Skip to content

Commit 2d3435b

Browse files
committed
Sentinel auto-gen data connectors - add 3 new DCs
1 parent 51affda commit 2d3435b

File tree

5 files changed

+297
-2
lines changed

5 files changed

+297
-2
lines changed

articles/sentinel/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -291,6 +291,8 @@
291291
href: data-connectors/aruba-clearpass.md
292292
- name: Atlassian Confluence Audit (using Azure Function)
293293
href: data-connectors/atlassian-confluence-audit-using-azure-function.md
294+
- name: Atlassian Jira Audit (using Azure Function)
295+
href: data-connectors/atlassian-jira-audit-using-azure-function.md
294296
- name: Auth0 Access Management (using Azure Function)
295297
href: data-connectors/auth0-access-management-using-azure-function.md
296298
- name: Automated Logic WebCTRL
@@ -351,6 +353,8 @@
351353
href: data-connectors/cisco-duo-security-using-azure-function.md
352354
- name: Cisco Firepower eStreamer
353355
href: data-connectors/cisco-firepower-estreamer.md
356+
- name: Cisco Identity Services Engine
357+
href: data-connectors/cisco-identity-services-engine.md
354358
- name: Cisco Meraki
355359
href: data-connectors/cisco-meraki.md
356360
- name: Cisco Secure Email Gateway
@@ -481,6 +485,8 @@
481485
href: data-connectors/imperva-cloud-waf-using-azure-function.md
482486
- name: Infoblox Cloud Data Connector
483487
href: data-connectors/infoblox-cloud-data-connector.md
488+
- name: Infoblox NIOS
489+
href: data-connectors/infoblox-nios.md
484490
- name: InfoSecGlobal Data Connector
485491
href: data-connectors/infosecglobal-data-connector.md
486492
- name: ISC Bind

articles/sentinel/data-connectors-reference.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Find your Microsoft Sentinel data connector | Microsoft Docs
33
description: Learn about specific configuration steps for Microsoft Sentinel data connectors.
44
author: cwatson-cat
55
ms.topic: reference
6-
ms.date: 03/25/2023
6+
ms.date: 04/18/2023
77
ms.author: cwatson
88
---
99

@@ -84,6 +84,7 @@ Data connectors are available as part of the following offerings:
8484
## Atlassian
8585

8686
- [Atlassian Confluence Audit (using Azure Function)](data-connectors/atlassian-confluence-audit-using-azure-function.md)
87+
- [Atlassian Jira Audit (using Azure Function)](data-connectors/atlassian-jira-audit-using-azure-function.md)
8788

8889
## Auth0
8990

@@ -119,6 +120,7 @@ Data connectors are available as part of the following offerings:
119120
- [Cisco ASA](data-connectors/cisco-asa.md)
120121
- [Cisco ASA/FTD via AMA (Preview)](data-connectors/cisco-asa-ftd-via-ama.md)
121122
- [Cisco Duo Security (using Azure Function)](data-connectors/cisco-duo-security-using-azure-function.md)
123+
- [Cisco Identity Services Engine](data-connectors/cisco-identity-services-engine.md)
122124
- [Cisco Meraki](data-connectors/cisco-meraki.md)
123125
- [Cisco Secure Email Gateway](data-connectors/cisco-secure-email-gateway.md)
124126
- [Cisco Secure Endpoint (AMP) (using Azure Function)](data-connectors/cisco-secure-endpoint-amp-using-azure-function.md)
@@ -226,7 +228,7 @@ Data connectors are available as part of the following offerings:
226228

227229
- [ExtraHop Reveal(x)](data-connectors/extrahop-reveal-x.md)
228230

229-
## F5 Networks
231+
## F5, Inc.
230232

231233
- [F5 BIG-IP](data-connectors/f5-big-ip.md)
232234
- [F5 Networks](data-connectors/f5-networks.md)
@@ -284,6 +286,10 @@ Data connectors are available as part of the following offerings:
284286

285287
- [Imperva Cloud WAF (using Azure Function)](data-connectors/imperva-cloud-waf-using-azure-function.md)
286288

289+
## Infoblox
290+
291+
- [Infoblox NIOS](data-connectors/infoblox-nios.md)
292+
287293
## Infoblox Inc.
288294

