Skip to content

Commit 465d034

Browse files
authored
Merge pull request #291294 from Saisang/sai-dataconnectorupdate-202411
[Auto-generated] Data Connectors update - Nov 2024
2 parents 8550ee7 + 8ff6c3d commit 465d034

11 files changed

+537
-7
lines changed

articles/sentinel/TOC.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -363,6 +363,8 @@
363363
href: data-connectors/cohesity.md
364364
- name: Common Event Format (CEF) via AMA
365365
href: data-connectors/common-event-format-cef-via-ama.md
366+
- name: CommvaultSecurityIQ (using Azure Functions)
367+
href: data-connectors/commvaultsecurityiq.md
366368
- name: Corelight Connector Exporter
367369
href: data-connectors/corelight-connector-exporter.md
368370
- name: Cortex XDR - Incidents
@@ -489,6 +491,8 @@
489491
href: data-connectors/microsoft-365-defender.md
490492
- name: Microsoft 365 Insider Risk Management
491493
href: data-connectors/microsoft-365-insider-risk-management.md
494+
- name: Microsoft Active-Directory Domain Controllers Security Event Logs
495+
href: data-connectors/microsoft-active-directory-domain-controllers-security-event-logs.md
492496
- name: Microsoft Defender for Cloud Apps
493497
href: data-connectors/microsoft-defender-for-cloud-apps.md
494498
- name: Microsoft Defender for Endpoint
@@ -507,8 +511,14 @@
507511
href: data-connectors/microsoft-entra-id.md
508512
- name: Microsoft Entra ID Protection
509513
href: data-connectors/microsoft-entra-id-protection.md
514+
- name: Microsoft Exchange Admin Audit Logs by Event Logs
515+
href: data-connectors/microsoft-exchange-admin-audit-logs-by-event-logs.md
516+
- name: Microsoft Exchange HTTP Proxy Logs
517+
href: data-connectors/microsoft-exchange-http-proxy-logs.md
510518
- name: Microsoft Exchange Logs and Events
511519
href: data-connectors/microsoft-exchange-logs-and-events.md
520+
- name: Microsoft Exchange Message Tracking Logs
521+
href: data-connectors/microsoft-exchange-message-tracking-logs.md
512522
- name: Microsoft Power BI
513523
href: data-connectors/microsoft-powerbi.md
514524
- name: Microsoft Project
@@ -637,6 +647,8 @@
637647
href: data-connectors/transmit-security-connector.md
638648
- name: Trend Vision One (using Azure Functions)
639649
href: data-connectors/trend-vision-one.md
650+
- name: Varonis SaaS
651+
href: data-connectors/varonis-saas.md
640652
- name: Vectra XDR (using Azure Functions)
641653
href: data-connectors/vectra-xdr.md
642654
- name: VMware Carbon Black Cloud (using Azure Functions)

articles/sentinel/data-connectors-reference.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,10 @@ For more information about the codeless connector platform, see [Create a codele
174174

175175
- [Cohesity (using Azure Functions)](data-connectors/cohesity.md)
176176

177+
## Commvault
178+
179+
- [CommvaultSecurityIQ (using Azure Functions)](data-connectors/commvaultsecurityiq.md)
180+
177181
## Corelight Inc.
178182

179183
- [Corelight Connector Exporter](data-connectors/corelight-connector-exporter.md)
@@ -394,7 +398,11 @@ For more information about the codeless connector platform, see [Create a codele
394398

395399
- [Exchange Security Insights Online Collector (using Azure Functions)](data-connectors/exchange-security-insights-online-collector.md)
396400
- [Exchange Security Insights On-Premises Collector](data-connectors/exchange-security-insights-on-premises-collector.md)
401+
- [Microsoft Active-Directory Domain Controllers Security Event Logs](data-connectors/microsoft-active-directory-domain-controllers-security-event-logs.md)
402+
- [Microsoft Exchange Admin Audit Logs by Event Logs](data-connectors/microsoft-exchange-admin-audit-logs-by-event-logs.md)
403+
- [Microsoft Exchange HTTP Proxy Logs](data-connectors/microsoft-exchange-http-proxy-logs.md)
397404
- [Microsoft Exchange Logs and Events](data-connectors/microsoft-exchange-logs-and-events.md)
405+
- [Microsoft Exchange Message Tracking Logs](data-connectors/microsoft-exchange-message-tracking-logs.md)
398406
- [Forcepoint DLP](data-connectors/forcepoint-dlp.md)
399407
- [MISP2Sentinel](data-connectors/misp2sentinel.md)
400408

@@ -560,6 +568,10 @@ For more information about the codeless connector platform, see [Create a codele
560568

561569
- [SaaS Security](data-connectors/saas-security.md)
562570

571+
## Varonis
572+
573+
- [Varonis SaaS](data-connectors/varonis-saas.md)
574+
563575
## Vectra AI, Inc
564576

