To get started, add Microsoft Sentinel to an existing workspace or create a new one.
- Sign in to the Azure portal.
- Search for and select Microsoft Sentinel.
- Select Add.
- Select the workspace you want to use or create a new one. You can run Microsoft Sentinel on more than one workspace, but the data is isolated to a single workspace.
- The default workspaces created by Microsoft Defender for Cloud aren’t shown in the list. You can’t install Microsoft Sentinel on these workspaces.
- Once deployed on a workspace, Microsoft Sentinel doesn’t currently support moving that workspace to another resource group or subscription.
- Select Add Microsoft Sentinel.
Install a solution from the content hub
The content hub in Microsoft Sentinel is the centralized location to discover and manage out-of-the-box content including data connectors. For this quickstart, install the solution for Azure Activity.
- In Microsoft Sentinel, select Content hub.
- Find and select the Azure Activity solution.
- On the toolbar at the top of the page, select Install/Update.
Set up the data connector
Microsoft Sentinel ingests data from services and apps by connecting to the service and forwarding the events and logs to Microsoft Sentinel. For this quickstart, install the data connector to forward data for Azure Activity to Microsoft Sentinel.
- In Microsoft Sentinel, select Data connectors.
- Search for and select the Azure Activity data connector.
- In the details pane for the connector, select Open connector page.
- Review the instructions to configure the connector.
- Select Launch Azure Policy Assignment Wizard.
- On the Basics tab, set the Scope to the subscription and resource group that has activity to send to Microsoft Sentinel. For example, select the subscription that contains your Microsoft Sentinel instance.
- Select the Parameters tab.
- Set the Primary Log Analytics workspace. This should be the workspace where Microsoft Sentinel is installed.
- Select Review + create and Create.
Generate activity data
Let’s generate some activity data by enabling a rule that was included in the Azure Activity solution for Microsoft Sentinel. This step also shows you how to manage content in the content hub.
- In Microsoft Sentinel, select Content hub.
- Find and select the Azure Activity solution.
- From the right-hand side pane, select Manage.
- Find and select the rule template Suspicious Resource deployment.
- Select Configuration.
- Select the rule and Create rule.
- On the General tab, change the Status to enabled. Leave the rest of the default values.
- Accept the defaults on the other tabs.
- On the Review and create tab, select Create.
View data ingested into Microsoft Sentinel
Now that you’ve enabled the Azure Activity data connector and generated some activity data let’s view the activity data added to the workspace.
- In Microsoft Sentinel, select Data connectors.
- Search for and select the Azure Activity data connector.
- In the details pane for the connector, select Open connector page.
- Review the Status of the data connector. It should be Connected.
- In the left-hand side pane above the chart, select Go to log analytics.
- On the top of the pane, next to the New query 1 tab, select the + to add a new query tab.
- In the query pane, run the following query to view the activity date ingested into the workspace.KustoCopy
AzureActivity
Next steps
In this quickstart, you enabled Microsoft Sentinel and installed a solution from the content hub. Then, you set up a data connector to start ingesting data into Microsoft Sentinel. You also verified that data is being ingested by viewing the data in the workspace.
- To visualize the data you’ve collected by using the dashboards and workbooks, seeĀ Visualize collected data.
- To detect threats by using analytics rules, seeĀ Tutorial: Detect threats by using analytics rules in Microsoft Sentinel.
Ref: Quickstart: Onboard in Microsoft Sentinel | Microsoft Learn