Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (2024)

Posted by Nicolas Prigent onFebruary 23, 2022


Due to legal considerations, you may need store your Sentinel logs for long-term retention. By default, Azure Log analytics allows you to store logs for 90 days at no cost. Exporting data from Azure Log Analytics to an Azure Storage account enables low-cost retention and the ability to reallocate logs to different regions if necessary.

To perform this task, Microsoft provides a great Playbook in order to move logs from Azure Log Analytics to an Azure Storage Account. This Playbook creates a storage account with a default container to store the logs. Logs older than 90 days are moved automatically to the cold storage to avoid retention billing.

In this article, I will explain how to deploy and configure this Playbook.

Getting started

Go to the following repository to download the Playbook provided by Microsoft: https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Move-LogAnalytics-to-Storage

Click on the following button to easily deploy the playbook:

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (1)

You will get the following wizzard. Enter the required information:

  • Playbook name
  • Workspace name
  • Workspace subscription
  • Storage account name

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (2)

Wait until the deployment has been done and go to the Azure Storage Account section. You should see a new storage account.

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (3)

Open the storage account and confirm the presence of the container.

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (4)

Open the LogicApp designer to edit the LogicApp and update the connection. You will see an exclamation mark to indicate an issue with a connector. It is normal because when deploying a LogicApp, the connections are not preserved.

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (5)

After updating the failed connector, you will be able to see the content of the query

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (6)

You can run the LogicApp or just wait until the next recurrence, then go to the container of your Azure Storage account, you should see new folders depending on the existing logs in your Sentinel logs.

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (7)

Open one of these folders to confirm a list of JSON files appears, so that means your logs are exported to the Azure storage.

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (8)

For legal reasons, you may need to query specific logs. Thanks to the KQL language, you will be able to query your exported logs very easily. Open the Log Analytics workspace, go to the Logs tab and run the following query:

1

let ActivityLogs = externaldata (TimeGenerated:datetime, OperationName:string, OperationNameValue:string, Level:string, ActivityStatus:string, SubscriptionID:string)[@"SAS TOKEN URL FOR BLOB"] with (format="multijson",recreate_schema=true); ActivityLogs

Thanks to the externaldata operator, we can easily query the external files stored on Azure Storage. You just need to identify the right log file and then you will get the data.

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (9)

Related materials:

Filed under:
Software byNicolas Prigent

Move Microsoft Sentinel Logs to Long-Term Storage | StarWind Blog (2024)

FAQs

Which methods can you use to send Azure Sentinel logs to long term storage? ›

KQL Function: Kusto Query Language (KQL) is used to query and analyze data in Azure Sentinel. The KQL function can be used to create a query that retrieves logs from a workspace and exports them to a storage account or blob container.

How long does Sentinel retain logs? ›

By default, a Log Analytics workspace has a retention period of 30 days.

What is the maximum data retention period for Microsoft Sentinel? ›

After you enable Microsoft Sentinel on a Log Analytics workspace: You can retain all data ingested into the workspace at no charge for the first 90 days. Retention beyond 90 days is charged per the standard Log Analytics retention prices.

How do I export logs from Sentinel? ›

Running the Historical Log Export
  1. In the Sentinel portal, navigate to the Notebooks blade.
  2. Go to the Templates tab.
  3. Search for, and select, the “Export Historical Data” notebook.
  4. On the right panel, select Save notebook. ...
  5. The notebook is now accessible in your Azure ML workspace.
May 31, 2022

How do I send logs to my Azure storage account? ›

Archive logs to an Azure storage account

Sign in to the Azure portal. Select Azure Active Directory > Monitoring > Audit logs. Select Export Data Settings.

Which tool can be used to move data between storage accounts in Azure? ›

AzCopy is a command-line tool for copying data to or from Azure Blob storage, Azure Files, and Azure Table storage, by using simple commands. The commands are designed for optimal performance. Using AzCopy, you can either copy data between a file system and a storage account, or between storage accounts.

