david dominguez 😺

Sentinel - Common Log Onboarding Methods

Apr 15, 2026

Recap: What are logs?


Bringing this excerpt from the original intro post, outlining and answering the question of what exactly are logs?

This brings understanding of the importance around logs, and tells half of the story as to why they are valuable for investigations.


Logs are records of events generated by a system or application. In an enterprise SIEM environment, logs are an output from specific security appliances/devices. They have a very tight scope as to what they are looking at (e.g. All network traffic, authentication logs, EDR logs, etc.)

TimestampSource IPDest IPSource PortDest PortProtocolRule NameActionTraffic TypeSeverity
2024-03-14 08:15:23192.168.1.105203.0.113.4554321443TCPAllow_HTTPS_InternalALLOWEDInternal to ExternalLow
2024-03-14 08:18:4710.0.2.50192.168.1.15342122TCPBlock_SSH_ExternalBLOCKEDExternal to InternalHigh
2024-03-14 08:22:10192.168.1.2008.8.8.85234153UDPAllow_DNSALLOWEDInternal to ExternalLow
2024-03-14 08:25:33203.0.113.99192.168.1.5045123445TCPBlock_SMB_ExternalBLOCKEDExternal to InternalCritical
2024-03-14 08:29:5610.0.1.25172.16.0.10552343306TCPAllow_Database_InternalALLOWEDInternal to InternalLow

Recap: What is a SIEM?


Also bringing this excerpt form the original intro post as well, which outlines and answers what exactly a Security Information Evenet Management solution is.

This brings understanding of the importance around what exactly the platform we’re working on is.


A SIEM solution, put simply, collects all the security-relevant logs within a large enterprise, and puts it all into a centralized location, for future detection and analysis. I’ve provided an ASCII visual below to demonstrate how the flow usually looks like.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   LOG SOURCES            β”‚      β”‚   SIEM                     β”‚      β”‚   USERS                  β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€      β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€      β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                          β”‚      β”‚                            β”‚      β”‚                          β”‚
β”‚  πŸ–₯️  Firewalls           β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚  πŸ‘€ Security Analysts    β”‚
β”‚  πŸ–₯️  Servers             β”‚      β”‚  β”‚ Log Ingestion        β”‚  β”‚      β”‚  πŸ‘€ SOC Engineers        β”‚
β”‚  πŸ–₯️  Endpoints           β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚  πŸ‘€ DevOps Teams         β”‚
β”‚  πŸ–₯️  Network Devices     β”‚ ---> β”‚           ↓                β”‚ <--- β”‚  πŸ‘€ Security Managers    β”‚
β”‚  πŸ–₯️  Cloud Services      β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚                          β”‚
β”‚  πŸ–₯️  Web Applications    β”‚      β”‚  β”‚ Correlation &        β”‚  β”‚      β”‚  Activities:             β”‚
β”‚  πŸ–₯️  Databases           β”‚      β”‚  β”‚ Enrichment           β”‚  β”‚      β”‚  β€’ Investigate alerts    β”‚
β”‚  πŸ–₯️  Active Directory    β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚  β€’ Analyze threats       β”‚
β”‚  πŸ–₯️  IDS/IPS Systems     β”‚      β”‚           ↓                β”‚      β”‚  β€’ Configure rules       β”‚
β”‚  πŸ–₯️  Proxy/WAF           β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚  β€’ Tune SIEM             β”‚
β”‚  πŸ–₯️  DNS Servers         β”‚      β”‚  β”‚ Alerting &           β”‚  β”‚      β”‚  β€’ Review dashboards     β”‚
β”‚      ...                 β”‚      β”‚  β”‚ Dashboarding         β”‚  β”‚      β”‚  β€’ Create reports        β”‚
β”‚                          β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚           ↓                β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β”‚ Data Storage &       β”‚  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β”‚ Retention            β”‚  β”‚      β”‚                          β”‚
β”‚                          β”‚      β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚      β”‚                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

