title | description | services | author | ms.author | ms.service | ms.subservice | ms.topic | ms.date |
---|---|---|---|---|---|---|---|---|
Prerequisites for deploying Azure Sentinel |
Learn about pre-deployment activities and prerequisites for deploying Azure Sentinel. |
sentinel |
batamig |
bagol |
azure-sentinel |
azure-sentinel |
conceptual |
07/21/2021 |
This article introduces the pre-deployment activities and prerequisites for deploying Azure Sentinel.
Before deploying Azure Sentinel, we recommend taking the following steps to help focus your deployment on providing maximum value, as soon as possible.
-
Determine which data sources you need and the data size requirements to help you accurately project your deployment's budget and timeline.
You might determine this information during your business use case review, or by evaluating a current SIEM that you already have in place. If you already have a SIEM in place, analyze your data to understand which data sources provide the most value and should be ingested into Azure Sentinel.
-
Design your Azure Sentinel workspace. Consider parameters such as:
- Whether you'll use a single tenant or multiple tenants
- Any compliance requirements you have for data collection and storage
- How to control access to Azure Sentinel data
For more information, see Workspace architecture best practices and Sample workspace designs.
-
After the business use cases, data sources, and data size requirements have been identified, start planning your budget, considering cost implications for each planned scenario.
Make sure that your budget covers the cost of data ingestion for both Azure Sentinel and Azure Log Analytics, any playbooks that will be deployed, and so on.
For more information, see:
-
Nominate an engineer or architect lead the deployment, based on requirements and timelines. This individual should lead the deployment and be the main point of contact on your team.
Before deploying Azure Sentinel, make sure that your Azure tenant has the following requirements:
-
An Azure Active Directory license and tenant, or an individual account with a valid payment method, are required to access Azure and deploy resources.
-
After you have a tenant, you must have an Azure subscription to track resource creation and billing.
-
After you have a subscription, you'll need the relevant permissions to begin using your subscription. If you are using a new subscription, an admin or higher from the AAD tenant should be designated as the owner/contributor for the subscription.
- To maintain the least privileged access available, assign roles at the level of the resource group.
- For more control over permissions and access, set up custom roles. For more information, see Role-based access control.
- For extra separation between users and security users, you might want to use resource-context or table-level RBAC.
For more information about other roles and permissions supported for Azure Sentinel, see Permissions in Azure Sentinel.
-
A Log Analytics workspace is required to house all of the data that Azure Sentinel will be ingesting and using for its detections, analytics, and other features. For more information, see Azure Sentinel workspace architecture best practices.
Tip
When setting up your Azure Sentinel workspace, create a resource group that's dedicated to Azure Sentinel and the resources that Azure Sentinel users including the Log Analytics workspace, any playbooks, workbooks, and so on.
A dedicated resource group allows for permissions to be assigned once, at the resource group level, with permissions automatically applied to any relevant resources. Managing access via a resource group helps to ensure that you're using Azure Sentinel efficiently without potentially issuing improper permissions. Without a resource group for Azure Sentinel, where resources are scattered among multiple resource groups, a user or service principal may find themselves unable to perform a required action or view data due to insufficient permissions.
To implement more access control to resources by tiers, use extra resource groups to house the resources that should be accessed only by those groups. Using multiple tiers of resource groups enables you to separate access between those tiers.
[!div class="nextstepaction"] On-board Azure Sentinel
[!div class="nextstepaction"] Get visibility into alerts