How long should log files be retained? ›

SOX: The Sarbanes-Oxley Act (SOX) concerns corporations active in the United States and requires them to keep audit logs for seven years. CISP: The Cardholder Information Security Program (CISP) pertains to all ecommerce corporations and requires them to keep their logs for a minimum of six months.

Where are sentinel logs stored? ›

By default, logs ingested into Microsoft Sentinel are stored in Azure Monitor Log Analytics.

How long should network logs be retained? ›

As a baseline, most organizations keep audit logs, IDS logs and firewall logs for at least two months. On the other hand, various laws and regulations require businesses to keep logs for durations varying between six months and seven years. Below you can find some of those regulations and required durations.

How long does Microsoft retain data? ›

If a paid subscription ends or is terminated, Microsoft retains customer data stored in Microsoft 365 in a limited-function account for 90 days to enable the subscriber to extract the data. After the 90-day retention period ends, Microsoft disables the account and deletes the customer data.

What are the 4 primary capabilities of Microsoft Sentinel? ›

With Microsoft Sentinel, you get a single solution for attack detection, threat visibility, proactive hunting, and threat response.

What is the maximum file size of a watchlist in Sentinel? ›

Watchlists can only be referenced from within the same workspace. Cross-workspace and/or Lighthouse scenarios are currently not supported. Local file uploads are currently limited to files of up to 3.8 MB in size.

How do I export all Windows logs? ›

Answer
  1. Start Event Viewer by going to Start > search box (or press Windows key + R to open the Run dialog box) and type eventvwr .
  2. Within Event Viewer, expand Windows Logs.
  3. Click the type of logs you need to export.
  4. Click Action > Save All Events As...
  5. Ensure that the Save as type is set to .
Jan 21, 2021

How do I export Windows security logs? ›

How to export event viewer logs?
  1. Open Event Viewer (Run → eventvwr. ...
  2. Locate the log to be exported.
  3. Select the logs that you want to export, right-click on them and select "Save All Events As".
  4. Enter a file name that includes the log type and the server it was exported from.
  5. Save as a CSV (Comma Separated Value) file.

Which storage service we should use to store log files in Azure? ›

We recommend that you use Azure Storage logs in Azure Monitor instead of Storage Analytics logs. To learn more, see any of the following articles: Monitoring Azure Blob Storage. Monitoring Azure Files.

How do I store App Service logs to storage? ›

Go to >App Service Logs> Enable Application Logging (Blob) and select the desired Blob Storage and the Container and select the Level of logging.

How to copy data from one storage account to another in Azure? ›

Copy a container to another storage account by using the azcopy copy command. This example encloses path arguments with single quotes (''). Use single quotes in all command shells except for the Windows Command Shell (cmd.exe).

What are the 5 types of storage in Azure? ›

Most organizations will use more than one type of storage.
  1. Azure Blob Storage. Blob is one of the most common Azure storage types. ...
  2. Azure Files. Azure Files is Microsoft's managed file storage in the cloud. ...
  3. Azure Queue Storage. ...
  4. Azure Table. ...
  5. Azure Managed Disks.
Apr 19, 2022

What is the best way to move the existing data to the new storage account? ›

Move data to the new storage account

AzCopy is the preferred tool to move your data over. It's optimized for performance. One way that it's faster, is that data is copied directly between storage servers, so AzCopy doesn't use the network bandwidth of your computer.

What is the best way to store large amounts of data in Azure? ›

Azure Storage blobs

Azure Storage is the most ubiquitous storage solution Azure provides, due to the number of services and tools that can be used with it. There are various Azure Storage services you can use to store data. The most flexible option for storing blobs from many data sources is Blob storage.

How big is too big for a log file? ›

The maximum size for a log file is two terabytes. Enable Autogrowth: Autogrowth enables the SQL Server to expand the size of database files when they run out of space.