The Two Ways of Onboarding


We have two primary different ways of onboarding to Sentinel. These are going to cover most log sources, but of course there are always exceptions. Refer to vendor/application specific documentation for reference. There are other methods of course (Log Ingestion API, CCF, etc.) but for the purposes of initial understanding, this will suffice and give us a strong starting point. Below is a high level understanding for each type of method:

  1. Out of the Box via Content Hub & Data Connectors
    • This is the easiest method out of all of them
    • Usually cloud-based solutions are supported via this method.
    • Lowest maintenance since you as an individual don’t have to manage the connector since it is pre-built for you, mostly just need to grab some API key or similar setup.
    • The main downside is that this doesn’t support ALL possible log sources, but it covers a fair amount.
  2. Syslog
    • This is kind of a β€˜catch-all’ bucket for any other log sources that don’t have native connectors.
    • Usually this is for appliances that have external internet connectivity but no clear connector to install from the Content Hub
    • Requires higher level of maintenance since this method requires the use of a Syslog server
    • The main upside is that this can support almost any type of log source, but obviously it’s not always the best design. Want to use this only when needed since you inherently incur maintenance and infrastructure cost.

Method 1: Out of the Box via Content Hub & Data Connectors


So with Sentinel there’s two main sections, Content Hub and Data Connectors.

Content Hub, when it comes to log onboarding, is what allows you to install specific out of the box data connectors to the Sentinel. You go through and decide what data connector you need, and install it to your environment.

Below is a screenshot of how this looks like (Microsoft have moved this area to the Defender area, hence why you’ll see the theme change. In Sentinel you can still see the Content Hub, but it just redirects you to here).

content-hub

Next, Data Connectors is what allows you to configure the newly installed connector so that you can connect your log source to Sentinel.

From the Data Connectors area, you can configure the log source so that you can connect it to your instance.

Below shows the initial page of the Data Connectors area.

data-connectors

And then below shows the next area where you can specifically make configuration changes for a connector so that you can proceed with onboarding

data-connector-configuration

An analogy that might help you to understand a little bit better would be something like:

Troubleshooting tips:

Method #2: Syslog


β€˜Syslog is a standardized message logging protocol supported by numerous operating systems, applications, and hardware devices for transmitting data’ (CrowdStrike).

In other words, we use this protocol to send messages between computers and is widely adopted and supported by a variety of devices, making it optimal for sending information between computers (or in our case, logs).

Now, without getting too into the details as to what Syslog is, let’s just talk functionally what we use it for when we’re talking about log onboarding:

Syslog messages are essentially messages that one system generates, and then the Syslog protocol is used to send these messages to another machine. Syslog uses port 514 to send its messages across to other machines. A Syslog server is essentially the central connector between our SIEM (Sentinel, in this case), and these machines that are sending Syslog messages. So, the machines will create messages, send it over 514 to the Syslog server, and then the Syslog server will forward these logs along to Sentinel, ideally via Azure Monitor Agent (AMA).

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   Linux Host A  β”‚              β”‚   Linux Host B  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜              β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β”‚                                β”‚
         β”‚  UDP/TCP 514                   β”‚  UDP/TCP 514
         β”‚                                β”‚
         β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                         β”‚
                         β–Ό
              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
              β”‚    Syslog Server     β”‚
              β”‚      (Linux VM)      β”‚
              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                         β”‚
                         β”‚  HTTPS / Port 443
                         β”‚
                         β–Ό
              β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
              β”‚  Microsoft Sentinel  β”‚
              β”‚  (Log Analytics      β”‚
              β”‚     Workspace)       β”‚
              β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

The visual above supports my previous paragraph, but let me hone in a bit more:

syslog-sentinel

Things to keep in mind:

Troubleshooting tips:

References

CrowdStrike: https://www.crowdstrike.com/en-us/guides/syslog-logging/