Join Pete Zerger for an in-depth discussion in this video Configure automatic log upload, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Narrator] Automatic upload of your security information…event management logs to MCAS is possible…via a virtual machine appliance or a Docker container.…So step one is our web portal configuration.…We define our data sources and link them to a log collector.…A single log collector can handle multiple data sources.…For each firewall or proxy from which…you want to upload logs, create a matching data source.…So that is a data source per firewall or per proxy.…
Select all the data sources you want to connect…to the collector in the portal,…click Update to save the configuration…and generate an access token.…Set the receiver type to FTP or Syslog.…For Syslog, make sure you choose UDP or TCP…according to the settings of your device.…If your firewall requires a static IP address,…access list and does not support whitelisting…based on URL, allow the log collector to initiate…outbound traffic to the Microsoft Azure data center…IP ranges on port 443.…
A detailed list of these ranges is available…in the product documentation.…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection