Skip to content

Commit 13d2f3f

Browse files
authored
Merge pull request #217320 from oshezaf/asim/update-parser-list-Nov-2022
asim/update-parser-list-Nov-2022
2 parents 3089e39 + 1dd5b77 commit 13d2f3f

File tree

1 file changed

+20
-12
lines changed

1 file changed

+20
-12
lines changed

articles/sentinel/normalization-parsers-list.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -39,15 +39,14 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific DNS p
3939

4040
| **Source** | **Notes** | **Parser**
4141
| --- | --------------------------- | ---------- |
42-
| **Normalized DNS Logs** | Any event normalized at ingestion to the `ASimDnsActivityLogs` table. | `_Im_Dns_Native` |
42+
| **Normalized DNS Logs** | Any event normalized at ingestion to the `ASimDnsActivityLogs` table. The DNS connector for the Azure Monitor Agent uses the `ASimDnsActivityLogs` table and is supported by the `_Im_Dns_Native` parser. | `_Im_Dns_Native` |
4343
| **Azure Firewall** | | `_Im_Dns_AzureFirewallVxx` |
4444
| **Cisco Umbrella** | | `_Im_Dns_CiscoUmbrellaVxx` |
4545
| **Corelight Zeek** | | `_Im_Dns_CorelightZeekVxx` |
4646
| **GCP DNS** | | `_Im_Dns_GcpVxx` |
4747
| - **Infoblox NIOS**<br> - **BIND**<br> - **BlucCat** | The same parsers support multiple sources. | `_Im_Dns_InfobloxNIOSVxx` |
48-
| **Microsoft DNS Server** | Collected by the DNS connector and the Log Analytics Agent. | `_Im_Dns_MicrosoftOMSVxx` |
49-
| **Microsoft DNS Server** | Collected by NXlog. | `_Im_Dns_MicrosoftNXlogVxx` |
50-
| **Sysmon for Windows** (event 22) | Collected by the Log Analytics Agent<br> or the Azure Monitor Agent,<br>supporting both the<br> `Event` and `WindowsEvent` tables. | `_Im_Dns_MicrosoftSysmonVxx` |
48+
| **Microsoft DNS Server** | Collected using:<br>- DNS connector for the Log Analytics Agent<br>- DNS connector for the Azure Monitor Agent<br>- NXlog | <br>`_Im_Dns_MicrosoftOMSVxx`<br>See Normalized DNS logs.<br>`_Im_Dns_MicrosoftNXlogVxx` |
49+
| **Sysmon for Windows** (event 22) | Collected using:<br>- the Log Analytics Agent<br>- the Azure Monitor Agent<br><br>For both agents, both collecting to the<br> `Event` and `WindowsEvent` tables are supported. | `_Im_Dns_MicrosoftSysmonVxx` |
5150
| **Vectra AI** | |`_Im_Dns_VectraIAVxx` |
5251
| **Zscaler ZIA** | | `_Im_Dns_ZscalerZIAVxx` |
5352
||||
@@ -58,9 +57,16 @@ Deploy the workspace deployed parsers from the [Microsoft Sentinel GitHub reposi
5857

5958
Microsoft Sentinel provides the following out-of-the-box, product-specific File Activity parsers:
6059

61-
- **Sysmon file activity events** (Events 11, 23, and 26), collected using the Log Analytics Agent or Azure Monitor Agent.
60+
- **Windows file activity**
61+
- Reported by **Windows (event 4663)**:
62+
- Collected using the Log Analytics Agent based Security Events connector to the SecurityEvent table.
63+
- Collected using the Azure Monitor Agent based Security Events connector to the SecurityEvent table.
64+
- Collected using the Azure Monitor Agent based WEF (Windows Event Forwarding) connector to the WindowsEvent table.
65+
- Reported using **Sysmon file activity events** (Events 11, 23, and 26):
66+
- Collected using the Log Analytics Agent to the Event table.
67+
- Collected using the Azure Monitor Agent based WEF (Windows Event Forwarding) connector to the WindowsEvent table.
68+
- Reported by **Microsoft 365 Defender for Endpoint**, collected using the Microsoft 365 Defender connector.
6269
- **Microsoft Office 365 SharePoint and OneDrive events**, collected using the Office Activity connector.
63-
- **Microsoft 365 Defender for Endpoint file events**
6470
- **Azure Storage**, including Blob, File, Queue, and Table Storage.
6571

6672
Deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimFileEvent).
@@ -71,23 +77,25 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific Netwo
7177

