9 Audit and log data: Azure Monitor

This chapter covers

  • Understanding different log types in Azure
  • Azure Monitor
  • Diagnostic settings
  • Data collection rules
  • Alert rules

As you learned in chapter 8, it’s important to have relevant data sources when detecting threats and investigating incidents. Relevant data sources provide the breadth and depth of data needed to detect potentially malicious activities and signs of compromise. However, relevant data sources can contain data that is both useful and, well, not really useful for your security operations.

To ensure you have the right data from the relevant data sources, it’s important to understand the different log types that are available in Azure. These log types help you determine what data you ...

Get Azure Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.