correlations of data across multiple data sources.

Note

If you have enabled the Microsoft Defender XDR connector, a bi-directional sync between 365 Defender Incidents and Sentinel is automatically established. To avoid creating duplicate incidents for the same alerts, we recommend that customer turn off all Microsoft incident creation rules for Microsoft Defender XDR-integrated products (Defender for Endpoint, Defender for Identity, Defender for Office 365, Defender for Cloud Apps, and Microsoft Entra ID Protection). For more information, see Microsoft Defender XDR incidents and Microsoft incident creation rules.

Microsoft Sentinel enables the Fusion Advanced multistage attack detection analytic rule by default to automatically identify multistage attacks. Leveraging anomalous behavior and suspicious activity events observed across the cyber kill chain, Microsoft Sentinel generates incidents that allow you to see the compromise incidents with two or more alert activities in it with a high degree of confidence.

Fusion alert technology correlates broad points of data signals with extended machine learning (ML) analysis to help determine known, unknown and emerging threats. For example, Fusion detection can take the Anomaly Rule templates and the scheduled queries created for the Ransomware scenario and pair them with alerts from Microsoft Security Suite products:

  • Microsoft Entra ID Protection
  • Microsoft Defender for Cloud
  • Microsoft Defender for IoT
  • Microsoft Defender XDR
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Identity
  • Microsoft Defender for Office 365

Another set of out-of-the-box rules enabled by default are Anomaly Rules in Sentinel. These are based on Machine Learning models and UEBA that train on the data in your workspace to flag anomalous behavior across users, hosts, and others. Often a phishing attack leads to an execution step such as local or cloud account manipulation/control or malicious script execution. Anomaly Rules look exactly for those types of activities:

Review the Anomaly Rules and Anomaly Score Threshold for each one. If you're observing false positives for example, consider duplicating the rule and modifying the threshold by following the steps outlined in Tune anomaly rules.

After reviewing and modifying Fusion and Anomaly rules, enable the out-of-the-box Microsoft Threat Intelligence Analytics Rule. Verify that this rule matches your log data with Microsoft-generated threat intelligence. Microsoft has a vast repository of threat intelligence data, and this Analytic Rule uses a subset of it to generate high fidelity alerts and incidents for SOC (security operations centers) teams to triage.

With Fusion, Anomaly, and Threat Intelligence Analytic Rules enabled, you should conduct a MITRE Att&ck crosswalk to help you decide which remaining Analytic Rules to enable and to finish implementing a mature XDR (extended detection and response) process. This will empower you to detect and respond throughout the lifecycle of an attack.

The MITRE Att&ck research department created the MITRE method, and it is provided as part of Microsoft Sentinel to ease your implementation. You should ensure you have Analytic rules that stretch the length and breadth of the attack vectors approach. Start by reviewing the MITRE techniques that are covered by your existing 'Active' Analytic Rules, and then select 'Analytic rule templates' and 'Anomaly Rules' in the Simulated dropdown. Now, it will show you where you have the adversary tactic and/or technique covered and where there are available Analytic Rules you should consider enabling to improve your coverage. For example, to detect potential phishing attacks, review the Analytic rule templates for the Phishing technique, and prioritize enabling the rules that specifically query the data sources you have onboarded to Sentinel.

In general, there are five phases to a human-operated Ransomware attack, and Phishing falls under Initial Access as can be seen in the screenshot below. Continue through the remaining steps to cover the entire kill chain with appropriate Analytic Rules:

  1. Initial access
  2. Credential theft
  3. Lateral movement
  4. Persistence
  5. Defense evasion
  6. Exfiltration (this is where ransomware itself is detected)

Image of the Sentinel dashboard

In summary, when turning on Analytic rules for Sentinel, prioritize enabling by connected data sources, organizational risk, and MITRE tactic.

Connect data to Microsoft Sentinel using data connectors

Training Connect data to Microsoft Sentinel using data connectors
The primary approach to connect log data is using the Microsoft Sentinel provided data connectors. This module provides an overview of the available data connectors.

Connect logs to Microsoft Sentinel

Training Connect logs to Microsoft Sentinel
Connect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds to Microsoft Sentinel.

Identify threats with Behavioral Analytics

Training Identify threats with Behavioral Analytics
The primary approach to connect log data is using the Microsoft Sentinel provided data connectors. This module provides an overview of the available data connectors.

Next steps

Continue to Step 4 to respond to an incident.

Image of Microsoft Sentinel and XDR solution steps with step 4 highlighted