You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Assume we have 200 endpoints, each sending 0.25 MB of data per second and generating 2 events per second.
149
289
@@ -206,15 +346,6 @@ $$
206
346
|**Event Rate**| Determine the frequency of events generated by each source per second. | Endpoint generates 2 events/s, server generates 5 events/s. |**Total Event Rate (events/s)**| Endpoints: 400, Servers: 250 | Number of Sources * Event Rate per Source |
207
347
|**Required TUs**| Calculate the required Throughput Units based on data volume and event rate. | Total Ingress MB/s = 50, Total Events/second = 400 |**Required TUs**| 50 | Max value between the two: 50/1 = (50) or 400/1000 = (0.4) |
|**1. Configure Microsoft Defender for Endpoint**| Stream Advanced Hunting events to an Azure Event Hub | - Create an Azure Event Hub namespace and Event Hub. <br> - Configure Microsoft Defender for Endpoint to stream events to the Event Hub. <br> - Ensure necessary permissions are granted. | - Azure Portal: Create Event Hub <br> - Defender Security Center: Enable Streaming API |
214
-
|**2. Install the Add-on**| Install the Add-on on your Search Heads, Indexers, and Heavy Forwarders | - Download the Microsoft Defender Advanced Hunting Add-on for Splunk from Splunkbase. <br> - Install the add-on on all relevant Splunk components (Search Heads, Indexers, Heavy Forwarders). <br> - Configure the add-on as per your environment requirements. | - Splunkbase: Download Add-on <br> - Splunk UI: Apps > Manage Apps > Install app from file |
215
-
|**3. Set up the Input**| Set up the Input in the Splunk Add-on for Microsoft Cloud Services | - Navigate to the Splunk Add-on for Microsoft Cloud Services configuration page. <br> - Add a new input for Azure Event Hub. <br> - Set the Sourcetype to `mscs:azure:eventhub:defender:advancedhunting`. <br> - Provide the connection string for the Azure Event Hub. <br> - Configure other parameters such as index, interval, and format. | - Splunk UI: Settings > Data Inputs > Azure Event Hub <br> - Sourcetype: `mscs:azure:eventhub:defender:advancedhunting`|
216
-
|**4. Verify Data Arrival**| Run a search to verify data arrival | - Open the Splunk Search & Reporting app. <br> - Run the search query to verify that data is being ingested correctly. |`index=* eventtype="ms_defender_advanced_hunting_sourcetypes"`|
217
-
|**5. Enable Scheduled Saved Searches**| Enable Scheduled Saved Searches for Malware and Email data models | - Navigate to Saved Searches in Splunk. <br> - Create new saved searches for malware and email data models. <br> - Schedule the searches to run at regular intervals (e.g., every hour). <br> - Configure alert actions if needed. <br> - Verify data generation by running the saved searches manually. | - Splunk UI: Settings > Searches, Reports, and Alerts <br> - Example search queries: <br> `index=* sourcetype="defender:advancedhunting:malware"` <br> `index=* sourcetype="defender:advancedhunting:email"`|
0 commit comments