Skip to content

Commit 2872150

Browse files
authored
Merge pull request #104623 from rkarlin/sentinel-rsa-updates
preeti updates new connectors
2 parents 0645746 + 616052e commit 2872150

9 files changed

+387
-23
lines changed

articles/sentinel/TOC.yml

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@
5454
href: connect-azure-atp.md
5555
- name: Azure Security Center
5656
href: connect-azure-security-center.md
57+
- name: Azure Security Center for IoT
58+
href: connect-asc-iot.md
5759
- name: Domain name server
5860
href: connect-dns.md
5961
- name: Microsoft web application firewall
@@ -65,17 +67,23 @@
6567
- name: Connect external solutions
6668
items:
6769
- name: Barracuda
68-
href: connect-barracuda.md
69-
- name: F5 BIG-IP
70-
href: connect-f5-big-ip.md
71-
- name: Syslog
72-
href: connect-syslog.md
73-
- name: Symantec ICDX
74-
href: connect-symantec.md
70+
href: connect-barracuda.md
7571
- name: Barracuda CloudGen Firewall
7672
href: connect-barracuda-cloudgen-firewall.md
7773
- name: Citrix Analytics (Security)
7874
href: connect-citrix-analytics.md
75+
- name: F5 BIG-IP
76+
href: connect-f5-big-ip.md
77+
- name: Forcepoint DLP
78+
href: connect-forcepoint-dlp.md
79+
- name: Squadra Technologies secRMM
80+
href: connect-squadra-secrmm.md
81+
- name: Symantec ICDX
82+
href: connect-symantec.md
83+
- name: Syslog
84+
href: connect-syslog.md
85+
- name: Zimperium Mobile Threat Defense
86+
href: connect-zimperium-mtd.md
7987
- name: CEF-based solutions
8088
href: connect-common-event-format.md
8189
items:
@@ -92,6 +100,8 @@
92100
href: connect-extrahop.md
93101
- name: F5
94102
href: connect-f5.md
103+
- name: Forcepoint products
104+
href: connect-forcepoint-casb-ngfw.md
95105
- name: Fortinet
96106
href: connect-fortinet.md
97107
- name: One Identity Safeguard

articles/sentinel/connect-asc-iot.md

Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: Connect Azure Security Center for IoT to Azure Sentinel | Microsoft Docs
3+
description: Learn how to connect Azure Security Center for IoT data to Azure Sentinel.
4+
services: sentinel
5+
documentationcenter: na
6+
author: rkarlin
7+
manager: rkarlin
8+
editor: ''
9+
ms.service: azure-sentinel
10+
ms.subservice: azure-sentinel
11+
ms.devlang: na
12+
ms.topic: conceptual
13+
ms.tgt_pltfrm: na
14+
ms.workload: na
15+
ms.date: 02/18/2020
16+
ms.author: rkarlin
17+
18+
---
19+
20+
21+
# Connect your data from Azure Security Center for IoT to Azure Sentinel
22+
23+
24+
> [!IMPORTANT]
25+
> The Azure Security Center for IoT data connector is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26+
27+
Use the Azure Security Center for IoT connector to stream all your Azure Security Center for IoT events into Azure Sentinel.
28+
29+
## Prerequisites
30+
31+
- **Read** and **Write** permissions on the Workspace onto which Azure Sentinel is deployed
32+
- **Azure Security Center for IoT** must be **enabled** on your relevant IoT Hub(s)
33+
- **Read** and **Write** permissions on the **Azure IoT Hub** you want to connect
34+
- **Read** and **Write** permissions on the **Azure IoT Hub resource group**
35+
36+
> [!NOTE]
37+
> While you must enable the Azure Security Center **Standard** tier license on your subscription to stream IoT resource alerts to Azure Sentinel, you only need to enable the Azure Security Center **Free** tier license on your subscription to view Azure Security Center for IoT alerts in Azure Sentinel.
38+
39+
## Connect to Azure Security Center for IoT
40+
41+
1. In Azure Sentinel, select **Data connectors** and then click the **Azure Security Center for IoT** tile.
42+
1. From the bottom right pane, click **Open connector page**.
43+
1. Click **Connect**, next to each IoT Hub subscription whose alerts and device alerts you want to stream into Azure Sentinel.
44+
- If Azure Security Center for IoT is not enabled on that Hub, you’ll see an **Enable** warning message. Click the **Enable** link to start the service.
45+
1. You can decide whether you want the alerts from Azure Security Center for IoT to automatically generate incidents in Azure Sentinel. Under **Create incidents**, select **Enable** to enable the default analytic rule to create incidents automatically from alerts generated in the connected security service.This rule can be changed or edited under **Analytics** > **Active** rules.
46+
47+
> [!NOTE]
48+
> It can take some time for the hub list to refresh after making connection changes.
49+
50+
## Log Analytics alert display
51+
52+
To use the relevant schema in Log Analytics to display the Azure Security Center for IoT alerts:
53+
54+
1. Open **Logs** > **SecurityInsights** > **SecurityAlert**, or search for **SecurityAlert**.
55+
2. Filter to see only Azure Security Center for IoT generated alerts using the following kql filter:
56+
57+
```kusto
58+
SecurityAlert | where ProductName == "Azure Security Center for IoT"
59+
```
60+
61+
### Service notes
62+
63+
After connecting an IoT Hub, the hub data is available in Azure Sentinel approximately 15 minutes later.
64+
65+
66+
## Next steps
67+
68+
In this document, you learned how to connect Azure Security Center for IoT data to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
69+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
70+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
71+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.

