Scaling up your Microsoft Sentinel Ingestion: Top Designs to Boost Your Security Game

Share on facebook
Share on twitter
Share on linkedin

🔥Scaling up your Microsoft Sentinel Ingestion: Top Designs to Boost Your Security Game🔥

This blog post will present high-level insights on potential architecture designs to achieve a highly available and scalable ingestion pipeline for Microsoft Sentinel.

📝The post will cover the following components:

📌Load Balancer
📌Forwarder Systems
📌Data Sources (coming from endpoints)

📝The architectures can be classified into three main scenarios:

📌Azure-based: components for collection are within the Azure platform. (Load Balancer and VMSS in Azure – RECOMMENDED, Load Balancer and Forwarders in Azure – OPTIONAL)
📌Hybrid: one component resides outside of Azure. (Load Balancer Outside Azure/Forwarders in Azure)
📌Non-Azure: all components reside outside of Azure. (Load Balancer and Forwarders Outside Azure)

Each scenario above leverages the Azure Monitor Agent (AMA). AMA enables the usage of features that the Microsoft Monitoring Agent (MMA) provides and newer features such as ingestion time transformation, multi-homing, and more by using data collection rules (DCR) and data collection endpoints (DCE).

📝For additional information on how AMA handles different log sources:

📌For Syslog ingestion, please refer to: https://lnkd.in/dnnqpbJJ
📌For CEF ingestion, please refer to: https://lnkd.in/djXr4gDS
📌For Windows Event Forwarding, please refer to https://lnkd.in/dpzqv_k6

Want to learn more? 💡
📝https://lnkd.in/dCnDXuTs

Leave a Comment

Your email address will not be published. Required fields are marked *

Related Posts