You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors-reference.md
+19-20Lines changed: 19 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,7 @@ ms.custom: ignite-fall-2021
12
12
13
13
This article describes how to deploy data connectors in Microsoft Sentinel, listing all supported, out-of-the-box data connectors, together with links to generic deployment procedures, and extra steps required for specific connectors.
14
14
15
-
> [!TIP]
16
-
> Some data connectors are deployed only via solutions. For more information, see the [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md). You can also find other, community-built data connectors in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors).
17
-
>
15
+
Some data connectors are deployed only via solutions. For more information, see the [Discover and deploy Microsoft Sentinel out-of-the-box content and solutions](sentinel-solutions-deploy.md). You can also find other, community-built data connectors in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors).
18
16
19
17
## How to use this guide
20
18
@@ -418,7 +416,7 @@ See [Microsoft Defender for Cloud](#microsoft-defender-for-cloud).
418
416
419
417
| Connector attribute | Description |
420
418
| --- | --- |
421
-
|**Data ingestion method**|**Azure service-to-service integration: <br>[Diagnostic settings-based connections, managed by Azure Policy](connect-azure-windows-microsoft-services.md?tabs=AP#diagnostic-settings-based-connections)** <br><br>Also available in the [Azure SQL and Microsoft Sentinel for SQL PaaS solutions](sentinel-solutions-catalog.md#azure)|
419
+
|**Data ingestion method**|**Azure service-to-service integration: <br>[Diagnostic settings-based connections, managed by Azure Policy](connect-azure-windows-microsoft-services.md?tabs=AP#diagnostic-settings-based-connections)** <br><br>Also available in the Azure SQL and Microsoft Sentinel for SQL PaaS solutions|
@@ -535,7 +533,7 @@ See Barracuda instructions - note the assigned facilities for the different type
535
533
536
534
| Connector attribute | Description |
537
535
| --- | --- |
538
-
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog** <br><br>Available from the [Check Point solution](sentinel-solutions-catalog.md#check-point)|
536
+
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog** <br><br>Available from the Check Point solution|
|**Vendor documentation/<br>installation instructions**|[Log Exporter - Check Point Log Export](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk122323)|
@@ -547,7 +545,7 @@ See Barracuda instructions - note the assigned facilities for the different type
547
545
548
546
| Connector attribute | Description |
549
547
| --- | --- |
550
-
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog** <br><br>Available in the [Cisco ASA solution](sentinel-solutions-catalog.md#cisco)|
548
+
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog** <br><br>Available in the Cisco ASA solution|
@@ -602,7 +600,7 @@ Configure eNcore to stream data via TCP to the Log Analytics Agent. This configu
602
600
603
601
| Connector attribute | Description |
604
602
| --- | --- |
605
-
|**Data ingestion method**|[**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br> Available in the [Cisco Umbrella solution](sentinel-solutions-catalog.md#cisco)|
603
+
|**Data ingestion method**|[**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br> Available in the Cisco Umbrella solution|
|**Azure Function App code**|https://aka.ms/Sentinel-CiscoUmbrellaConn-functionapp|
@@ -667,7 +665,7 @@ Configure eNcore to stream data via TCP to the Log Analytics Agent. This configu
667
665
668
666
| Connector attribute | Description |
669
667
| --- | --- |
670
-
|**Data ingestion method**| Only available after installing the [Continuous Threat Monitoring for SAP solution](sentinel-solutions-catalog.md#sap)|
668
+
|**Data ingestion method**| Only available after installing the Continuous Threat Monitoring for SAP solution|
671
669
|**Log Analytics table(s)**| See [Microsoft Sentinel SAP solution data reference](sap/sap-solution-log-reference.md)|
672
670
|**Vendor documentation/<br>installation instructions**|[Deploy SAP continuous threat monitoring](sap/deployment-overview.md)|
673
671
|**Supported by**| Microsoft |
@@ -707,7 +705,7 @@ Configure eNcore to stream data via TCP to the Log Analytics Agent. This configu
707
705
708
706
| Connector attribute | Description |
709
707
| --- | --- |
710
-
|**Data ingestion method**|**Azure service-to-service integration: <br>[API-based connections](connect-azure-windows-microsoft-services.md#api-based-connections)** <br><br> Also available as part of the [Microsoft Sentinel 4 Dynamics 365 solution](sentinel-solutions-catalog.md#azure)|
708
+
|**Data ingestion method**|**Azure service-to-service integration: <br>[API-based connections](connect-azure-windows-microsoft-services.md#api-based-connections)** <br><br> Also available as part of the Microsoft Sentinel 4 Dynamics 365 solution|
711
709
|**License prerequisites/<br>Cost information**| <li>[Microsoft Dynamics 365 production license](/office365/servicedescriptions/microsoft-dynamics-365-online-service-description). Not available for sandbox environments.<li>At least one user assigned a Microsoft/Office 365 [E1 or greater](/power-platform/admin/enable-use-comprehensive-auditing#requirements) license.<br>Other charges may apply |
@@ -960,7 +958,7 @@ For more information, see the Eset documentation.
