Deployment (Part 3)

 






To read part 1, please click here
To read part 2, please click here





Microsoft Monitoring Agent (MMA)

MMA is used across multiple Microsoft solutions and has undergone a few name changes as its features and functionality have evolved. If it is being considered to be used, then following areas should be covered during a Microsoft Sentinel deployment project:
  • Consider the timelines and the strategy for a migration to AMA (Azure Monitor Agent) before the MMA end-of-life. 
  • Consider the central deployment and management methodology for MMA.
  • Determine which endpoints are in scope for deployment as these affect the log ingestion volume significantly. 

Azure Monitor Agent (AMA)

Organizations with MMA as the main Microsoft Sentinel agent should start planning the migration to AMA as soon as possible to avoid a rushed migration. One of the main advantages of AMA is the ability to control the log collection policy centrally and apply different policies against different groups of computers, regardless if they are Azure VMs, on-premises servers or VMs in third-party cloud platforms like AWS and GCP. 

AMA is supported on both Windows and Linux OS (MMA was used only on Windows, with the OMS agent acting as its counterpart on Linux). AMA allows increased granularity of the types of log collected and multi-homing-AMA offers the ability to implement multiple log collection options for each of them. These two options combined enables the ability to split the stream of log data, with the critical sent to Microsoft Sentinel for real-time monitoring, while less important log can be sent to a more cost effective storage option.

Deploying the AMA on Linux allows for the collection of any syslog message or local logs that follow a consistent naming convention. Any Linux agent with AMA installed can act as a syslog collector for remote syslog log sources.

Deploying Syslog Collector

For remote syslog log collection, Microsoft Sentinel requires a syslog server with Linux rsyslog or syslog-ng syslog servers with rsyslog as the most common choice. The server can be deployed on-premises, as a VM or physical server - or as a VM in Azure or other cloud environments. Its main requirement is to provide routing and connectivity from the log sources that need to send syslog data. 

The hardware requirements for the syslog collector depend on the expected logging volume. Generally, syslog collector will simply receive the logs and forward them to Microsoft Sentinel. It is used to receive both plain syslog logs and CEF, but, the same facility should not be used by both CEF and non-CEF log sources. 

Conclusion

This part discuss about MMA, AMA, and syslog collector. 







To read part 1, please click here
To read part 2, please click here
















Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

APT29: A Russian Hacker Group