You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"title": "Google Cloud Platform IAM (via Codeless Connector Platform) (Preview)",
11
-
"publisher": "Microsoft",
12
-
"descriptionMarkdown": "The Google Cloud Platform IAM data connector provides the capability to ingest the Audit logs relating to Identity and Access Management (IAM) activities within Google Cloud into Microsoft Sentinel using the Google IAM API. Refer to [GCP IAM API](https://cloud.google.com/iam/docs/reference/rest) documentation for more information.",
13
-
"graphQueriesTableName": "GCP_IAMV2_CL",
14
-
"graphQueries": [
15
-
{
16
-
"metricName": "Total incident logs received",
17
-
"legend": "GCP IAM logs",
18
-
"baseQuery": "{{graphQueriesTableName}}"
19
-
}
20
-
],
21
-
"sampleQueries": [
22
-
{
23
-
"description": "Get sample of GcpIAM logs",
24
-
"query": "{{graphQueriesTableName}}\n| take 10"
25
-
}
26
-
],
27
-
"dataTypes": [
28
-
{
29
-
"name": "{{graphQueriesTableName}}",
30
-
"lastDataReceivedQuery": "{{graphQueriesTableName}}\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)"
"permissionsDisplayText": "Read and Write permissions are required.",
47
-
"providerDisplayName": "Workspace",
48
-
"scope": "Workspace",
49
-
"requiredPermissions": {
50
-
"read": true,
51
-
"write": true,
52
-
"delete": true,
53
-
"action": false
54
-
}
55
-
}
56
-
]
57
-
},
58
-
"instructionSteps": [
59
-
{
60
-
"instructions": [
61
-
{
62
-
"type": "Markdown",
63
-
"parameters": {
64
-
"content": ">**NOTE:** If both Azure Function and CCP connector are running parallelly, duplicate data is populated in the tables."
65
-
}
66
-
},
67
-
{
68
-
"type": "MarkdownControlEnvBased",
69
-
"parameters": {
70
-
"prodScript": "#### 1. Setup the GCP environment \n Ensure to have the following resources from the GCP Console:\n Project ID, Project Name, GCP Subscription name for the project, Workload Identity Pool ID, Workspace Identity Provider ID, and a Service Account to establish the connection.\n For more information, refer the [Connector tutorial](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleCloudPlatformIAM/Data%20Connectors/README.md) for log setup and authentication setup tutorial.\n Log set up script: [Click Here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation/GCPIAMCCPLogsSetup)\nAuthentication set up script: [Click here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation/GCPInitialAuthenticationSetup)",
71
-
"govScript": "#### 1. Setup the GCP environment \n Ensure to have the following resources from the GCP Console:\n Project ID, Project Name, GCP Subscription name for the project, Workload Identity Pool ID, Workspace Identity Provider ID, and a Service Account to establish the connection.\n For more information, refer the [Connector tutorial](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleCloudPlatformIAM/Data%20Connectors/README.md) for log setup and authentication setup tutorial.\n Log set up script: [Click Here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation_gov/GCPIAMCCPLogsSetup)\nAuthentication set up script: [Click here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation_gov/GCPInitialAuthenticationSetupGov)"
72
-
}
73
-
},
74
-
{
75
-
"type": "CopyableLabel",
76
-
"parameters": {
77
-
"label": "Tenant ID: A unique identifier that is used as an input in the Terraform configuration within a GCP environment.",
78
-
"fillWith": [
79
-
"TenantId"
80
-
],
81
-
"name": "TenantId",
82
-
"disabled": true
83
-
}
84
-
},
85
-
{
86
-
"type": "Markdown",
87
-
"parameters": {
88
-
"content": "#### 2. To enable IAM logs \n In your GCP account, navigate to the IAM section. From there, you can either create a new user or modify an existing user's role that you want to monitor. Be sure to save your changes..\n\nFor more information: [Link to documentation](https://cloud.google.com/assured-workloads/docs/iam-roles?hl=en)"
89
-
}
90
-
},
91
-
{
92
-
"type": "Markdown",
93
-
"parameters": {
94
-
"content": "#### 3. Connect new collectors \n To enable GCPIAM Logs for Microsoft Sentinel, click the Add new collector button, fill the required information in the context pane and click on Connect."