960
958
961
959
| Connector attribute | Description |
962
960
| --- | --- |
963
-
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog**<br><br>[Send Fortinet logs to the log forwarder](#send-fortinet-logs-to-the-log-forwarder) <br><br>Available in the [Fortinet Fortigate solution](sentinel-solutions-catalog.md#fortinet-fortigate)|
961
+
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog**<br><br>[Send Fortinet logs to the log forwarder](#send-fortinet-logs-to-the-log-forwarder) <br><br>Available in the Fortinet Fortigate solution)|
|**Vendor documentation/<br>installation instructions**| [Fortinet Document Library](https://aka.ms/asi-syslog-fortinet-fortinetdocumentlibrary)<br>Choose your version and use the *Handbook* and *Log Message Reference* PDFs. |
@@ -990,7 +988,7 @@ end
990
988
991
989
| Connector attribute | Description |
992
990
| --- | --- |
993
-
|**Data ingestion method**|[**Microsoft Sentinel Data Collector API**](connect-rest-api-template.md)<br><br>Only available after installing the [Continuous Threat Monitoring for GitHub](sentinel-solutions-catalog.md#github) solution. |
991
+
|**Data ingestion method**|[**Microsoft Sentinel Data Collector API**](connect-rest-api-template.md)<br><br>Only available after installing the Continuous Threat Monitoring for GitHub solution. |
@@ -1057,7 +1055,7 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
1057
1055
1058
1056
| Connector attribute | Description |
1059
1057
| --- | --- |
1060
-
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog**<br><br>Available in the [Imperva Cloud WAF solution](sentinel-solutions-catalog.md#imperva)|
1058
+
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog**<br><br>Available in the Imperva Cloud WAF solution|
|**Vendor documentation/<br>installation instructions**| [Steps for Enabling Imperva WAF Gateway Alert Logging to Microsoft Sentinel](https://community.imperva.com/blogs/craig-burlingame1/2020/11/13/steps-for-enabling-imperva-waf-gateway-alert) |
@@ -1069,7 +1067,7 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
1069
1067
1070
1068
| Connector attribute | Description |
1071
1069
| --- | --- |
1072
-
|**Data ingestion method**| [**Syslog**](connect-syslog.md)<br><br> available in the [InfoBlox Threat Defense solution](sentinel-solutions-catalog.md#infoblox)|
1070
+
|**Data ingestion method**| [**Syslog**](connect-syslog.md)<br><br> available in the InfoBlox Threat Defense solution |
@@ -1098,7 +1096,7 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
1098
1096
1099
1097
| Connector attribute | Description |
1100
1098
| --- | --- |
1101
-
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br>Only available after installing the [Lookout Mobile Threat Defense for Microsoft Sentinel](sentinel-solutions-catalog.md#lookout) solution |
1099
+
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br>Only available after installing the Lookout Mobile Threat Defense for Microsoft Sentinel solution |
@@ -1408,7 +1406,7 @@ Refer to the Onapsis in-product help to set up log forwarding to the Log Analyti
1408
1406
1409
1407
| Connector attribute | Description |
1410
1408
| --- | --- |
1411
-
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog**<br><br>Also available in the [Palo Alto PAN-OS and Prisma solutions](sentinel-solutions-catalog.md#palo-alto)|
1409
+
|**Data ingestion method**|**[Common Event Format (CEF)](connect-common-event-format.md) over Syslog**<br><br>Also available in the Palo Alto PAN-OS and Prisma solutions|
@@ -1433,7 +1431,7 @@ Refer to the Onapsis in-product help to set up log forwarding to the Log Analyti
1433
1431
1434
