Global Security Forum

Security Global Forum

Our mission is to provide clients with an online user community of industry peers and IBM experts, to exchange tips and tricks, best practices, and product knowledge. We hope the information you find here helps you maximize the value of your IBM Security solutions.

 View Only
  • 1.  QRadar and Azure-Only Environments

    Posted 13 days ago

    Hi guys,


    Maybe someone have experience working with entirely cloud infrastructure, without on-prem servers or Active Directory and log collections from such infrastructure?

    Situation:
    The challenge lies in collecting logs from workstations (laptops) into the SIEM in fully cloud env.
    Let's say we don't have an on-premises domain-only Azure AD-which rules out using Windows Event Forwarding (WinRM subscriptions) or WinCollect.
    Our employees work both remotely and from various offices around the world. Each office is equipped with Wi-Fi, but network location is not the issue here-the main challenge is the complete absence of on-prem infrastructure.
    The QRadar instance will be deployed in AWS but will not be publicly accessible, which further eliminates WinCollect as an option.
    As far as I know there is solution to forward some logs from Windows Defender XDR to Event Hub and from there integrate event hub with QRadar. However, Defender XDR mostly sends only alerts, not raw data (security, application logs and etc.)
    Collecting only alerts is not sufficient when it comes to forensic investigations, compliance, and comprehensive log collection - including security, application, and system logs. Our main goal is to collect full log data, not just alerts. In an on-premises environment, this is straightforward - you can collect everything you need. The challenge is achieving similar or equivalent log visibility in a fully cloud-based infrastructure.
    There's also the theoretical solution of using Azure Monitor → Event Hub → QRadar. While I understand this flow in theory, we haven't tested it in practice, and I'm unsure what type of logs we'd be able to retrieve this way.
    In typical on-prem environments, we collect security logs from workstations via WinRM. Without that setup, I'm uncertain how to proceed.
    Has anyone encountered this issue and found a solution?

    BR
    Vydenis

     



    ------------------------------
    Vydenis Kucinskas
    ------------------------------


  • 2.  RE: QRadar and Azure-Only Environments

    Posted 13 days ago
    Hi,
    This is a very relevant and increasingly common challenge in fully cloud-native environments, especially with a hybrid or remote workforce and without traditional on-prem infrastructure like AD or WinRM collectors.
    A few key points and suggestions based on similar implementations:
    1. Microsoft Defender for Endpoint (MDE) + Microsoft 365 Defender + Sentinel Integration:
      • You're correct that MDE and XDR focus on alerts, but it's worth noting that Defender for Endpoint Plan 2 does include richer telemetry and can stream process-level information.
      • You can forward raw event logs from Defender to Microsoft Sentinel via Azure Monitor, Sentinel can serve as a log aggregator.
      • From Sentinel, you can forward logs to Event Hub, and then ingest them into QRadar via the QRadar Event Hub Connector.
    2. Use of Azure Monitor + Diagnostic Settings:
      • For broader workstation telemetry, Log Analytics agents (legacy) or Azure Monitor Agent (AMA) can be installed on endpoints.
      • Configure Diagnostic Settings on Windows endpoints (especially if enrolled via Intune) to forward key event channels: Security, System, Application into a Log Analytics workspace.
      • From the workspace, route logs to Event Hub → QRadar.
    3. Consider Sysmon as a Lightweight Agent for Raw Logs:
      • Deploy Sysmon via Intune (if you manage devices that way), combined with a log shipper like NXLog or Beats.
      • These agents can send logs over HTTPS to a centralized log service or even directly into a forwarder in AWS (if designed securely).
      • This allows capturing richer logs including process creation, network connections, file writes, essential for forensic use cases.
    4. On Network Isolation / Accessibility:
      • Since QRadar is in AWS and not publicly accessible, you can consider deploying a small log ingestion proxy (bastion collector) in a secure subnet that accepts inbound logs over HTTPS (from endpoints globally) and forwards internally to QRadar.
    5. Zero Trust Logging Architecture Recommendation:
      • Adopt Zero Trust principles for log collection:
        • Agent-based logging (Sysmon, AMA)
        • Endpoint identity-based authentication for log forwarding
        • No assumption of "trusted" networks, everything should use encryption and verification
    A practical and tested route would be:
    • Azure Monitor Agent on workstations → Log Analytics Workspace
    • Forward to Event Hub → QRadar via Event Hub connector 
    Augment that with Sysmon (deployed via Intune) if you need richer telemetry not captured by default.
    You're right to highlight that relying only on alerts won't be sufficient for compliance and forensics. The goal should be to replicate the fidelity of logs you'd have with WinRM collection and the above options do get you very close in a cloud-native model.
    Regards,
    Ulf