What should be the maximum log file size? ›

Specify the maximum log file size Policy particular policy determines the upper limit of the log file size in kilobytes. By enabling this Policy, you can set the maximum size of the log file between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes), with increments of kilobytes.

What is the best practice for security log retention? ›

Centralize Your Logs

That's why the most important log retention best practice is to archive logs into a central repository, such as a security information and event management (SIEM) platform. A SIEM not only collects logs, but it correlates logs and other security-related documentation for analysis.

Where does an SIEM gather logs from and where are they stored? ›

SIEM tools collect and aggregate log data from across the IT infrastructure into a centralized platform where it can be reviewed by security analysts. They also deliver SIM features, such as automation and alerts, and the correlative capabilities of SEC tools.

How does Sentinel collect logs? ›

The device's built-in Syslog daemon collects local events of the specified types, and forwards the events locally to the agent. The agent streams the events to your Log Analytics workspace. After successful configuration, the data appears in the Log Analytics Syslog table.

Where are WINDOWS security logs stored? ›

In Windows, the event logs are stored in the C:\WINDOWS\system32\config\ folder. They are created for each system access, operating system blip, security modification, hardware malfunction and driver issue.

What information should not be placed in a log? ›

Passwords, IP addresses and network information (MAC address, host name, etc.)

How many months of logs should be retained as per PCI compliance? ›

The standard mandates that audit logs be retained for at least one year. Ninety days of PCI audit logs must also be available for immediate analysis.

What is the maximum of days that logs are retained the backup directory? ›

For most Microsoft products, data retention is 30 days.

How far back do audit logs go? ›

You can retain audit logs for up to 10 years.

How long does Microsoft keep activity history? ›

The Recent activity page shows you when and where you've used your Microsoft account within the last 30 days. You can expand any listed activity to see location details and find out how the account was accessed—using a web browser, phone, or another method.

Can MS Access store thousands of data? ›

In MS Access, all information is saved in one file which has a hard restriction – it cannot be larger than 2GB. Consequently, Access is not ideal for handling large databases with tens of thousands of rows and attached information like images or files.

Why is Microsoft Sentinel better than Splunk? ›

Compared to Splunk, it is easier to deploy, and has superior artificial intelligence. In addition, Microsoft Sentinel's price is more attractive than Splunk's. To learn more, read our detailed Microsoft Sentinel vs. Splunk Enterprise Security Report (Updated: May 2023).

Why would you use Microsoft Sentinel? ›

Microsoft Sentinel aggregates data from all sources, including users, applications, servers, and devices running on premises or in any cloud, letting you reason over millions of records in a few seconds. It includes built-in connectors for easy onboarding of popular security solutions.

What is the difference between Microsoft Sentinel and Azure Sentinel? ›

Azure Sentinel, now known as Microsoft Sentinel, centralizes your threat collection, detection, response, and investigation efforts. It provides threat intelligence and intelligent security analytic capabilities that facilitate threat visibility, alert detection, threat response, and proactive hunting.

How long does Sentinel store data? ›

By default, a Log Analytics workspace has a retention period of 30 days. Retention is calculated on the ingestion date for data, so if a workspace uses the default retention period, it means that Azure removes data from the workspace 30 days after its ingestion.

What is the default data retention for Sentinel? ›

In your Log Analytics workspace, clear the inherit the workspace setting so the interactive retention period is fixed to 30 days.

What is the maximum data retention period of a Microsoft Sentinel? ›

Data retention and archived logs costs

After you enable Microsoft Sentinel on a Log Analytics workspace: You can retain all data ingested into the workspace at no charge for the first 90 days. Retention beyond 90 days is charged per the standard Log Analytics retention prices.

In which format should you export the logs? ›

text or comma-delimited format.

Does Windows keep a log of file transfers? ›

By default, no version of Windows creates a log of files that have been copied, whether to/from USB drives or anywhere else.

