πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 β€” Module 3 of 12 25%
3 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~13 min read

Syslog, CEF & Azure Data Ingestion

Your SOC needs more than Windows events. Learn how to ingest Linux Syslog, firewall CEF logs, Azure activity data via diagnostic settings, and create custom log tables for non-standard sources.

Beyond Windows: the rest of your data

β˜• Simple explanation

Your SOC is not Windows-only.

Linux servers send logs in a format called Syslog. Firewalls, proxies, and network appliances use CEF (Common Event Format). Azure itself generates activity logs every time someone creates a VM, changes a network rule, or modifies a policy.

And sometimes you have data that does not fit any standard format β€” maybe a custom application writing JSON logs, or a third-party SaaS exporting CSV. For those, you create custom log tables.

This module covers all four: Syslog, CEF, Azure activity logs, and custom tables. Together with Windows events from the previous module, these cover the majority of data sources you will configure for the exam.

Microsoft Sentinel supports ingestion from hundreds of data sources. Beyond Windows Security Events, the most common sources are:

  • Syslog via AMA β€” Linux-based systems (servers, containers, appliances) sending RFC 5424/RFC 3164 messages
  • CEF via AMA β€” Network devices (firewalls, WAFs, IDS/IPS) using the Common Event Format standard over Syslog
  • Azure Activity Logs β€” Azure control-plane operations collected via Azure Policy and resource diagnostic settings
  • Custom log tables β€” API-based ingestion for non-standard data sources using the Logs Ingestion API and DCR-based transformations

Each method uses the Azure Monitor Agent (AMA) or Azure diagnostic settings and targets a specific table in the Log Analytics workspace.

Syslog via AMA

Syslog is the universal logging standard for Linux and Unix systems. Messages are categorised by facility (kern, auth, daemon, etc.) and severity (Emergency through Debug).

How Syslog ingestion works

  1. Install AMA on a Linux machine (the log source itself, or a dedicated forwarder)
  2. Create a DCR that specifies which facilities and severity levels to collect
  3. AMA listens on the local Syslog socket and forwards matching events to Sentinel
  4. Data lands in the Syslog table in your workspace

DCR filtering for Syslog

Just like Windows events, you filter Syslog at the source with a DCR:

FacilityWhat It Captures
auth / authprivAuthentication events (SSH logins, sudo)
kernKernel messages (hardware, driver issues)
daemonBackground services
local0–local7Custom application logs

You select facilities and minimum severity levels. For example: collect auth at Warning and above to capture failed logins without flooding the workspace with informational messages.

CEF via AMA

Common Event Format (CEF) is a standardised log format used by firewalls, intrusion detection systems, and network appliances. CEF messages ride on top of Syslog.

CEF vs raw Syslog

CEF is structured and pre-parsed; Syslog is flexible but needs more parsing work
FeatureSyslogCEF
FormatFree-text or structured, varies by applicationStandardised key-value pairs with defined fields
Typical sourcesLinux servers, containers, Unix appsFirewalls (Palo Alto, Fortinet), WAFs, IDS/IPS, proxies
Sentinel tableSyslogCommonSecurityLog
ParsingRequires custom parsing for structured queriesPre-parsed into named columns (DeviceVendor, Activity, etc.)
AMA connectorSyslog via AMACEF via AMA (uses Syslog transport)

CEF ingestion architecture

Network device β†’ sends CEF over Syslog β†’ Linux forwarder with AMA β†’ Sentinel (CommonSecurityLog table)

Most network appliances cannot run AMA directly. Instead, you set up a Linux forwarder (a dedicated VM) that:

  1. Receives CEF messages on port 514 (TCP/UDP)
  2. AMA on the forwarder collects from the local Syslog daemon
  3. Forwards to the Sentinel workspace
πŸ’‘ Scenario: Anika's firewall ingestion

Three of Anika’s MSSP clients use Palo Alto firewalls. The firewalls send CEF-formatted threat logs over Syslog.

Anika deploys one Linux forwarder VM per client (for data isolation) with AMA installed. Each forwarder has a DCR that filters for the relevant CEF severity levels. The firewall logs land in the CommonSecurityLog table, where Anika’s analytics rules detect port scanning, command-and-control traffic, and data exfiltration attempts.

Azure activity logs

Azure Activity Logs record every control-plane operation in your Azure subscription: who created a VM, who changed a network security group, who deleted a storage account.

