Solution: MaturityModelForEventLogManagementM2131
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | Microsoft Corporation |
| Support Tier | Microsoft |
| Support Link | https://support.microsoft.com |
| Categories | domains |
| Version | 3.0.3 |
| Author | Microsoft - support@microsoft.com |
| First Published | 2021-12-05 |
| Solution Folder | MaturityModelForEventLogManagementM2131 |
| Marketplace | Azure Marketplace · Popularity: 🟡 Low (28%) |
This solution is designed to enable Cloud Architects, Security Engineers, and Governance Risk Compliance Professionals to increase visibility before, during, and after a cybersecurity incident. The solution includes (1) workbook, (4) hunting queries, (8) analytics rules, and (3) playbooks providing a comprehensive approach to design, build, monitoring, and response in logging architectures. Information from logs on information systems1 (for both on-premises systems and connections hosted by third parties, such as cloud services providers (CSPs) is invaluable in the detection, investigation, and remediation of cyber threats. Executive Order 14028, Improving the Nation's Cybersecurity, directs decisive action to improve the Federal Government’s investigative and remediation capabilities. This memorandum was developed in accordance with and addresses the requirements in section 8 of the Executive Order for logging, log retention, and log management, with a focus on ensuring centralized access and visibility for the highest-level enterprise security operations center (SOC) of each agency. In addition, this memorandum establishes requirements for agencies3 to increase the sharing of such information, as needed and appropriate, to accelerate incident response efforts and to enable more effective defense of Federal information and executive branch departments and agencies. For more information, see (💡Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity Incidents (M-21-31)).
This solution does not include data connectors.
This solution may contain other components such as analytics rules, workbooks, hunting queries, or playbooks.
This solution queries 45 table(s) from its content items:
The following 5 table(s) are used internally by this solution's content items:
| Table | Used By Content |
|---|---|
AlertEvidence |
Workbooks |
BehaviorAnalytics |
Workbooks |
IdentityInfo |
Workbooks |
SecurityAlert |
Workbooks |
SecurityIncident |
Workbooks |
This solution includes 16 content item(s):
| Content Type | Count |
|---|---|
| Analytic Rules | 8 |
| Hunting Queries | 4 |
| Playbooks | 3 |
| Workbooks | 1 |
| Name | Severity | Tactics | Tables Used |
|---|---|---|---|
| M2131_AssetStoppedLogging | Medium | Discovery | Heartbeat |
| M2131_DataConnectorAddedChangedRemoved | Medium | Discovery | AzureActivity |
| M2131_EventLogManagementPostureChanged_EL0 | Medium | Discovery | SecurityRecommendation |
| M2131_EventLogManagementPostureChanged_EL1 | Medium | Discovery | SecurityRecommendation |
| M2131_EventLogManagementPostureChanged_EL2 | Medium | Discovery | SecurityRecommendation |
| M2131_EventLogManagementPostureChanged_EL3 | Medium | Discovery | SecurityRecommendation |
| M2131_LogRetentionLessThan1Year | Medium | Discovery | SecurityRecommendation |
| M2131_RecommendedDatatableUnhealthy | Medium | Discovery | Usage |
| Name | Tactics | Tables Used |
|---|---|---|
| M2131_RecommendedDatatableNotLogged_EL0 | Discovery | Usage |
| M2131_RecommendedDatatableNotLogged_EL1 | Discovery | Usage |
| M2131_RecommendedDatatableNotLogged_EL2 | Discovery | Usage |
| M2131_RecommendedDatatableNotLogged_EL3 | Discovery | Usage |
| Name | Description | Tables Used |
|---|---|---|
| Create Jira Issue | This playbook will open a Jira Issue when a new incident is opened in Microsoft Sentinel. | - |
| Create-AzureDevOpsTask | This playbook will create the Azure DevOps task filled with the Microsoft Sentinel incident details. | - |
| Notify-LogManagementTeam | This Security Orchestration, Automation, & Response (SOAR) capability is designed for configuration ... | - |
This solution is designed to enable Cloud Architects, Security Engineers, and Governance Risk Compliance Professionals to increase visibility before, during, and after a cybersecurity incident. The solution includes (1) workbook, (4) hunting queries, (8) analytics rules, and (3) playbooks providing a comprehensive approach to design, build, monitoring, and response in logging architectures. Information from logs on information systems1 (for both on-premises systems and connections hosted by third parties, such as cloud services providers (CSPs) is invaluable in the detection, investigation, and remediation of cyber threats. "Executive Order 14028, Improving the Nation's Cybersecurity, directs decisive action to improve the Federal Government’s investigative and remediation capabilities. This memorandum was developed in accordance with and addresses the requirements in section 8 of the Executive Order for logging, log retention, and log management, with a focus on ensuring centralized access and visibility for the highest-level enterprise security operations center (SOC) of each agency. In addition, this memorandum establishes requirements for agencies3 to increase the sharing of such information, as needed and appropriate, to accelerate incident response efforts and to enable more effective defense of Federal information and executive branch departments and agencies." For more information, see 💡Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity Incidents (M-21-31).
You can deploy the solution by clicking on the buttons below:

[Content truncated...]
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.0.3 | 26-09-2025 | Updated the broken metrics in the workbook |
| 3.0.2 | 31-01-2024 | Updated the solution to fix Analytic Rules deployment issue |
| 3.0.1 | 09-11-2023 | Changes for rebranding from Azure Active Directory Identity Protection to Microsoft Entra ID Protection |
| 3.0.0 | 20-07-2023 | Updated Workbook template to remove unused variables. |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