"title": "Google Cloud Platform IAM (via Codeless Connector Framework) (Preview)",
11
+
"publisher": "Microsoft",
12
+
"descriptionMarkdown": "The Google Cloud Platform IAM data connector provides the capability to ingest the Audit logs relating to Identity and Access Management (IAM) activities within Google Cloud into Microsoft Sentinel using the Google IAM API. Refer to [GCP IAM API](https://cloud.google.com/iam/docs/reference/rest) documentation for more information.",
13
+
"graphQueriesTableName": "GCPIAM",
14
+
"graphQueries": [
15
+
{
16
+
"metricName": "Total incident logs received",
17
+
"legend": "GCP IAM logs",
18
+
"baseQuery": "{{graphQueriesTableName}}"
19
+
}
20
+
],
21
+
"sampleQueries": [
22
+
{
23
+
"description": "Get sample of GcpIAM logs",
24
+
"query": "{{graphQueriesTableName}}\n| take 10"
25
+
}
26
+
],
27
+
"dataTypes": [
28
+
{
29
+
"name": "{{graphQueriesTableName}}",
30
+
"lastDataReceivedQuery": "{{graphQueriesTableName}}\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)"
"permissionsDisplayText": "Read and Write permissions are required.",
47
+
"providerDisplayName": "Workspace",
48
+
"scope": "Workspace",
49
+
"requiredPermissions": {
50
+
"read": true,
51
+
"write": true,
52
+
"delete": true,
53
+
"action": false
54
+
}
55
+
}
56
+
]
100
57
},
101
-
{
102
-
"type": "GCPContextPane",
103
-
"parameters": {}
104
-
}
105
-
],
106
-
"title": "Connect GCP IAM to Microsoft Sentinel"
58
+
"instructionSteps": [
59
+
{
60
+
"instructions": [
61
+
{
62
+
"type": "Markdown",
63
+
"parameters": {
64
+
"content": ">**NOTE:** If both Azure Function and CCP connector are running parallelly, duplicate data is populated in the tables."
65
+
}
66
+
},
67
+
{
68
+
"type": "MarkdownControlEnvBased",
69
+
"parameters": {
70
+
"prodScript": "#### 1. Setup the GCP environment \n Ensure to have the following resources from the GCP Console:\n Project ID, Project Name, GCP Subscription name for the project, Workload Identity Pool ID, Workspace Identity Provider ID, and a Service Account to establish the connection.\n For more information, refer the [Connector tutorial](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleCloudPlatformIAM/Data%20Connectors/README.md) for log setup and authentication setup tutorial.\n Log set up script: [Click Here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation/GCPIAMCCPLogsSetup)\nAuthentication set up script: [Click here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation/GCPInitialAuthenticationSetup)",
71
+
"govScript": "#### 1. Setup the GCP environment \n Ensure to have the following resources from the GCP Console:\n Project ID, Project Name, GCP Subscription name for the project, Workload Identity Pool ID, Workspace Identity Provider ID, and a Service Account to establish the connection.\n For more information, refer the [Connector tutorial](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleCloudPlatformIAM/Data%20Connectors/README.md) for log setup and authentication setup tutorial.\n Log set up script: [Click Here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation_gov/GCPIAMCCPLogsSetup)\nAuthentication set up script: [Click here](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/GCP/Terraform/sentinel_resources_creation_gov/GCPInitialAuthenticationSetupGov)"
72
+
}
73
+
},
74
+
{
75
+
"type": "CopyableLabel",
76
+
"parameters": {
77
+
"label": "Tenant ID: A unique identifier that is used as an input in the Terraform configuration within a GCP environment.",
78
+
"fillWith": [
79
+
"TenantId"
80
+
],
81
+
"name": "TenantId",
82
+
"disabled": true
83
+
}
84
+
},
85
+
{
86
+
"type": "Markdown",
87
+
"parameters": {
88
+
"content": "#### 2. To enable IAM logs \n In your GCP account, navigate to the IAM section. From there, you can either create a new user or modify an existing user's role that you want to monitor. Be sure to save your changes..\n\nFor more information: [Link to documentation](https://cloud.google.com/assured-workloads/docs/iam-roles?hl=en)"
89
+
}
90
+
},
91
+
{
92
+
"type": "Markdown",
93
+
"parameters": {
94
+
"content": "#### 3. Connect new collectors \n To enable GCPIAM Logs for Microsoft Sentinel, click the Add new collector button, fill the required information in the context pane and click on Connect."
0 commit comments