289295
- [Infoblox Cloud Data Connector](data-connectors/infoblox-cloud-data-connector.md)
Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
---
2+
title: "Atlassian Jira Audit (using Azure Function) connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Atlassian Jira Audit (using Azure Function) to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 04/18/2023
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
---
10+
11+
# Atlassian Jira Audit (using Azure Function) connector for Microsoft Sentinel
12+
13+
The [Atlassian Jira](https://www.atlassian.com/software/jira) Audit data connector provides the capability to ingest [Jira Audit Records](https://support.atlassian.com/jira-cloud-administration/docs/audit-activities-in-jira-applications/) events into Microsoft Sentinel through the REST API. Refer to [API documentation](https://developer.atlassian.com/cloud/jira/platform/rest/v3/api-group-audit-records/) for more information. The connector provides ability to get events which helps to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more.
14+
15+
## Connector attributes
16+
17+
| Connector attribute | Description |
18+
| --- | --- |
19+
| **Application settings** | JiraUsername<br/>JiraAccessToken<br/>JiraHomeSiteName<br/>WorkspaceID<br/>WorkspaceKey<br/>logAnalyticsUri (optional) |
20+
| **Azure function app code** | https://aka.ms/sentinel-jiraauditapi-functionapp |
21+
| **Kusto function alias** | JiraAudit |
22+
| **Kusto function url** | https://aka.ms/sentinel-jiraauditapi-parser |
23+
| **Log Analytics table(s)** | Jira_Audit_CL<br/> |
24+
| **Data collection rules support** | Not currently supported |
25+
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
26+
27+
## Query samples
28+
29+
**Jira Audit Events - All Activities**
30+
```kusto
31+
JiraAudit
32+
33+
| sort by TimeGenerated desc
34+
```
35+
36+
37+
38+
## Prerequisites
39+
40+
To integrate with Atlassian Jira Audit (using Azure Function) make sure you have:
41+
42+
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](https://learn.microsoft.com/azure/azure-functions/).
43+
- **REST API Credentials/permissions**: **JiraAccessToken**, **JiraUsername** is required for REST API. [See the documentation to learn more about API](https://developer.atlassian.com/cloud/jira/platform/rest/v3/api-group-audit-records/). Check all [requirements and follow the instructions](https://developer.atlassian.com/cloud/jira/platform/rest/v3/intro/#authentication) for obtaining credentials.
44+
45+
46+
## Vendor installation instructions
47+
48+
49+
> [!NOTE]
50+
> This connector uses Azure Functions to connect to the Jira REST API to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
51+
52+
53+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](https://learn.microsoft.com/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
54+
55+
56+
> [!NOTE]
57+
> This data connector depends on a parser based on a Kusto Function to work as expected. [Follow these steps](https://aka.ms/sentinel-jiraauditapi-parser) to create the Kusto functions alias, **JiraAudit**
58+
59+
60+
**STEP 1 - Configuration steps for the Jira API**
61+
62+
[Follow the instructions](https://developer.atlassian.com/cloud/jira/platform/rest/v3/intro/#authentication) to obtain the credentials.
63+
64+
65+
66+
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
67+
68+
>**IMPORTANT:** Before deploying the Workspace data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
69+
70+
71+
72+
Option 1 - Azure Resource Manager (ARM) Template
73+
74+
Use this method for automated deployment of the Jira Audit data connector using an ARM Tempate.
75+
76+
1. Click the **Deploy to Azure** button below.
77+
78+
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentineljiraauditazuredeploy)
79+
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
80+
> **NOTE:** Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
81+
3. Enter the **JiraAccessToken**, **JiraUsername**, **JiraHomeSiteName** (short site name part, as example HOMESITENAME from https://HOMESITENAME.atlassian.net) and deploy.
82+
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
83+
5. Click **Purchase** to deploy.
84+
85+
Option 2 - Manual Deployment of Azure Functions
86+
87+
Use the following step-by-step instructions to deploy the Jira Audit data connector manually with Azure Functions (Deployment via Visual Studio Code).
88+
89+
90+
**1. Deploy a Function App**
91+
92+
> **NOTE:** You will need to [prepare VS code](https://learn.microsoft.com/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
93+
94+
1. Download the [Azure Function App](https://aka.ms/sentinel-jiraauditapi-functionapp) file. Extract archive to your local development computer.
95+
2. Start VS Code. Choose File in the main menu and select Open Folder.
96+
3. Select the top level folder from extracted files.
97+
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.
98+
If you aren't already signed in, choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose **Sign in to Azure**
99+
If you're already signed in, go to the next step.
100+
5. Provide the following information at the prompts:
101+
102+
a. **Select folder:** Choose a folder from your workspace or browse to one that contains your function app.
103+
104+
b. **Select Subscription:** Choose the subscription to use.
105+
106+
c. Select **Create new Function App in Azure** (Don't choose the Advanced option)
107+
108+
d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. JiraAuditXXXXX).
109+
110+
e. **Select a runtime:** Choose Python 3.8.
111+
112+
f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
113+
114+
6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied.
115+
7. Go to Azure Portal for the Function App configuration.
116+
117+
118+
**2. Configure the Function App**
119+
120+
1. In the Function App, select the Function App Name and select **Configuration**.
121+
2. In the **Application settings** tab, select ** New application setting**.
122+
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
123+
JiraUsername
124+