1432
| Connector attribute | Description |
1435
1433
| --- | --- |
1436
-
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br>Also available in the [Proofpoint POD solution](sentinel-solutions-catalog.md#proofpoint)|
1434
+
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br>Also available in the Proofpoint POD solution |
|**Azure Function App code**| https://aka.ms/Sentinel-proofpointpod-functionapp |
@@ -1450,7 +1448,7 @@ Refer to the Onapsis in-product help to set up log forwarding to the Log Analyti
1450
1448
1451
1449
| Connector attribute | Description |
1452
1450
| --- | --- |
1453
-
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br>Also available in the [Proofpoint TAP solution](sentinel-solutions-catalog.md#proofpoint)|
1451
+
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md) <br><br>Also available in the Proofpoint TAP solution |
|**Azure Function App code**| https://aka.ms/sentinelproofpointtapazurefunctioncode |
@@ -1479,7 +1477,7 @@ Refer to the Onapsis in-product help to set up log forwarding to the Log Analyti
1479
1477
1480
1478
| Connector attribute | Description |
1481
1479
| --- | --- |
1482
-
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md)<br><br>[Extra configuration forthe Qualys VM KB](#extra-configuration-for-the-qualys-vm-kb) <br><br>Also availablein the [Qualys VM solution](sentinel-solutions-catalog.md#qualys)|
1480
+
|**Data ingestion method**| [**Azure Functions and the REST API**](connect-azure-functions-template.md)<br><br>[Extra configuration forthe Qualys VM KB](#extra-configuration-for-the-qualys-vm-kb) <br><br>Also availablein the Qualys VM solution|
1483
1481
|**Log Analytics table(s)**| QualysKB_CL |
1484
1482
|**DCR support**| Not currently supported |
1485
1483
|**Azure Function App code**| https://aka.ms/Sentinel-qualyskb-functioncode |
@@ -2044,5 +2042,6 @@ You can find the value of your workspace ID on the ZScaler Private Access connec
Copy file name to clipboardExpand all lines: articles/sentinel/iot-advanced-threat-monitoring.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -340,4 +340,4 @@ For more information, see:
340
340
-[Tutorial: Use playbooks with automation rules in Microsoft Sentinel](tutorial-respond-threats-playbook.md)
341
341
-[Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/defending-critical-infrastructure-with-the-microsoft-sentinel-it/ba-p/3061184)
342
342
-[Microsoft Defender for IoT documentation](../defender-for-iot/index.yml)
343
-
-[Microsoft Defender for IoT solution](sentinel-solutions-catalog.md#microsoft)
343
+
-[Microsoft Defender for IoT solution](sentinel-solutions-catalog.md)
Copy file name to clipboardExpand all lines: articles/sentinel/iot-solution.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -148,5 +148,7 @@ For more information, see:
148
148
149
149
- [Tutorial: Investigate and detect threats for IoT devices](iot-advanced-threat-monitoring.md)
150
150
- [Defending Critical Infrastructure with the Microsoft Sentinel: IT/OT Threat Monitoring Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/defending-critical-infrastructure-with-the-microsoft-sentinel-it/ba-p/3061184)
151
+
- [Microsoft Defender for IoT documentation](../defender-for-iot/index.yml)
152
+
- [Microsoft Defender for IoT solution](https://azuremarketplace.microsoft.com/marketplace/apps/azuresentinel.azure-sentinel-solution-unifiedmicrosoftsocforot?tab=Overview)
151
153
- [Microsoft Defender for IoT data connector](data-connectors-reference.md#microsoft-defender-for-iot)
152
-
- [Microsoft Defender for IoT solution](sentinel-solutions-catalog.md#microsoft)
0 commit comments