articles/sentinel/connect-data-sources.md

Lines changed: 21 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,35 +41,46 @@ The following data connection methods are supported by Azure Sentinel:
4141

4242
- **Service to service integration**:<br> Some services are connected natively, such as AWS and Microsoft services, these services leverage the Azure foundation for out-of-the box integration, the following solutions can be connected in a few clicks:
4343
- [Amazon Web Services - CloudTrail](connect-aws.md)
44-
- [Office 365](connect-office-365.md)
45-
- [Azure AD audit logs and sign-ins](connect-azure-active-directory.md)
4644
- [Azure Activity](connect-azure-activity.md)
45+
- [Azure AD audit logs and sign-ins](connect-azure-active-directory.md)
4746
- [Azure AD Identity Protection](connect-azure-ad-Identity-protection.md)
48-
- [Azure Security Center](connect-azure-security-center.md)
49-
- [Azure Information Protection](connect-azure-information-protection.md)
5047
- [Azure Advanced Threat Protection](connect-azure-atp.md)
48+
- [Azure Information Protection](connect-azure-information-protection.md)
49+
- [Azure Security Center](connect-azure-security-center.md)
5150
- [Cloud App Security](connect-cloud-app-security.md)
51+
- [Domain name server](connect-dns.md)
52+
- [Office 365](connect-office-365.md)
53+
- [Microsoft Defender ATP](connect-microsoft-defender-advanced-threat-protection.md)
54+
- [Microsoft web application firewall](connect-microsoft-waf.md)
5255
- [Windows security events](connect-windows-security-events.md)
5356
- [Windows firewall](connect-windows-firewall.md)
57+
- [Windows security events](connect-windows-security-events.md)
5458

5559
- **External solutions via API**: Some data sources are connected using APIs that are provided by the connected data source. Typically, most security technologies provide a set of APIs through which event logs can be retrieved.The APIs connect to Azure Sentinel and gather specific data types and send them to Azure Log Analytics. Appliances connected via API include:
5660
- [Barracuda](connect-barracuda.md)
57-
- [Symantec](connect-symantec.md)
61+
- [Barracuda CloudGen Firewall](connect-barracuda-cloudgen-firewall.md)
5862
- [Citrix Analytics (Security)](connect-citrix-analytics.md)
63+
- [F5 BIG-IP](connect-f5-big-ip.md)
64+
- [Forcepoint DLP](connect-forcepoint-dlp.md)
65+
- [Squadra Technologies secRMM](connect-squadra-secrmm.md)
66+
- [Symantec ICDX](connect-symantec.md)
67+
- [Zimperium](connect-zimperium-mtd.md)
68+
5969

