You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**High severity findings summarized by activity type**
35
+
36
+
```kusto
37
+
AWSGuardDuty
38
+
39
+
| where Severity > 7
40
+
41
+
| summarize count() by ActivityType
42
+
```
43
+
44
+
**Top 10 rejected actions of type IPv4**
45
+
46
+
```kusto
47
+
AWSVPCFlow
48
+
49
+
| where Action == "REJECT"
50
+
51
+
| where Type == "IPv4"
52
+
53
+
| take 10
54
+
```
55
+
56
+
**User creation events summarized by region**
57
+
58
+
```kusto
59
+
AWSCloudTrail
60
+
61
+
| where EventName == "CreateUser"
62
+
63
+
| summarize count() by AWSRegion
64
+
```
65
+
66
+
67
+
68
+
## Prerequisites
69
+
70
+
To integrate with Amazon Web Services S3 make sure you have:
71
+
72
+
-**Environment**: you must have the following AWS resources defined and configured: S3, Simple Queue Service (SQS), IAM roles and permissions policies, and the AWS services whose logs you want to collect.
73
+
74
+
75
+
## Vendor installation instructions
76
+
77
+
1. Set up your AWS environment
78
+
79
+
There are two options for setting up your AWS environment to send logs from an S3 bucket to your Log Analytics Workspace:
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/api-protection.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "API Protection connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector API Protection to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 10/28/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
@@ -72,7 +72,7 @@ Copy the values shown below and save them for configuration of the API log forwa
72
72
73
73
Step 3: Install the 42Crunch protection and log forwarder
74
74
75
-
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the [42Crunch repository](https://hub.docker.com/u/42crunch). The exact installation will depend on your environment, consult the [42Crunch protection documentation](https://docs.42crunch.com/latest/content/concepts/api_firewall_deployment_architecture.htm) for full details. Two common installation scenarios are described below:
75
+
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the [42Crunch repository](https://hub.docker.com/u/42crunch). The exact installation depends on your environment, consult the [42Crunch protection documentation](https://docs.42crunch.com/latest/content/concepts/api_firewall_deployment_architecture.htm) for full details. Two common installation scenarios are described below:
76
76
77
77
78
78
Installation via Docker Compose
@@ -89,11 +89,11 @@ In order to test the data ingestion the user should deploy the sample *httpbin*
89
89
90
90
4.1 Install the sample
91
91
92
-
The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which will install the httpbin API server, the 42Crunch API protection and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
92
+
The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which installs the httpbin API server, the 42Crunch API protection, and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
93
93
94
94
4.2 Run the sample
95
95
96
-
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the *localhost* at port 8080 using Postman, curl, or similar. You should see a mixture of passing and failing API calls.
96
+
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the *localhost* at port 8080 using curl, or similar. You should see a mixture of passing and failing API calls.
description: "Learn how to install the connector Atlassian Confluence Audit (using Azure Functions) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 10/15/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
@@ -20,7 +20,7 @@ This is autogenerated content. For changes, contact the solution provider.
|**Azure function app code**|https://aka.ms/sentinel-confluenceauditapi-functionapp|
23
+
|**Azure function app code**|[https://aka.ms/sentinel-confluenceauditapi-functionapp](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip)|
@@ -89,7 +89,7 @@ Use the following step-by-step instructions to deploy the Confluence Audit data
89
89
90
90
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
91
91
92
-
1. Download the [Azure Function App](https://aka.ms/sentinel-confluenceauditapi-functionapp) file. Extract archive to your local development computer.
92
+
1. Download the [Azure Function App](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) file. Extract archive to your local development computer.
93
93
2. Start VS Code. Choose File in the main menu and select Open Folder.
94
94
3. Select the top level folder from extracted files.
95
95
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/bitglass.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Bitglass (using Azure Functions) connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector Bitglass (using Azure Functions) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 10/15/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
@@ -63,7 +63,7 @@ To integrate with Bitglass (using Azure Functions) make sure you have:
63
63
64
64
Follow the instructions to obtain the credentials.
