Skip to content

Commit 93f280c

Browse files
authored
format
1 parent e378e68 commit 93f280c

1 file changed

Lines changed: 142 additions & 11 deletions

File tree

0_Azure/2_AzureAnalytics/2_EventHubs/demos/1_SizeDefenderAdvancedHuntingAdd-onforSplunk.md

Lines changed: 142 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@ Last updated: 2025-03-25
3535
- [Step 1: Determine Ingress Data Rate](#step-1-determine-ingress-data-rate)
3636
- [Step 2: Calculate Throughput Units TUs](#step-2-calculate-throughput-units-tus)
3737
- [Step 3: Monitor and Adjust](#step-3-monitor-and-adjust)
38-
- [Example Calculation](#example-calculation)
3938
- [Installation Steps](#installation-steps)
39+
- [Example Calculation](#example-calculation)
4040

4141
## Overview
4242

@@ -143,7 +143,147 @@ $$
143143
3. **Adjust TUs** as needed based on real-time data.
144144
4. **Auto-Inflate Feature**: Start with a lower number of TUs and set an upper threshold for automatic scaling.
145145

146-
### Example Calculation
146+
## Installation Steps
147+
148+
<details>
149+
<summary><b>Step 1: Configure Microsoft Defender for Endpoint</b></summary>
150+
151+
**Action:** Stream Advanced Hunting events to an Azure Event Hub
152+
153+
**Details:**
154+
- **Create an Azure Event Hub namespace and Event Hub:**
155+
- Navigate to the Azure Portal.
156+
- Select `Create a resource` and search for `Event Hubs`.
157+
- Create a new Event Hub namespace and within it, create an Event Hub.
158+
- Note down the connection string for the Event Hub.
159+
160+
- **Configure Microsoft Defender for Endpoint to stream events to the Event Hub:**
161+
- Access the Microsoft Defender Security Center.
162+
- Go to `Settings` > `Advanced features`.
163+
- Enable the `Streaming API` and configure it to stream events to the Azure Event Hub using the connection string.
164+
165+
- **Ensure necessary permissions are granted:**
166+
- Ensure that the Azure Event Hub has the necessary permissions to receive data from Microsoft Defender for Endpoint.
167+
- Assign the appropriate roles (e.g., `Event Hub Data Sender`) to the Defender for Endpoint service principal.
168+
169+
**Example/Command:**
170+
- **Azure Portal:** Create Event Hub
171+
- **Defender Security Center:** Enable Streaming API
172+
173+
</details>
174+
175+
<details>
176+
<summary><b>Step 2: Install the Add-on</b></summary>
177+
178+
**Action:** Install the Add-on on your Search Heads, Indexers, and Heavy Forwarders
179+
180+
**Details:**
181+
- **Download the Microsoft Defender Advanced Hunting Add-on for Splunk:**
182+
- Visit Splunkbase and search for `Microsoft Defender Advanced Hunting Add-on`.
183+
- Download the add-on package.
184+
185+
- **Install the add-on on all relevant Splunk components:**
186+
- Log in to your Splunk instance.
187+
- Navigate to `Apps` > `Manage Apps`.
188+
- Click `Install app from file` and upload the downloaded add-on package.
189+
- Repeat the installation process for Search Heads, Indexers, and Heavy Forwarders.
190+
191+
- **Configure the add-on as per your environment requirements:**
192+
- Access the add-on configuration page.
193+
- Set parameters such as the index, sourcetype, and any other environment-specific settings.
194+
195+
**Example/Command:**
196+
- **Splunkbase:** Download Add-on
197+
- **Splunk UI:** Apps > Manage Apps > Install app from file
198+
199+
</details>
200+
201+
<details>
202+
<summary><b>Step 3: Set up the Input</b></summary>
203+
204+
**Action:** Set up the Input in the Splunk Add-on for Microsoft Cloud Services
205+
206+
**Details:**
207+
- **Navigate to the Splunk Add-on for Microsoft Cloud Services configuration page:**
208+
- Open Splunk and go to `Settings` > `Data Inputs`.
209+
210+
- **Add a new input for Azure Event Hub:**
211+
- Select `Azure Event Hub` as the input type.
212+
- Provide the connection string for the Azure Event Hub.
213+
214+
- **Set the Sourcetype to `mscs:azure:eventhub:defender:advancedhunting`:**
215+
- In the input configuration, set the sourcetype to `mscs:azure:eventhub:defender:advancedhunting`.
216+
217+
- **Configure other parameters such as index, interval, and format:**
218+
- Specify the index where the data should be stored.
219+
- Set the interval for data collection.
220+
- Configure the format and any other relevant parameters.
221+
222+
**Example/Command:**
223+
- **Splunk UI:** Settings > Data Inputs > Azure Event Hub
224+
- **Sourcetype:** `mscs:azure:eventhub:defender:advancedhunting`
225+
226+
</details>
227+
228+
<details>
229+
<summary><b>Step 4: Verify Data Arrival</b></summary>
230+
231+
**Action:** Run a search to verify data arrival
232+
233+
**Details:**
234+
- **Open the Splunk Search & Reporting app:**
235+
- Navigate to the `Search & Reporting` app in Splunk.
236+
237+
- **Run the search query to verify that data is being ingested correctly:**
238+
- Use the following search query to check for incoming data:
239+
```spl
240+
index=* eventtype="ms_defender_advanced_hunting_sourcetypes"
241+
```
242+
243+
**Example/Command:**
244+
```spl
245+
index=* eventtype="ms_defender_advanced_hunting_sourcetypes"
246+
```
247+
248+
</details>
249+
250+
<details>
251+
<summary><b>Step 5: Enable Scheduled Saved Searches</b></summary>
252+
253+
**Action:** Enable Scheduled Saved Searches for Malware and Email data models
254+
255+
**Details:**
256+
- **Navigate to Saved Searches in Splunk:**
257+
- Go to `Settings` > `Searches, Reports, and Alerts`.
258+
259+
- **Create new saved searches for malware and email data models:**
260+
- Click `New Search` and define search queries for malware and email data models.
261+
- Example search queries:
262+
```spl
263+
index=* sourcetype="defender:advancedhunting:malware"
264+
index=* sourcetype="defender:advancedhunting:email"
265+
```
266+
267+
- **Schedule the searches to run at regular intervals (e.g., every hour):**
268+
- Set the schedule for the saved searches to run at desired intervals.
269+
270+
- **Configure alert actions if needed:**
271+
- Define alert actions such as email notifications or script execution.
272+
273+
- **Verify data generation by running the saved searches manually:**
274+
- Execute the saved searches manually to ensure they generate the expected results.
275+
276+
**Example/Command:**
277+
- **Splunk UI:** Settings > Searches, Reports, and Alerts
278+
- **Example search queries:**
279+
```spl
280+
index=* sourcetype="defender:advancedhunting:malware"
281+
index=* sourcetype="defender:advancedhunting:email"
282+
```
283+
284+
</details>
285+
286+
## Example Calculation
147287