7278
| **Source** | **Notes** | **Parser** |
7379
| --- | --------------------------- | ------------------------------ |
80+
| **Normalized Network Session Logs** | Any event normalized at ingestion to the `ASimNetworkSessionLogs` table. The Firewall connector for the Azure Monitor Agent uses the `ASimNetworkSessionLogs` table and is supported by the `_Im_NetworkSession_Native` parser. | `_Im_NetworkSession_Native` |
7481
| **AppGate SDP** | IP connection logs collected using Syslog. | `_Im_NetworkSession_AppGateSDPVxx` |
7582
| **AWS VPC logs** | Collected using the AWS S3 connector. | `_Im_NetworkSession_AWSVPCVxx` |
7683
| **Azure Firewall logs** | |`_Im_NetworkSession_AzureFirewallVxx`|
7784
| **Azure Monitor VMConnection** | Collected as part of the Azure Monitor [VM Insights solution](../azure-monitor/vm/vminsights-overview.md). | `_Im_NetworkSession_VMConnectionVxx` |
7885
| **Azure Network Security Groups (NSG) logs** | Collected as part of the Azure Monitor [VM Insights solution](../azure-monitor/vm/vminsights-overview.md). | `_Im_NetworkSession_AzureNSGVxx` |
79-
| **Checkpoint Firewall-1** | Collected using CEF. | `_Im_NetworkSession_CheckPointFirewallVxx`* |
80-
| **Cisco ASA** | Collected using the CEF connector. | `_Im_NetworkSession_CiscoASAVxx`* |
86+
| **Checkpoint Firewall-1** | Collected using CEF. | `_Im_NetworkSession_CheckPointFirewallVxx` |
87+
| **Cisco ASA** | Collected using the CEF connector. | `_Im_NetworkSession_CiscoASAVxx` |
8188
| **Cisco Meraki** | Collected using the Cisco Meraki API connector. | `_Im_NetworkSession_CiscoMerakiVxx` |
82-
| **Corelight Zeek** | Collected using the Corelight Zeek connector. | `_im_NetworkSession_CorelightZeekVxx`* |
89+
| **Corelight Zeek** | Collected using the Corelight Zeek connector. | `_im_NetworkSession_CorelightZeekVxx` |
8390
| **Fortigate FortiOS** | IP connection logs collected using Syslog. | `_Im_NetworkSession_FortinetFortiGateVxx` |
8491
| **Microsoft 365 Defender for Endpoint** | | `_Im_NetworkSession_Microsoft365DefenderVxx`|
85-
| **Microsoft Defender for IoT - Endpoint** | | `_Im_NetworkSession_MD4IoTVxx` |
92+
| **Microsoft Defender for IoT micro agent** | | `_Im_NetworkSession_MD4IoTAgentVxx` |
93+
| **Microsoft Defender for IoT sensor** | | `_Im_NetworkSession_MD4IoTSensorVxx` * |
8694
| **Palo Alto PanOS traffic logs** | Collected using CEF. | `_Im_NetworkSession_PaloAltoCEFVxx` |
8795
| **Sysmon for Linux** (event 3) | Collected using the Log Analytics Agent<br> or the Azure Monitor Agent. |`_Im_NetworkSession_LinuxSysmonVxx` |
8896
| **Vectra AI** | | `_Im_NetworkSession_VectraIAVxx` |
8997
| **Windows Firewall logs** | Collected as Windows events using the Log Analytics Agent (Event table) or Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
90-
| **Watchguard FirewareOW** | Collected using Syslog. | `_Im_NetworkSession_WatchGuardFirewareOSVxx`* |
98+
| **Watchguard FirewareOW** | Collected using Syslog. | `_Im_NetworkSession_WatchGuardFirewareOSVxx` |
9199
| **Zscaler ZIA firewall logs** | Collected using CEF. | `_Im_NetworkSessionZscalerZIAVxx` |
92100

93101
Note that the parsers marked with (*) are available for deployment from GitHub and are not yet built into workspaces.
@@ -122,7 +130,7 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific Web S
122130

123131
| **Source** | **Notes** | **Parser** |
124132
| --- | --------------------------- | ------------------------------ |
125-
|**Squid Proxy** | | `_Im_WebSession_SquidProxyVxx` |
133+
| **Squid Proxy** | | `_Im_WebSession_SquidProxyVxx` |
126134
| **Vectra AI Streams** | | `_Im_WebSession_VectraAIVxx` |
127135
| **Zscaler ZIA** | Collected using CEF | `_Im_WebSessionZscalerZIAVxx` |
128136

0 commit comments

Comments
 (0)