565577
- [Vectra XDR (using Azure Functions)](data-connectors/vectra-xdr.md)

articles/sentinel/data-connectors/atlassian-confluence-audit.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Atlassian Confluence Audit (using Azure Functions) connector for Microso
33
description: "Learn how to install the connector Atlassian Confluence Audit (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 10/15/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -20,7 +20,7 @@ This is autogenerated content. For changes, contact the solution provider.
2020
| Connector attribute | Description |
2121
| --- | --- |
2222
| **Application settings** | ConfluenceUsername<br/>ConfluenceAccessToken<br/>ConfluenceHomeSiteName<br/>WorkspaceID<br/>WorkspaceKey<br/>logAnalyticsUri (optional) |
23-
| **Azure function app code** | [https://aka.ms/sentinel-confluenceauditapi-functionapp](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) |
23+
| **Azure function app code** | https://aka.ms/sentinel-confluenceauditapi-functionapp |
2424
| **Log Analytics table(s)** | Confluence_Audit_CL<br/> |
2525
| **Data collection rules support** | Not currently supported |
2626
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -89,7 +89,7 @@ Use the following step-by-step instructions to deploy the Confluence Audit data
8989

9090
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
9191
92-
1. Download the [Azure Function App](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) file. Extract archive to your local development computer.
92+
1. Download the [Azure Function App](https://aka.ms/sentinel-confluenceauditapi-functionapp) file. Extract archive to your local development computer.
9393
2. Start VS Code. Choose File in the main menu and select Open Folder.
9494
3. Select the top level folder from extracted files.
9595
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.

articles/sentinel/data-connectors/bitglass.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Bitglass (using Azure Functions) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Bitglass (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 10/15/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -63,7 +63,7 @@ To integrate with Bitglass (using Azure Functions) make sure you have:
6363

6464
Follow the instructions to obtain the credentials.
6565

66-
1. Please contact Bitglass [support](https://pages.bitglass.com/Contact.html) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
66+
1. Please contact Bitglass [support](https://www.forcepoint.com/company/contact-us) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
6767
2. Save credentials for using in the data connector.
6868

6969

Lines changed: 131 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
---
2+
title: "CommvaultSecurityIQ (using Azure Functions) connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector CommvaultSecurityIQ (using Azure Functions) to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 11/20/2024
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
ms.collection: sentinel-data-connector
10+
---
11+
12+
# CommvaultSecurityIQ (using Azure Functions) connector for Microsoft Sentinel
13+
14+
This Azure Function enables Commvault users to ingest alerts/events into their Microsoft Sentinel instance. With Analytic Rules,Microsoft Sentinel can automatically create Microsoft Sentinel incidents from incoming events and logs.
15+
16+
This is autogenerated content. For changes, contact the solution provider.
17+
18+
## Connector attributes
19+
20+
| Connector attribute | Description |
21+
| --- | --- |
22+
| **Application settings** | apiUsername<br/>apipassword<br/>apiToken<br/>workspaceID<br/>workspaceKey<br/>uri<br/>logAnalyticsUri (optional)(add any other settings required by the Function App)Set the <code>uri</code> value to: <code>&lt;add uri value&gt;</code> |
23+
| **Azure function app code** | Add%20GitHub%20link%20to%20Function%20App%20code |
24+
| **Log Analytics table(s)** | CommvaultSecurityIQ_CL<br/> |
25+
| **Data collection rules support** | Not currently supported |
26+
| **Supported by** | [Commvault](https://www.commvault.com/support) |
27+
28+
## Query samples
29+
30+
**Last 10 events/alerts **
31+
32+
```kusto
33+
CommvaultSecurityIQ_CL
34+
35+
| where TimeGenerated > ago(24h)
36+
37+
| limit 10
38+
```
39+
40+
41+
42+
## Prerequisites
43+
44+
To integrate with CommvaultSecurityIQ (using Azure Functions) make sure you have:
45+
46+
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
47+
- **Commvault Environment Endpoint URL**: Make sure to follow the documentation and set the secret value in KeyVault
48+
- **Commvault QSDK Token**: Make sure to follow the documentation and set the secret value in KeyVault
49+
50+
51+
## Vendor installation instructions
52+
53+
54+
> [!NOTE]
55+
> This connector uses Azure Functions to connect to a Commvault Instance to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
56+
57+
58+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
59+
60+
61+
**STEP 1 - Configuration steps for the Commvalut QSDK Token**
62+
63+
[Follow these instructions](/cloud-app-security/api-authentication) to create an API Token.
64+
65+
66+
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
67+
68+
>**IMPORTANT:** Before deploying the CommvaultSecurityIQ data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the Commvault Endpoint URL and QSDK Token, readily available.
69+
70+
71+
72+
73+
**Option 1 - Azure Resource Manager (ARM) Template**
74+
75+
Use this method for automated deployment of the Commvault Security IQ data connector.
76+
77+
1. Click the **Deploy to Azure** button below.
78+
79+
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-CommvaultSecurityIQ-azuredeploy)
80+
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
81+
3. Enter the **Workspace ID**, **Workspace Key**, **API Username**, **API Password**, 'and/or Other required fields'.
82+
>Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
83+
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
84+
5. Click **Purchase** to deploy.
85+
86+
87+
**Option 2 - Manual Deployment of Azure Functions**
88+
89+
Use the following step-by-step instructions to deploy the CommvaultSecurityIQ data connector manually with Azure Functions.
90+
91+
1. Create a Function App
92+
93+
1. From the Azure Portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp).
94+
2. Click **+ Add** at the top.
95+
3. In the **Basics** tab, ensure Runtime stack is set to **'Add Required Language'**.
96+
4. In the **Hosting** tab, ensure **Plan type** is set to **'Add Plan Type'**.
97+
5. 'Add other required configurations'.
98+
5. 'Make other preferable configuration changes', if needed, then click **Create**.
99+
100+
2. Import Function App Code
101+
102+
1. In the newly created Function App, select **Functions** from the navigation menu and click **+ Add**.
103+
2. Select **Timer Trigger**.
104+
3. Enter a unique Function **Name** in the New Function field and leave the default cron schedule of every 5 minutes, then click **Create Function**.
105+
4. Click on the function name and click **Code + Test** from the left pane.
106+
5. Copy the **Function App Code** and paste into the Function App `run.ps1` editor.
107+
6. Click **Save**.
108+
109+
3. Configure the Function App
110+
111+
1. In the Function App screen, click the Function App name and select **Configuration**.
112+
2. In the **Application settings** tab, select **+ New application setting**.
113+
3. Add each of the following 'x (number of)' application settings individually, under Name, with their respective string values (case-sensitive) under Value:
114+
apiUsername
115+
apipassword
116+
apiToken
117+
workspaceID
118+
workspaceKey
119+
uri
120+
logAnalyticsUri (optional)
121+
(add any other settings required by the Function App)
122+
Set the `uri` value to: `<add uri value>`
123+
>Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Azure Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
124+
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
125+
4. Once all application settings have been entered, click **Save**.
126+
127+
128+
129+
## Next steps
130+
131+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/commvault.microsoft-sentinel-solution-commvaultsecurityiq?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/forescout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Forescout connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Forescout to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -41,7 +41,7 @@ ForescoutEvent
4141