148288
> Assume we have 200 endpoints, each sending 0.25 MB of data per second and generating 2 events per second.
149289
@@ -206,15 +346,6 @@ $$
206346
| **Event Rate** | Determine the frequency of events generated by each source per second. | Endpoint generates 2 events/s, server generates 5 events/s. | **Total Event Rate (events/s)** | Endpoints: 400, Servers: 250 | Number of Sources * Event Rate per Source |
207347
| **Required TUs** | Calculate the required Throughput Units based on data volume and event rate. | Total Ingress MB/s = 50, Total Events/second = 400 | **Required TUs** | 50 | Max value between the two: 50/1 = (50) or 400/1000 = (0.4) |
208348

209-
## Installation Steps
210-
211-
| **Step** | **Action** | **Details** | **Example/Command** |
212-
|------------------------------------------------|-------------|-------------|---------------------|
213-
| **1. Configure Microsoft Defender for Endpoint** | Stream Advanced Hunting events to an Azure Event Hub | - Create an Azure Event Hub namespace and Event Hub. <br> - Configure Microsoft Defender for Endpoint to stream events to the Event Hub. <br> - Ensure necessary permissions are granted. | - Azure Portal: Create Event Hub <br> - Defender Security Center: Enable Streaming API |
214-
| **2. Install the Add-on** | Install the Add-on on your Search Heads, Indexers, and Heavy Forwarders | - Download the Microsoft Defender Advanced Hunting Add-on for Splunk from Splunkbase. <br> - Install the add-on on all relevant Splunk components (Search Heads, Indexers, Heavy Forwarders). <br> - Configure the add-on as per your environment requirements. | - Splunkbase: Download Add-on <br> - Splunk UI: Apps > Manage Apps > Install app from file |
215-
| **3. Set up the Input** | Set up the Input in the Splunk Add-on for Microsoft Cloud Services | - Navigate to the Splunk Add-on for Microsoft Cloud Services configuration page. <br> - Add a new input for Azure Event Hub. <br> - Set the Sourcetype to `mscs:azure:eventhub:defender:advancedhunting`. <br> - Provide the connection string for the Azure Event Hub. <br> - Configure other parameters such as index, interval, and format. | - Splunk UI: Settings > Data Inputs > Azure Event Hub <br> - Sourcetype: `mscs:azure:eventhub:defender:advancedhunting` |
216-
| **4. Verify Data Arrival** | Run a search to verify data arrival | - Open the Splunk Search & Reporting app. <br> - Run the search query to verify that data is being ingested correctly. | `index=* eventtype="ms_defender_advanced_hunting_sourcetypes"` |
217-
| **5. Enable Scheduled Saved Searches** | Enable Scheduled Saved Searches for Malware and Email data models | - Navigate to Saved Searches in Splunk. <br> - Create new saved searches for malware and email data models. <br> - Schedule the searches to run at regular intervals (e.g., every hour). <br> - Configure alert actions if needed. <br> - Verify data generation by running the saved searches manually. | - Splunk UI: Settings > Searches, Reports, and Alerts <br> - Example search queries: <br> `index=* sourcetype="defender:advancedhunting:malware"` <br> `index=* sourcetype="defender:advancedhunting:email"` |
218349

219350
<div align="center">
220351
<h3 style="color: #4CAF50;">Total Visitors</h3>

0 commit comments

Comments
 (0)