Two ways to collect Azure activities

MethodHow It WorksBest For
Azure PolicyAssigns a diagnostic setting to all resources in a subscription automaticallyLarge environments, consistent deployment
Resource diagnostic settingsConfigure per-resource or per-subscription in Azure MonitorTargeted collection from specific resources

Azure Policy is the recommended approach for the exam β€” it ensures every new resource automatically sends its diagnostic data to Sentinel without manual configuration.

What Azure activity logs capture

  • Administrative β€” resource create, update, delete operations
  • Security β€” Defender for Cloud alerts, security recommendations
  • Service Health β€” Azure service issues affecting your resources
  • Alert β€” Azure Monitor alert activations
  • Policy β€” Azure Policy evaluations and compliance changes
πŸ’‘ Exam tip: Azure Policy vs manual diagnostic settings

If the exam asks β€œhow to ensure ALL Azure resources send diagnostic data to Sentinel,” the answer is Azure Policy with a built-in policy definition like β€œDeploy diagnostic settings for Activity Log to Log Analytics workspace.”

If the question asks about a specific resource (e.g., β€œa Key Vault”), the answer is resource diagnostic settings configured on that resource.

Custom log tables

When your data does not fit any built-in connector, you create a custom log table using the Logs Ingestion API.

When to use custom log tables

  • Third-party SaaS that exports logs via API but has no Sentinel connector
  • Custom applications writing JSON or structured logs
  • Legacy systems with proprietary log formats
  • Enrichment data (threat intel feeds, asset inventories) you want queryable in KQL

How custom log ingestion works

  1. Create a custom table in the Log Analytics workspace (table name must end with _CL)
  2. Create a DCR with a transformation that maps your data to the table schema
  3. Send data to the Logs Ingestion API endpoint using the DCR ID
  4. Data is transformed and stored in the custom table

The DCR transformation uses KQL-based transformations to reshape incoming data β€” rename fields, parse timestamps, filter rows.

πŸ’‘ Scenario: Elena's ATM transaction logs

Elena at Atlas Bank needs ATM transaction logs in Sentinel for fraud detection. The ATM management system exports JSON logs via an API but has no Sentinel connector.

Elena creates:

  • A custom table: ATMTransactions_CL with columns for transaction_id, card_type, amount, location, timestamp
  • A DCR with a KQL transformation that parses the JSON and maps fields
  • A Logic App that polls the ATM API every 5 minutes and sends data to the Logs Ingestion API

Now she can write KQL queries and analytics rules against ATM data alongside security events.

Question

What Sentinel table does CEF data land in?

Click or press Enter to reveal answer

Answer

CommonSecurityLog. CEF messages are pre-parsed into structured columns (DeviceVendor, DeviceProduct, Activity, etc.) making them easier to query than raw Syslog.

Click to flip back

Question

What is the recommended way to ensure all Azure resources send activity logs to Sentinel?

Click or press Enter to reveal answer

Answer

Azure Policy. Assign a built-in policy like 'Deploy diagnostic settings for Activity Log to Log Analytics workspace' at the subscription level. This automatically configures diagnostic settings for all current and future resources.

Click to flip back

Question

What naming convention must custom log tables follow?

Click or press Enter to reveal answer

Answer

Custom log table names must end with _CL (e.g., ATMTransactions_CL). They use the Logs Ingestion API and DCR-based transformations to receive and reshape data.

Click to flip back

Knowledge Check

Anika needs to ingest Palo Alto firewall threat logs into Sentinel. The firewalls send CEF-formatted messages over Syslog. Which architecture should she use?

Knowledge Check

James wants to ensure that every Azure resource in Pacific Meridian's subscription sends diagnostic data to Sentinel β€” including resources created in the future. What should he configure?

Knowledge Check

Anika manages 40 MSSP clients. A new client wants CEF firewall logs AND Azure activity logs in Sentinel. The client also has a custom IoT platform that writes JSON logs via API. Anika must minimise cost and complexity. Which combination of connectors should she use?

🎬 Video coming soon

Next up: Data is flowing into Sentinel. Now let’s configure the other half of the equation β€” Microsoft Defender for Endpoint β€” and make sure it’s set up for advanced detection and response.

← Previous

Get Windows Events Into Sentinel

Next β†’

Defender for Endpoint: Core Setup

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.