4242

4343
> [!NOTE]
44-
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Forescout%20(Legacy)/Parsers/ForescoutEvent.yaml) which is deployed with the Microsoft Sentinel Solution.
44+
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://aka.ms/sentinel-forescout-parser) which is deployed with the Microsoft Sentinel Solution.
4545
4646

4747
> [!NOTE]
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: "Microsoft Active-Directory Domain Controllers Security Event Logs connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Microsoft Active-Directory Domain Controllers Security Event Logs to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 11/20/2024
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
ms.collection: sentinel-data-connector
10+
---
11+
12+
# Microsoft Active-Directory Domain Controllers Security Event Logs connector for Microsoft Sentinel
13+
14+
[Option 3 & 4] - Using Azure Monitor Agent -You can stream a part or all Domain Controllers Security Event logs from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to create custom alerts, and improve investigation.
15+
16+
This is autogenerated content. For changes, contact the solution provider.
17+
18+
## Connector attributes
19+
20+
| Connector attribute | Description |
21+
| --- | --- |
22+
| **Log Analytics table(s)** | SecurityEvent<br/> |
23+
| **Data collection rules support** | Not currently supported |
24+
| **Supported by** | [Community](https://github.com/Azure/Azure-Sentinel/issues) |
25+
26+
## Query samples
27+
28+
**All Audit logs**
29+
30+
```kusto
31+
SecurityEvent
32+
| sort by TimeGenerated
33+
```
34+
35+
36+
37+
## Prerequisites
38+
39+
To integrate with Microsoft Active-Directory Domain Controllers Security Event Logs make sure you have:
40+
41+
- ****: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
42+
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)
43+
44+
45+
## Vendor installation instructions
46+
47+
48+
> [!NOTE]
49+
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independant for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
50+
51+
>This Data Connector is the **option 3 and 4** of the wiki.
52+
53+
1. Download and install the agents needed to collect logs for Microsoft Sentinel
54+
55+
Type of servers (Exchange Servers, Domain Controllers linked to Exchange Servers or all Domain Controllers) depends on the option you want to deploy.
56+
57+
58+
Security logs of Domain Controllers
59+
60+
Select how to stream Security logs of Domain Controllers. If you want to implement Option 3, you just need to select DC on same site as Exchange Servers. If you want to implement Option 4, you can select all DCs of your forest.
61+
62+
63+
64+
65+
66+
## Next steps
67+
68+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/microsoftsentinelcommunity.azure-sentinel-solution-exchangesecurityinsights?tab=Overview) in the Azure Marketplace.

0 commit comments

Comments
 (0)