Thank you, Ulf, for your valuable insights.
I'll try to use them to build something useful!
BR
Original Message:
Sent: Mon June 16, 2025 11:51 AM
From: Ulf Larsson
Subject: QRadar and Azure-Only Environments
Hi,
Azure Monitor Agent (AMA) has been adopted in several environments I've worked with, and it's well-suited for workstation log collection. Using Data Collection Rules (DCRs), you can define exactly which logs to collect, including Sysmon, assuming it's installed and logging to the expected event channels.
In that sense, AMA offers log collection capabilities similar to WinRM with a central collector, but in a much more cloud-native and scalable way, especially when paired with Intune for deployment.
If you go the Sysmon route, some environments prefer using NXLog or Beats to ship those logs over HTTPS or syslog, especially for richer event data or when AMA isn't viable on all endpoints.
As for your idea of a DMZ-based log collector forwarding to QRadar in AWS, yes, that can work well. Tools like WinCollect, NXLog, or Beats can act as receivers and forwarders. Just make sure to secure the setup with TLS, strict firewall rules, and preferably mutual authentication.
A common pattern looks like this:
This gives you strong coverage, cloud-native flexibility, and a clear path for secure integration with QRadar.
Ulf
Ulf Larsson
SEB Group Security CTO
Mobile: +46 70 7391427
Switchboard: +46 771 62 10 00
Postal Address: SE-106 40 Stockholm
Office Address: Stjärntorget 4
E-mail: ulf.larsson@seb.se
Please visit:
http://www.seb.se/. Click or tap if you trust this link." data-linkindex="1" data-ogsc="" data-auth="Verified" style="color: #0563C1; margin: 0">www.seb.se
http://www.sebgroup.com/. Click or tap if you trust this link." data-linkindex="2" data-ogsc="" data-auth="Verified" style="color: #0563C1; margin: 0">www.sebgroup.com
Invoice address: Skandinaviska Enskilda Banken AB, Accounts Payable, SE-106 40 Stockholm
Please consider the environment before printing this e-mail
CONFIDENTIALITY NOTICE
This e-mail is confidential and may contain legally privileged information. If you have received it by mistake, please inform us by reply e-mail and then delete it (including any attachments) from your system; you should not copy it or in any other way disclose its content to anyone. E-mail is susceptible to data corruption, interception, unauthorized amendment, tampering and virus. We do not accept liability for any such actions or the consequences thereof.
Original Message:
Sent: 6/16/2025 9:56:00 AM
From: Vydenis Kucinskas
Subject: RE: QRadar and Azure-Only Environments
Hi Ulf,
Your solution sounds interesting. Could you please provide more information on how it can be implemented?
Am I correct in understanding that the Azure Monitor Agent (AMA) has been tested and adopted for log collection on workstations in your organization (or others)?
From what I understand, AMA is also capable of collecting Sysmon logs. Is it accurate that we can define exactly which log sources to collect from a workstation using this agent?
If so, then its log collection capabilities appear quite similar to using WinRM with a central Windows log collector.
I'm also considering your fourth step - deploying a bastion or event collector in the DMZ that forwards logs to QRadar within a private AWS network.
This approach would also enable comprehensive log collection via WinCollect.
That said, the main questions are: how should this solution be configured securely, and what software can be used to receive logs from WinCollect agents and forward them to QRadar via syslog?
BR
------------------------------
Vydenis Kucinskas
Original Message:
Sent: Thu June 12, 2025 01:51 AM
From: Ulf Larsson
Subject: QRadar and Azure-Only Environments
Hi,
This is a very relevant and increasingly common challenge in fully cloud-native environments, especially with a hybrid or remote workforce and without traditional on-prem infrastructure like AD or WinRM collectors.
A few key points and suggestions based on similar implementations:
Microsoft Defender for Endpoint (MDE) + Microsoft 365 Defender + Sentinel Integration:
You're correct that MDE and XDR focus on alerts, but it's worth noting that Defender for Endpoint Plan 2 does include richer telemetry and can stream process-level information.
You can forward raw event logs from Defender to Microsoft Sentinel via Azure Monitor - Sentinel can serve as a log aggregator.
From Sentinel, you can forward logs to Event Hub, and then ingest them into QRadar via the QRadar Event Hub Connector.
Use of Azure Monitor + Diagnostic Settings:
For broader workstation telemetry, Log Analytics agents (legacy) or Azure Monitor Agent (AMA) can be installed on endpoints.
Configure Diagnostic Settings on Windows endpoints (especially if enrolled via Intune) to forward key event channels: Security, System, Application into a Log Analytics workspace.
From the workspace, route logs to Event Hub → QRadar.
Consider Sysmon as a Lightweight Agent for Raw Logs:
Deploy Sysmon via Intune (if you manage devices that way), combined with a log shipper like NXLog or Beats.
These agents can send logs over HTTPS to a centralized log service or even directly into a forwarder in AWS (if designed securely).
This allows capturing richer logs including process creation, network connections, file writes - essential for forensic use cases.
On Network Isolation / Accessibility:
Zero Trust Logging Architecture Recommendation:
A practical and tested route would be:
Augment that with Sysmon (deployed via Intune) if you need richer telemetry not captured by default.
You're right to highlight that relying only on alerts won't be sufficient for compliance and forensics. The goal should be to replicate the fidelity of logs you'd have with WinRM collection - and the above options do get you very close in a cloud-native model.
------------------------------
Ulf Larsson
SEB Group Security CTO
Original Message:
Sent: Wed June 11, 2025 05:41 AM
From: Vydenis Kucinskas
Subject: QRadar and Azure-Only Environments
Hi guys,
Maybe someone have experience working with entirely cloud infrastructure, without on-prem servers or Active Directory and log collections from such infrastructure?
Situation:
The challenge lies in collecting logs from workstations (laptops) into the SIEM in fully cloud env.
Let's say we don't have an on-premises domain-only Azure AD-which rules out using Windows Event Forwarding (WinRM subscriptions) or WinCollect.
Our employees work both remotely and from various offices around the world. Each office is equipped with Wi-Fi, but network location is not the issue here-the main challenge is the complete absence of on-prem infrastructure.
The QRadar instance will be deployed in AWS but will not be publicly accessible, which further eliminates WinCollect as an option.
As far as I know there is solution to forward some logs from Windows Defender XDR to Event Hub and from there integrate event hub with QRadar. However, Defender XDR mostly sends only alerts, not raw data (security, application logs and etc.)
Collecting only alerts is not sufficient when it comes to forensic investigations, compliance, and comprehensive log collection - including security, application, and system logs. Our main goal is to collect full log data, not just alerts. In an on-premises environment, this is straightforward - you can collect everything you need. The challenge is achieving similar or equivalent log visibility in a fully cloud-based infrastructure.
There's also the theoretical solution of using Azure Monitor → Event Hub → QRadar. While I understand this flow in theory, we haven't tested it in practice, and I'm unsure what type of logs we'd be able to retrieve this way.
In typical on-prem environments, we collect security logs from workstations via WinRM. Without that setup, I'm uncertain how to proceed.
Has anyone encountered this issue and found a solution?
BR
Vydenis
------------------------------
Vydenis Kucinskas
------------------------------