65
65
66
-
1. Please contact Bitglass [support](https://www.forcepoint.com/company/contact-us) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
66
+
1. Please contact Bitglass [support](https://pages.bitglass.com/Contact.html) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
67
67
2. Save credentials for using in the data connector.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/cohesity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Cohesity (using Azure Functions) connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector Cohesity (using Azure Functions) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 04/26/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
@@ -50,7 +50,7 @@ To integrate with Cohesity (using Azure Functions) make sure you have:
50
50
> This connector uses Azure Functions that connect to the Azure Blob Storage and KeyVault. This might result in additional costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/), [Azure Blob Storage pricing page](https://azure.microsoft.com/pricing/details/storage/blobs/) and [Azure KeyVault pricing page](https://azure.microsoft.com/pricing/details/key-vault/) for details.
51
51
52
52
53
-
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
53
+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Functions App.
54
54
55
55
56
56
**STEP 1 - Get a Cohesity DataHawk API key (see troubleshooting [instruction 1](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CohesitySecurity/Data%20Connectors/Helios2Sentinel/IncidentProducer))**
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/dataminr-pulse-alerts-data-connector.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Dataminr Pulse Alerts Data Connector (using Azure Functions) connector f
3
3
description: "Learn how to install the connector Dataminr Pulse Alerts Data Connector (using Azure Functions) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 10/28/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
@@ -223,7 +223,7 @@ If you're already signed in, go to the next step.
223
223
224
224
2) To add integration settings in Dataminr RTAP using the function URL
225
225
226
-
1. Open any API request tool like Postman.
226
+
1. Open any API request tool.
227
227
2. Click on '+' to create a new request.
228
228
3. Select HTTP request method as **'POST'**.
229
229
4. Enter the url prepapred in **point 1)**, in the request URL part.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/forescout.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Forescout connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector Forescout to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 04/26/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
@@ -41,7 +41,7 @@ ForescoutEvent
41
41
42
42
43
43
> [!NOTE]
44
-
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://aka.ms/sentinel-forescout-parser) which is deployed with the Microsoft Sentinel Solution.
44
+
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Forescout%20(Legacy)/Parsers/ForescoutEvent.yaml) which is deployed with the Microsoft Sentinel Solution.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/microsoft-exchange-logs-and-events.md
+14-10Lines changed: 14 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,23 +3,23 @@ title: "Microsoft Exchange Logs and Events connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector Microsoft Exchange Logs and Events to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 11/20/2024
6
+
ms.date: 04/26/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
10
10
---
11
11
12
12
# Microsoft Exchange Logs and Events connector for Microsoft Sentinel
13
13
14
-
[Option 2] - Using Azure Monitor Agent - You can stream all Exchange Security & Application Event logs from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to create custom alerts, and improve investigation.
14
+
You can stream all Exchange Audit events, IIS Logs, HTTP Proxy logs and Security Event logs from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to view dashboards, create custom alerts, and improve investigation. This is used by Microsoft Exchange Security Workbooks to provide security insights of your On-Premises Exchange environment
15
15
16
16
This is autogenerated content. For changes, contact the solution provider.
@@ -29,7 +29,7 @@ This is autogenerated content. For changes, contact the solution provider.
29
29
30
30
```kusto
31
31
Event
32
-
| where EventLog == 'Application'
32
+
| where EventLog == 'MSExchange Management'
33
33
| sort by TimeGenerated
34
34
```
35
35
@@ -39,26 +39,30 @@ Event
39
39
40
40
To integrate with Microsoft Exchange Logs and Events make sure you have:
41
41
42
-
-**Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
43
-
-**Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)
42
+
-****: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
44
43
45
44
46
45
## Vendor installation instructions
47
46
48
47
49
48
> [!NOTE]
50
-
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independant for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
49
+
> This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps to create the Kusto Functions alias : [**ExchangeAdminAuditLogs**](https://aka.ms/sentinel-ESI-ExchangeCollector-ExchangeAdminAuditLogs-parser)
50
+
51
51
52
-
>This Data Connector is the **option 2** of the wiki.
52
+
53
+
> [!NOTE]
54
+
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independant for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
53
55
54
56
1. Download and install the agents needed to collect logs for Microsoft Sentinel
55
57
56
58
Type of servers (Exchange Servers, Domain Controllers linked to Exchange Servers or all Domain Controllers) depends on the option you want to deploy.
57
59
58
60
59
-
2.[Option 2] Security/Application/System logs of Exchange Servers
61
+
2. Deploy log injestion following choosed options
62
+
63
+
64
+
60
65
61
-
The Security/Application/System logs of Exchange Servers are collected using Data Collection Rules (DCR).
0 commit comments