    Ulf Larsson

    SEB Group Security CTO

     

    Mobile: +46 70 7391427
    Switchboard: +46 771 62 10 00
    Postal Address: SE-106 40 Stockholm
    Office Address: Stjärntorget 4
    E-mail:
    ulf.larsson@seb.se

     

    Please visit:

    http://www.seb.se/. Click or tap if you trust this link." data-linkindex="1" data-ogsc="" data-auth="Verified" style="color: #0563C1; margin: 0">www.seb.se

    http://www.sebgroup.com/. Click or tap if you trust this link." data-linkindex="2" data-ogsc="" data-auth="Verified" style="color: #0563C1; margin: 0">www.sebgroup.com

     

    Invoice address: Skandinaviska Enskilda Banken AB,  Accounts Payable, SE-106 40 Stockholm

    Please consider the environment before printing this e-mail

     

    CONFIDENTIALITY NOTICE
    This e-mail is confidential and may contain legally privileged information. If you have received it by mistake, please inform us by reply e-mail and then delete it (including any attachments) from your system; you should not copy it or in any other way disclose its content to anyone. E-mail is susceptible to data corruption, interception, unauthorized amendment, tampering and virus. We do not accept liability for any such actions or the consequences thereof.






  • 3.  RE: QRadar and Azure-Only Environments

    Posted 13 days ago

    Hi,

    This is a very relevant and increasingly common challenge in fully cloud-native environments, especially with a hybrid or remote workforce and without traditional on-prem infrastructure like AD or WinRM collectors.

    A few key points and suggestions based on similar implementations:

    1. Microsoft Defender for Endpoint (MDE) + Microsoft 365 Defender + Sentinel Integration:

      • You're correct that MDE and XDR focus on alerts, but it's worth noting that Defender for Endpoint Plan 2 does include richer telemetry and can stream process-level information.

      • You can forward raw event logs from Defender to Microsoft Sentinel via Azure Monitor - Sentinel can serve as a log aggregator.

      • From Sentinel, you can forward logs to Event Hub, and then ingest them into QRadar via the QRadar Event Hub Connector.

    2. Use of Azure Monitor + Diagnostic Settings:

      • For broader workstation telemetry, Log Analytics agents (legacy) or Azure Monitor Agent (AMA) can be installed on endpoints.

      • Configure Diagnostic Settings on Windows endpoints (especially if enrolled via Intune) to forward key event channels: Security, System, Application into a Log Analytics workspace.

      • From the workspace, route logs to Event Hub → QRadar.

    3. Consider Sysmon as a Lightweight Agent for Raw Logs:

      • Deploy Sysmon via Intune (if you manage devices that way), combined with a log shipper like NXLog or Beats.

      • These agents can send logs over HTTPS to a centralized log service or even directly into a forwarder in AWS (if designed securely).

      • This allows capturing richer logs including process creation, network connections, file writes - essential for forensic use cases.

    4. On Network Isolation / Accessibility:

      • Since QRadar is in AWS and not publicly accessible, you can consider deploying a small log ingestion proxy (bastion collector) in a secure subnet that accepts inbound logs over HTTPS (from endpoints globally) and forwards internally to QRadar.

    5. Zero Trust Logging Architecture Recommendation:

      • Adopt Zero Trust principles for log collection:

        • Agent-based logging (Sysmon, AMA)

        • Endpoint identity-based authentication for log forwarding

        • No assumption of "trusted" networks - everything should use encryption and verification

    A practical and tested route would be:

    • Azure Monitor Agent on workstations → Log Analytics Workspace

    • Forward to Event Hub → QRadar via Event Hub connector

    Augment that with Sysmon (deployed via Intune) if you need richer telemetry not captured by default.

    You're right to highlight that relying only on alerts won't be sufficient for compliance and forensics. The goal should be to replicate the fidelity of logs you'd have with WinRM collection - and the above options do get you very close in a cloud-native model.