Does Windows log everything? ›

If you're like most Windows 10 users, you might not know that your computer keeps logs of everything that goes in it. Furthermore, you can use these logs to troubleshoot any security issues on your Windows PC. Simply put, system and security logs are records of events and activities on your PC.

How do I Export logs from Sentinel? ›

Running the Historical Log Export
  1. In the Sentinel portal, navigate to the Notebooks blade.
  2. Go to the Templates tab.
  3. Search for, and select, the “Export Historical Data” notebook.
  4. On the right panel, select Save notebook. ...
  5. The notebook is now accessible in your Azure ML workspace.
May 31, 2022

How long do Windows Security logs last? ›

A data retention period of 90 days means that developers and security teams will have access to a rolling 90-day window of indexed log data for analytics purposes - that's your data retention window.

What format can you Export Windows logs? ›

Event log files can be saved as event files (*. evt), text files (*. txt). or comma-delimited text files (*. txt).

How do I import Windows logs? ›

Importing Event Log File. Select the Settings tab. In the System Settings section, click the Imported Log File link. Select the Event Log Imports / Application Log Imports tab, and click the Import Log File link on the right side, to import a new event/application log file.

What does export logs mean? ›

Site administrators have the ability to export processed log files into a single compressed file that contains the daily logs for the specified date range. Logs can be exported in any log file format, regardless of the original web server that initially created the log files.

How do I export event logs to CSV? ›

Method 2: Export as CSV
  1. Open Event Viewer (eventvwr. msc).
  2. Locate the log to be exported in the left-hand column.
  3. Right-click the name of the log and select Save All Events As…
  4. Include in the file name the log type and the server name. ...
  5. From Save as type selector, select CSV (Comma Separated) .
Apr 21, 2014

Which type of Azure storage should you use to store logs? ›

We recommend that you use Azure Storage logs in Azure Monitor instead of Storage Analytics logs.

How do I send Azure logs to Sentinel? ›

In Microsoft Sentinel, select Data connectors from the navigation menu. From the data connectors gallery, select Azure Active Directory and then select Open connector page. Mark the check boxes next to the log types you want to stream into Microsoft Sentinel (see above), and select Connect.

Which method is used to connect to an Azure storage account using storage Explorer? ›

Storage Explorer can connect to a storage account using the storage account's name and key. You can find your account keys in the Azure portal. Open your storage account page and select Settings > Access keys. In the Select Resource panel of the Connect to Azure Storage dialog, select Storage account.

What is the most efficient way to store logs? ›

Use Pallets where possible

Preferably, logs should be placed on wooden pallets as these keep them off the ground and provide a free flow of air underneath; the ideal height of the wood stack (including the pallet) should be no more than 3ft (1m) as the logs can become unstable if piled too high.

What is the best way to store logs? ›

Firewood is best stored outside. It should be stored neatly, with the outside of the wood exposed to the air. If possible, you should place the wood on top of plastic sheeting or in a wooden log store. Avoid tree cover if possible and don't leave the logs in a heap.

What are the 3 types of data that can be stored in Azure? ›

There are 4 types of storage in Azure, namely:
  • File.
  • Blob.
  • Queue.
  • Table.
May 3, 2017

Where is your log data stored in Microsoft Sentinel? ›

By default, logs ingested into Microsoft Sentinel are stored in Azure Monitor Log Analytics.

Is Azure Sentinel now Microsoft Sentinel? ›

This blog will use both Microsoft Sentinel and Azure Sentinel, but for the sake of clarity, both terms refer to the same product. Azure Sentinel is a cloud-based security information and event management (SIEM) solution that helps you detect, investigate, and respond to threats across your entire organization.

How do I export Azure logs? ›

On the Log Analytics workspace menu in the Azure portal, select Data Export under the Settings section to view all export rules in the workspace.

Top Articles
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 6063

Rating: 4.8 / 5 (48 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.