Skip to content

Commit 4dcbb28

Browse files
Merge pull request #206680 from batamig/logrhythm
LogRhythm
2 parents e2df6d2 + 76803ba commit 4dcbb28

File tree

3 files changed

+67
-12
lines changed

3 files changed

+67
-12
lines changed

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -106,25 +106,27 @@
106106
items:
107107
- name: Overview
108108
href: integrate-overview.md
109-
- name: ArcSight
110-
href: integrations/arcsight.md
111-
- name: Integrate ClearPass
109+
- name: ClearPass
112110
href: tutorial-clearpass.md
113-
- name: Integrate CyberArk
111+
- name: CyberArk
114112
href: tutorial-cyberark.md
115-
- name: Integrate Forescout
113+
- name: Forescout
116114
href: tutorial-forescout.md
117-
- name: Integrate Fortinet
115+
- name: Fortinet
118116
href: tutorial-fortinet.md
119-
- name: RSA NetWitness
120-
href: integrations/netwitness.md
121-
- name: Integrate Palo Alto
117+
- name: LogRhythm
118+
href: integrations/logrhythm.md
119+
- name: Micro Focus ArcSight
120+
href: integrations/arcsight.md
121+
- name: Palo Alto
122122
href: tutorial-palo-alto.md
123-
- name: Integrate Qradar
123+
- name: Qradar
124124
href: tutorial-qradar.md
125-
- name: Integrate Splunk
125+
- name: RSA NetWitness
126+
href: integrations/netwitness.md
127+
- name: Splunk
126128
href: tutorial-splunk.md
127-
- name: Integrate ServiceNow
129+
- name: ServiceNow
128130
href: tutorial-servicenow.md
129131
- name: System deployment
130132
items:

articles/defender-for-iot/organizations/integrate-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ The following table lists available integrations for Microsoft Defender for IoT,
2121
|**CyberArk** | Send CyberArk PSM syslog data on remote sessions and verification failures to Defender for IoT for data correlation. | [Integrate CyberArk with Microsoft Defender for IoT](tutorial-cyberark.md) |
2222
|**Forescout** | Automate actions in Forescout based on activity detected by Defender for IoT, and correlate Defender for IoT data with other *Forescout eyeExtended* modules that oversee monitoring, incident management, and device control. | [Integrate Forescout with Microsoft Defender for IoT](tutorial-forescout.md) |
2323
|**Fortinet** | Send Defender for IoT data to Fortinet services for: <br><br>- Enhanced network visibility in FortiSIEM<br>- Extra abilities in FortiGate to stop anomalous behavior | [Integrate Fortinet with Microsoft Defender for IoT](tutorial-fortinet.md) |
24+
| **LogRhythm** | Forward Defender for IoT alerts to LogRhythm. | [Integrate LogRhythm with Microsoft Defender for IoT](integrations/logrhythm.md) |
2425
| **RSA NetWitness** | Forward Defender for IoT alerts to RSA NetWitness | [Integrate RSA NetWitness with Microsoft Defender for IoT](integrations/netwitness.md) <br>[CyberX Platform - RSA NetWitness CEF Parser Implementation Guide](https://community.netwitness.com//t5/netwitness-platform-integrations/cyberx-platform-rsa-netwitness-cef-parser-implementation-guide/ta-p/554364) |
2526
|**Palo Alto** |Use Defender for IoT data to block critical threats with Palo Alto firewalls, either with automatic blocking or with blocking recommendations. | [Integrate Palo-Alto with Microsoft Defender for IoT](tutorial-palo-alto.md) |
2627
|**QRadar** |Forward Defender for IoT alerts to IBM QRadar. | [Integrate Qradar with Microsoft Defender for IoT](tutorial-qradar.md) |
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Integrate LogRhythm with Microsoft Defender for IoT
3+
description: Learn how to send Microsoft Defender for IoT alerts to ALogRhythmrcSight.
4+
ms.topic: how-to
5+
ms.date: 08/02/2022
6+
---
7+
8+
# Integrate LogRhythm with Microsoft Defender for IoT
9+
10+
This article describes how to send Microsoft Defender for IoT alerts to LogRhythm. Integrating Defender for IoT with LogRhythm provides visibility into the security and resiliency of OT networks and a unified approach to IT and OT security.
11+
12+
## Prerequisites
13+
14+
Before you begin, make sure that you have the following prerequisites:
15+
16+
- Access to a Defender for IoT OT sensor as an Admin user.
17+
18+
## Create a Defender for IoT forwarding rule
19+
20+
This procedure describes how to create a forwarding rule from your OT sensor to send Defender for IoT alerts from that sensor to LogRhythm.
21+
22+
For more information, see [Forward alert information](../how-to-forward-alert-information-to-partners.md).
23+
24+
1. Sign in to your OT sensor console and select **Forwarding** on the left.
25+
26+
1. Enter a meaningful name for your rule, and then define your rule details, including:
27+
28+
- The minimal alert level. For example, if you select Minor, you are notified about all minor, major and critical incidents.
29+
- The protocols you want to include in the rule.
30+
- The traffic you want to include in the rule.
31+
32+
1. In the **Actions** area, define the following values:
33+
34+
- **Server**: Select a SYSLOG server option, such as **SYSLOG Server (LEEF format)
35+
- **Host**: The IP or hostname of your LogRhythm collector
36+
- **Port**: Enter **514**
37+
- **Timezone**: Enter your timezone
38+
39+
1. Select **Save** to save your forwarding rule.
40+
41+
## Configure LogRhythm to collect logs
42+
43+
After configuring a forwarding rule from your OT sensor console, configure LogRhythm to collect your Defender for IoT logs.
44+
45+
For more information, see the [LogRhythm documentation](https://docs.logrhythm.com/docs/devices/syslog-log-sources).
46+
47+
## Next steps
48+
49+
For more information, see:
50+
51+
- [Integrations with partner services](../integrate-overview.md)
52+
- [Forward alert information](../how-to-forward-alert-information-to-partners.md)

0 commit comments

Comments
 (0)