Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Exercise 3: Data Operations

Now that Microsoft Sentinel has been set up, storage has been configured and data connectors for the Linux and Windows VMs have been created it’s time to set up and configure the specific data operations that will be monitored for and reported on.

As the Azure administrator, you’ll need to configure Microsoft Sentinel to handle some representative events in Windows and Linux. For this exercise you’ll need to do the following:

  • Create an Analytics rule to handle Windows Security event log clearing incidents and create automation to report on these incidents.
  • Create an Analytics rule to handle Linux Syslog injection compromise incidents.
  • Configure roles and permissions for Microsoft Sentinel to access the appropriate services.
  • Test the Analytics rules to verify that the correct incidents are trapped and reported.
  • Modify the Add-HostToWatchList Logic App.
  • Configure the Windows data connector to be linked to the modified Logic app.
  • Configure an Azure Analytics rule for Linux.

Table of contents