JiraAccessToken
125+
JiraHomeSiteName
126+
WorkspaceID
127+
WorkspaceKey
128+
logAnalyticsUri (optional)
129+
> - Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
130+
3. Once all application settings have been entered, click **Save**.
131+
132+
133+
134+
## Next steps
135+
136+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-atlassianjiraaudit?tab=Overview) in the Azure Marketplace.
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: "Cisco Identity Services Engine connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Cisco Identity Services Engine to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 04/18/2023
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
---
10+
11+
# Cisco Identity Services Engine connector for Microsoft Sentinel
12+
13+
The Cisco Identity Services Engine (ISE) data connector provides the capability to ingest [Cisco ISE](https://www.cisco.com/c/en/us/products/security/identity-services-engine/index.html) events with Microsoft Sentinel. It helps you gain visibility into what is happening in your network, such as who is connected, which applications are installed and running, and much more. Refer to [Cisco ISE logging mechanism documentation](https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_maintain_monitor.html#reference_BAFBA5FA046A45938810A5DF04C00591) for more information.
14+
15+
## Connector attributes
16+
17+
| Connector attribute | Description |
18+
| --- | --- |
19+
| **Kusto function alias** | CiscoISEEvent |
20+
| **Kusto function url** | https://aka.ms/sentinel-ciscoise-parser |
21+
| **Log Analytics table(s)** | Syslog(CiscoISE)<br/> |
22+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
23+
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
24+
25+
## Query samples
26+
27+
**Top 10 Reporting Devices**
28+
```kusto
29+
CiscoISEEvent
30+
31+
| summarize count() by DvcHostname
32+
33+
| top 10 by count_
34+
```
35+
36+
37+
38+
## Vendor installation instructions
39+
40+
41+
> [!NOTE]
42+
> This data connector depends on a parser based on a Kusto Function to work as expected. [Follow these steps](https://aka.ms/sentinel-ciscoise-parser) to create the Kusto Functions alias, **CiscoISEEvent**
43+
44+
1. Install and onboard the agent for Linux
45+
46+
Typically, you should install the agent on a different computer from the one on which the logs are generated.
47+
48+
> Syslog logs are collected only from **Linux** agents.
49+
50+
51+
2. Configure the logs to be collected
52+
53+
Configure the facilities you want to collect and their severities.
54+
55+
1. Under workspace advanced settings **Configuration**, select **Data** and then **Syslog**.
56+
2. Select **Apply below configuration to my machines** and select the facilities and severities.
57+
3. Click **Save**.
58+
59+
60+
3. Configure Cisco ISE Remote Syslog Collection Locations
61+
62+
[Follow these instructions](https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_maintain_monitor.html#ID58) to configure remote syslog collection locations in your Cisco ISE deployment.
63+
64+
65+
66+
## Next steps
67+
68+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-ciscoise?tab=Overview) in the Azure Marketplace.
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
---
2+
title: "Infoblox NIOS connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Infoblox NIOS to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 04/18/2023
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
---
10+
11+
# Infoblox NIOS connector for Microsoft Sentinel
12+
13+
The [Infoblox Network Identity Operating System (NIOS)](https://www.infoblox.com/glossary/network-identity-operating-system-nios/) connector allows you to easily connect your Infoblox NIOS logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's network and improves your security operation capabilities.
14+
15+
## Connector attributes
16+
17+
| Connector attribute | Description |
18+
| --- | --- |
19+
| **Log Analytics table(s)** | Syslog (InfobloxNIOS)<br/> |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
21+
| **Supported by** | [Infoblox](https://www.infoblox.com/support/) |
22+
23+
## Query samples
24+
25+
**Total Count by DHCP Request Message Types**
26+
```kusto
27+
union isfuzzy=true
28+
Infoblox_dhcpdiscover,Infoblox_dhcprequest,Infoblox_dhcpinform
29+
30+
| summarize count() by Log_Type
31+
```
32+
33+
**Top 5 Source IP address**
34+
```kusto
35+
Infoblox_dnsclient
36+
37+
| summarize count() by SrcIpAddr
38+
39+
| top 10 by count_ desc
40+
```
41+
42+
43+
44+
## Prerequisites
45+
46+
To integrate with Infoblox NIOS make sure you have:
47+
48+
- **Infoblox NIOS**: must be configured to export logs via Syslog
49+
50+
51+
## Vendor installation instructions
52+
53+
54+
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias Infoblox and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Infoblox%20NIOS/Parser/Infoblox.txt), on the second line of the query, enter the hostname(s) of your Infoblox device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
55+
56+
1. Install and onboard the agent for Linux
57+
58+
Typically, you should install the agent on a different computer from the one on which the logs are generated.
59+
60+
> Syslog logs are collected only from **Linux** agents.
61+
62+
63+
2. Configure the logs to be collected
64+
65+
Configure the facilities you want to collect and their severities.
66+
1. Under workspace advanced settings **Configuration**, select **Data** and then **Syslog**.
67+
2. Select **Apply below configuration to my machines** and select the facilities and severities.
68+
3. Click **Save**.
69+
70+
71+
3. Configure and connect the Infoblox NIOS
72+
73+
[Follow these instructions](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-slog-and-snmp-configuration-for-nios.pdf) to enable syslog forwarding of Infoblox NIOS Logs. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
74+
75+
76+
77+
## Next steps
78+
79+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-infobloxnios?tab=Overview) in the Azure Marketplace.

0 commit comments

Comments
 (0)