6070
- **External solutions via agent**: Azure Sentinel can be connected to all other data sources that can perform real-time log streaming using the Syslog protocol, via an agent. <br>Most appliances use the Syslog protocol to send event messages that include the log itself and data about the log. The format of the logs varies, but most appliances support the Common Event Format (CEF) based formatting for logs data. <br>The Azure Sentinel agent, which is based on the Log Analytics agent, converts CEF formatted logs into a format that can be ingested by Log Analytics. Depending on the appliance type, the agent is installed either directly on the appliance, or on a dedicated Linux server. The agent for Linux receives events from the Syslog daemon over UDP, but if a Linux machine is expected to collect a high volume of Syslog events, they are sent over TCP from the Syslog daemon to the agent and from there to Log Analytics.
6171
- Firewalls, proxies, and endpoints:
62-
- [F5](connect-f5.md)
6372
- [Check Point](connect-checkpoint.md)
6473
- [Cisco ASA](connect-cisco.md)
74+
- [ExtraHop Reveal(x)](connect-extrahop.md)
75+
- [F5](connect-f5.md)
76+
- [Forcepoint products](connect-forcepoint-casb-ngfw.md)
6577
- [Fortinet](connect-fortinet.md)
66-
- [Palo Alto](connect-paloalto.md)
78+
- [Palo Alto Networks](connect-paloalto.md)
79+
- [One Identity Safeguard](connect-one-identity.md)
6780
- [Other CEF appliances](connect-common-event-format.md)
6881
- [Other Syslog appliances](connect-syslog.md)
69-
- [Barracuda CloudGen Firewall](connect-barracuda-cloudgen-firewall.md)
70-
- [ExtraHop Reveal(x)](connect-extrahop.md)
71-
- [One Identity Safeguard](connect-one-identity.md)
7282
- [Trend Micro Deep Security](connect-trend-micro.md)
83+
- [Zscaler](connect-zscaler.md)
7384
- DLP solutions
7485
- [Threat intelligence providers](connect-threat-intelligence.md)
7586
- [DNS machines](connect-dns.md) - agent installed directly on the DNS machine
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
title: Connect Forcepoint products to Azure Sentinel| Microsoft Docs
3+
description: Learn how to connect Forcepoint products to Azure Sentinel.
4+
services: sentinel
5+
author: rkarlin
6+
editor: ''
7+
8+
ms.service: azure-sentinel
9+
ms.subservice: azure-sentinel
10+
ms.devlang: na
11+
ms.topic: conceptual
12+
ms.tgt_pltfrm: na
13+
ms.workload: na
14+
ms.date: 02/20/2020
15+
ms.author: rkarlin
16+
17+
---
18+
19+
20+
# Connect your Forcepoint products to Azure Sentinel
21+
22+
> [!IMPORTANT]
23+
> The Forcepoint products data connector in Azure Sentinel is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
24+
25+
26+
This article explains how to connect your Forcepoint products to Azure Sentinel.
27+
28+
The Forcepoint data connectors allow you to connect Forcepoint Cloud Access Security Broker and Forcepoint Next Generation Firewall logs with Azure Sentinel. In this way you can automatically export user-defined logs into Azure Sentinel in real time. The connector gives you enriched visibility into user activities recorded by Forcepoint products. It also enables further correlation with data from Azure workloads and other feeds, and improves monitoring capability with Workbooks inside Azure Sentinel.
29+
30+
> [!NOTE]
31+
> Data will be stored in the geographic location of the workspace on which you are running Azure Sentinel.
32+
33+
34+
35+
## Forward Forcepoint product logs to the Syslog agent
36+
37+
​Configure the Forcepoint product to forward Syslog messages in CEF format to your Azure workspace via the Syslog agent.
38+
39+
1. Set up the Forcepoint product to Azure Sentinel integration as described in the following installation guides:
40+
- [Forcepoint CASB Integration Guide](https://frcpnt.com/casb-sentinel)
41+
- [Forcepoint NGFW Integration Guide](https://frcpnt.com/ngfw-sentinel)
42+
43+
2. Search for CommonSecurityLog to use the relevant schema in Log Analytics with DeviceVendor name contains 'Forcepoint'.
44+
45+
3. Continue to [STEP 3: Validate connectivity](connect-cef-verify.md).
46+
47+
48+
49+
## Next steps
50+
51+
In this document, you learned how to connect Forcepoint products to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
52+
53+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
54+
55+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
56+
57+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Connect Forcepoint DLP to Azure Sentinel| Microsoft Docs
3+
description: Learn how to connect Forcepoint DLP to Azure Sentinel.
