How Microsoft Sentinel and Unifi Networks Deliver Cost-Effective Solutions for SMBs [PoC]
This is why SMBs should activate Microsoft Sentinel
Recently, I was told that Microsoft Sentinel is built and aimed at massive companies, and that SMBs should look towards open-source solutions or leverage their on-premise vendors for good deals on SIEM. As this narrative seemed too common, I decided to challenge it by conducting a PoC (Proof of Concept) directly in production on an old client’s tenant. I even promised to cover the costs myself if Sentinel expenses surpassed €5 monthly. This company, with fewer than 30 employees, utilizes Microsoft E5 licenses for everyone, so I think my fellow experts reading this article can already guess the outcome (you silly sausages).
For added fun, the scenario involved ingesting their on-premise network logs into Sentinel. This was to uncover all kinds of blind spots and correlate Microsoft Defender XDR logs with on-site activities.
The Technology Stack
Microsoft Sentinel and Defender XDR
Microsoft Sentinel is a cloud-native SIEM (Security Information and Event Management) system offering intelligent security analytics and threat intelligence across an enterprise. It’s designed as a scalable, flexible, and cost-effective security solution suitable for any business size, including SMBs.
Microsoft Defender XDR (Extended Detection and Response) integrates with Sentinel, providing comprehensive threat detection and response capabilities across endpoints, identities, email, and applications.
Unifi Network and Syslog Server
The client has a Unifi network setup, which includes routers and switches. We established a VM in Azure to serve as a Syslog server, collecting logs from these devices and forwarding them to the Sentinel Log Analytics workspace.
Implementation Steps
Setting Up the Syslog Server: We deployed a lightweight Linux VM in Azure (Standard_B1s) and installed
rsyslog
. This server was configured to receive logs from the Unifi devices on the network.1 2 3
sudo apt-get update sudo apt-get install rsyslog sudo nano /etc/rsyslog.conf
Add the following configuration to
/etc/rsyslog.conf
:1 2 3
module(load="imudp") input(type="imudp" port="514") *.* /var/log/unifi.log
Restart the Syslog service:
1
sudo service rsyslog restart
I used this YouTube video from TeachJing to help me:
We also managed the cost of such VM, knowing that outside business hours and the week-end it will be useless to have it running. For that, we choosed Start/Stop VMs v2: https://learn.microsoft.com/en-us/azure/azure-functions/start-stop-vms/overview
Here’s the Azure Marketplace link: https://portal.azure.com/#view/Microsoft_Azure_Marketplace/GalleryItemDetailsBladeNopdl/id/microsoftcorporation1620879115842.startstopv2
Configuring Unifi Devices: Configure the Unifi devices to send their Syslog data to the IP address of the Azure VM. This typically involves accessing the network settings on each device, where you can specify the Syslog server’s IP address and the port (in this case, port 514).
Connecting the VM to Sentinel: Set up the Azure VM to forward logs to an Azure Log Analytics workspace configured with Microsoft Sentinel. This step requires installing the Log Analytics agent on the VM to facilitate the transfer of logs.
1 2
wget https://raw.githubusercontent.com/Microsoft/OMS-Agent-for-Linux/master/installer/scripts/onboard_agent.sh sudo sh onboard_agent.sh -w <Workspace ID> -s <Primary Key>
Creating Data Connectors: Within the Sentinel workspace, create data connectors for various sources:
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Office 365
- Microsoft Defender XDR
- Microsoft Entra ID
- Microsoft Entra ID Protection
This ensures that logs from these sources are ingested into Sentinel, allowing for comprehensive threat detection and response.
Cost Analysis
Data Ingestion and E5 Grants
Microsoft 365 E5 licenses come with a data grant of up to 5 MB per user per day for certain data types, including Azure AD logs, Defender logs, and advanced hunting data. With 30 users, the total grant is 150 MB per day. Given our ingestion rate of around 120 MB per day, this covers all our ingestion needs under the grant, resulting in zero additional Sentinel costs.
Storage Costs
The primary costs outside of Sentinel itself come from storage, particularly Standard SSD Managed Disks, and the use of a virtual network. However, these costs are manageable with careful planning and resource allocation.
Conclusion
By using Microsoft Sentinel in conjunction with Microsoft Defender XDR, we were able to set up a cost-effective and comprehensive security monitoring solution for a small business. Despite the initial perception that Sentinel is only for large enterprises, this PoC demonstrated that it can be effectively used by SMBs, especially when leveraging existing Microsoft 365 E5 licenses.
In the end, the total cost for the client was less than €5 per month, and the only additional expense was for the Unifi log ingestion, which came in at less than €1 a month for Sentinel! This setup not only provides robust security monitoring but also ensures that costs remain extremely affordable. So, next time someone says Microsoft Sentinel isn’t for SMBs, you can point them to this real-world example and say, “Challenge accepted!”