log lags and analytic rules

HUI ACE 186 Reputation points
2021-09-15T02:43:14.27+00:00

hi kind community!

I am new to sentinel, so I wanted to ask about the delays of the log creation and injections in to sentinel. take AAD login logs for example, there is usually a delay for the logs to be generated and passed through the sentinel. so if I have a analytic rules that query logs every 30 mins, if the lag is greater than 30 mins, is that meaning the rules will never be satisfied. looking forward hearing from the community!

cheers

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
989 questions
0 comments No comments
{count} votes

Accepted answer
  1. VipulSparsh-MSFT 16,231 Reputation points Microsoft Employee
    2021-09-15T02:55:54.603+00:00

    @HUI ACE Thanks for reaching out.

    The longer is delay is only at first time, when we send the logs while adding the connector. After that the logs are ingested as soon as the respective service generates it. Within 5 minutes in case of Azure AD (not at the first time) But yes, the logs need to be present in order for the analytic query to work and find on something.

    In that case you need to schedule your query accordingly. However, do let us know if you think few logs take more time to sync to Sentinel LAWS.

    For that you do have query options which you can set for different time frames while creating an analytic rule
    132214-image.png

    -----------------------------------------------------------------------------------------------------------------

    Please remember to "Accept Answer" if any answer/reply helped, so that others in the community facing similar issues can easily find the solution.

    0 comments No comments

0 additional answers

Sort by: Most helpful