    ------------------------------
    Ulf Larsson
    SEB Group Security CTO
    ------------------------------



  • 4.  RE: QRadar and Azure-Only Environments

    Posted 8 days ago

    Hi Ulf,

    Your solution sounds interesting. Could you please provide more information on how it can be implemented?

    Am I correct in understanding that the Azure Monitor Agent (AMA) has been tested and adopted for log collection on workstations in your organization (or others)?
    From what I understand, AMA is also capable of collecting Sysmon logs. Is it accurate that we can define exactly which log sources to collect from a workstation using this agent?

    If so, then its log collection capabilities appear quite similar to using WinRM with a central Windows log collector.

    I'm also considering your fourth step - deploying a bastion or event collector in the DMZ that forwards logs to QRadar within a private AWS network.
    This approach would also enable comprehensive log collection via WinCollect.

    That said, the main questions are: how should this solution be configured securely, and what software can be used to receive logs from WinCollect agents and forward them to QRadar via syslog?

    BR



    ------------------------------
    Vydenis Kucinskas
    ------------------------------



  • 5.  RE: QRadar and Azure-Only Environments

    Posted 8 days ago
    Hi,

    Azure Monitor Agent (AMA) has been adopted in several environments I've worked with, and it's well-suited for workstation log collection. Using Data Collection Rules (DCRs), you can define exactly which logs to collect, including Sysmon, assuming it's installed and logging to the expected event channels.

    In that sense, AMA offers log collection capabilities similar to WinRM with a central collector, but in a much more cloud-native and scalable way, especially when paired with Intune for deployment.

    If you go the Sysmon route, some environments prefer using NXLog or Beats to ship those logs over HTTPS or syslog, especially for richer event data or when AMA isn't viable on all endpoints.

    As for your idea of a DMZ-based log collector forwarding to QRadar in AWS, yes, that can work well. Tools like WinCollect, NXLog, or Beats can act as receivers and forwarders. Just make sure to secure the setup with TLS, strict firewall rules, and preferably mutual authentication.

    A common pattern looks like this:

    • AMA on endpoints → Log Analytics Workspace

    • Logs forwarded to Event Hub

    • QRadar ingests via the Event Hub connector

    • Or: Sysmon + NXLog → DMZ collector → QRadar via syslog

    This gives you strong coverage, cloud-native flexibility, and a clear path for secure integration with QRadar.

    Ulf

    Ulf Larsson

    SEB Group Security CTO

     

    Mobile: +46 70 7391427
    Switchboard: +46 771 62 10 00
    Postal Address: SE-106 40 Stockholm
    Office Address: Stjärntorget 4
    E-mail:
    ulf.larsson@seb.se

     

    Please visit:

    http://www.seb.se/. Click or tap if you trust this link." data-linkindex="1" data-ogsc="" data-auth="Verified" style="color: #0563C1; margin: 0">www.seb.se

    http://www.sebgroup.com/. Click or tap if you trust this link." data-linkindex="2" data-ogsc="" data-auth="Verified" style="color: #0563C1; margin: 0">www.sebgroup.com

     

    Invoice address: Skandinaviska Enskilda Banken AB,  Accounts Payable, SE-106 40 Stockholm

    Please consider the environment before printing this e-mail

     

    CONFIDENTIALITY NOTICE
    This e-mail is confidential and may contain legally privileged information. If you have received it by mistake, please inform us by reply e-mail and then delete it (including any attachments) from your system; you should not copy it or in any other way disclose its content to anyone. E-mail is susceptible to data corruption, interception, unauthorized amendment, tampering and virus. We do not accept liability for any such actions or the consequences thereof.






  • 6.  RE: QRadar and Azure-Only Environments

    Posted 8 days ago

    Thank you, Ulf, for your valuable insights.
    I'll try to use them to build something useful!

    BR



    ------------------------------
    Vydenis Kucinskas
    ------------------------------



  • 7.  RE: QRadar and Azure-Only Environments

    Posted 13 days ago
    Seems like you want to collect comprehensive Windows workstation logs (things like security, application, system—not just alerts) from globally distributed, cloud-managed devices (Azure AD only, no on-prem, no WinRM/WinCollect) into a QRadar SIEM instance in AWS that is not publicly exposed.

    What on earth are you setting up, if you don’t mind me asking?