4+
services: sentinel
5+
author: rkarlin
6+
editor: ''
7+
8+
ms.service: azure-sentinel
9+
ms.subservice: azure-sentinel
10+
ms.devlang: na
11+
ms.topic: conceptual
12+
ms.tgt_pltfrm: na
13+
ms.workload: na
14+
ms.date: 02/20/2020
15+
ms.author: rkarlin
16+
17+
---
18+
19+
20+
# Connect your Forcepoint DLP to Azure Sentinel
21+
22+
> [!IMPORTANT]
23+
> The Forcepoint Data Loss Prevention (DLP) data connector in Azure Sentinel is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
24+
25+
26+
27+
The Forcepoint DLP connector lets you automatically export DLP incident-data into Azure Sentinel. You can use it to get visibility into user activities and data loss incidents. It also enables correlations with data from Azure workloads and other feeds, and improves monitoring capability with Workbooks inside Azure Sentinel.
28+
29+
> [!NOTE]
30+
> Data will be stored in the geographic location of the workspace on which you are running Azure Sentinel.
31+
32+
## Configure and connect Forcepoint DLP
33+
34+
​Configure Forcepoint DLP to forward incident data in JSON format to your Azure workspace via REST API as explained in the [Forcepoint DLP Integration Guide](https://frcpnt.com/dlp-sentinel).
35+
36+
37+
## Find your data
38+
39+
After the Forcepoint DLP connector is set up, the data appears in Log Analytics under CustomLogs **ForcepointDLPEvents_CL**.
40+
41+
42+
To use the relevant schema in Log Analytics for Forcepoint DLP, search for **ForcepointDLPEvents_CL**.
43+
44+
45+
## Validate connectivity
46+
47+
It may take upwards of 20 minutes until your logs start to appear in Log Analytics.
48+
49+
## Next steps
50+
51+
In this document, you learned how to connect Forcepoint DLP to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
52+
53+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
54+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
55+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: Connect Squadra Technologies secRMM data to Azure Sentinel| Microsoft Docs
3+
description: Learn how to connect Squadra Technologies secRMM data to Azure Sentinel.
4+
services: sentinel
5+
author: rkarlin
6+
editor: ''
7+
8+
ms.service: azure-sentinel
9+
ms.subservice: azure-sentinel
10+
ms.devlang: na
11+
ms.topic: conceptual
12+
ms.tgt_pltfrm: na
13+
ms.workload: na
14+
ms.date: 02/20/2020
15+
ms.author: rkarlin
16+
17+
---
18+
19+
# Connect your Squadra Technologies secRMM data to Azure Sentinel
20+
21+
> [!IMPORTANT]
22+
> The Squadra Technologies Security Removable Media Manager (secRMM) data connector in Azure Sentinel is currently in public preview.
23+
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
26+
27+
The Squadra Technologies secRMM connector allows you to easily connect your Squadra Technologies secRMM security solution logs with Azure Sentinel. It lets you view dashboards, create custom alerts, and improve investigation. This connector gives you insights into USB removable storage events. Integration between Squadra Technologies secRMM and Azure Sentinel makes use of REST API.
28+
29+
30+
> [!NOTE]
31+
> Data will be stored in the geographic location of the workspace on which you are running Azure Sentinel.
32+
33+
## Configure and connect Squadra Technologies secRMM
34+
35+
Squadra Technologies secRMM can integrate and export logs directly to Azure Sentinel.
36+
1. In the Azure Sentinel portal, click Data connectors and select Squadra Technologies secRMM and then Open connector page.
37+
38+
2. Follow the steps outlined in the [Squadra Technologies onboarding guide for Azure Sentinel](http://www.squadratechnologies.com/StaticContent/ProductDownload/secRMM/9.9.0.0/secRMMAzureSentinelAdministratorGuide.pdf) to get Squadra secRMM data in Azure Sentinel.
39+
40+
41+
## Find your data
42+
43+
After a successful connection is established, the data appears in Log Analytics under CustomLogs secRMM_CL.
44+
To use the relevant schema in Log Analytics for the Squadra Technologies secRMM, search for secRMM_CL.
45+
46+
## Validate connectivity
47+
It may take upwards of 20 minutes until your logs start to appear in Log Analytics.
48+
49+
50+
## Next steps
51+
In this document, you learned how to connect Squadra Technologies secRMM to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
52+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
53+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
54+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
55+

0 commit comments

Comments
 (0)