Skip to content

Commit 5cf4559

Browse files
committed
Add new data connectors
1 parent 57a9c84 commit 5cf4559

17 files changed

+1864
-0
lines changed

articles/sentinel/TOC.yml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -286,6 +286,8 @@
286286
href: data-connectors/armis-activities.md
287287
- name: Armis Alerts (using Azure Functions)
288288
href: data-connectors/armis-alerts.md
289+
- name: Armis Alerts Activities (using Azure Functions)
290+
href: data-connectors/armis-alerts-activities.md
289291
- name: Armis Devices (using Azure Functions)
290292
href: data-connectors/armis-devices.md
291293
- name: Armorblox (using Azure Functions)
@@ -304,6 +306,8 @@
304306
href: data-connectors/azure-activity.md
305307
- name: Azure Batch Account
306308
href: data-connectors/azure-batch-account.md
309+
- name: Azure CloudNGFW By Palo Alto Networks
310+
href: data-connectors/azure-cloudngfw-by-palo-alto-networks.md
307311
- name: Azure Cognitive Search
308312
href: data-connectors/azure-cognitive-search.md
309313
- name: Azure DDoS Protection
@@ -362,6 +366,8 @@
362366
href: data-connectors/corelight-connector-exporter.md
363367
- name: Cortex XDR - Incidents
364368
href: data-connectors/cortex-xdr-incidents.md
369+
- name: Cribl
370+
href: data-connectors/cribl.md
365371
- name: CrowdStrike Falcon Adversary Intelligence (using Azure Functions)
366372
href: data-connectors/crowdstrike-falcon-adversary-intelligence.md
367373
- name: Crowdstrike Falcon Data Replicator (using Azure Functions)
@@ -440,10 +446,22 @@
440446
href: data-connectors/greynoise-threat-intelligence.md
441447
- name: HackerView Intergration (using Azure Functions)
442448
href: data-connectors/hackerview-intergration.md
449+
- name: HYAS Protect (using Azure Functions)
450+
href: data-connectors/hyas-protect.md
443451
- name: Holm Security Asset Data (using Azure Functions)
444452
href: data-connectors/holm-security-asset-data.md
453+
- name: Illumio SaaS (using Azure Functions)
454+
href: data-connectors/illumio-saas.md
445455
- name: Imperva Cloud WAF (using Azure Functions)
446456
href: data-connectors/imperva-cloud-waf.md
457+
- name: Infoblox Data Connector via REST API (using Azure Functions)
458+
href: data-connectors/infoblox-data-connector-via-rest-api.md
459+
- name: Infoblox Cloud Data Connector via AMA
460+
href: data-connectors/recommended-infoblox-cloud-data-connector-via-ama.md
461+
- name: Infoblox SOC Insight Data Connector via AMA
462+
href: data-connectors/recommended-infoblox-soc-insight-data-connector-via-ama.md
463+
- name: Infoblox SOC Insight Data Connector via REST API
464+
href: data-connectors/infoblox-soc-insight-data-connector-via-rest-api.md
447465
- name: InfoSecGlobal Data Connector
448466
href: data-connectors/infosecglobal-data-connector.md
449467
- name: IONIX Security Logs
@@ -546,8 +564,12 @@
546564
href: data-connectors/palo-alto-prisma-cloud-cspm.md
547565
- name: Perimeter 81 Activity Logs
548566
href: data-connectors/perimeter-81-activity-logs.md
567+
- name: Phosphorus Devices
568+
href: data-connectors/phosphorus-devices.md
549569
- name: Prancer Data Connector
550570
href: data-connectors/prancer-data-connector.md
571+
- name: Premium Microsoft Defender Threat Intelligence (Preview)
572+
href: data-connectors/premium-microsoft-defender-threat-intelligence.md
551573
- name: Proofpoint On Demand Email Security (using Azure Functions)
552574
href: data-connectors/proofpoint-on-demand-email-security.md
553575
- name: Proofpoint TAP (using Azure Functions)
@@ -556,6 +578,8 @@
556578
href: data-connectors/qualys-vm-knowledgebase.md
557579
- name: Qualys Vulnerability Management (using Azure Functions)
558580
href: data-connectors/qualys-vulnerability-management.md
581+
- name: Radiflow iSID via AMA
582+
href: data-connectors/radiflow-isid-via-ama.md
559583
- name: Rapid7 Insight Platform Vulnerability Management Reports (using Azure Functions)
560584
href: data-connectors/rapid7-insight-platform-vulnerability-management-reports.md
561585
- name: Rubrik Security Cloud data connector (using Azure Functions)
@@ -572,6 +596,8 @@
572596
href: data-connectors/sentinelone.md
573597
- name: Seraphic Web Security
574598
href: data-connectors/seraphic-web-security.md
599+
- name: Silverfort Admin Console
600+
href: data-connectors/silverfort-admin-console.md
575601
- name: Slack Audit (using Azure Functions)
576602
href: data-connectors/slack-audit.md
577603
- name: Snowflake (using Azure Functions)
@@ -634,6 +660,10 @@
634660
href: data-connectors/zero-networks-segment-audit.md
635661
- name: Zero Networks Segment Audit (Function) (using Azure Functions)
636662
href: data-connectors/zero-networks-segment-audit.md
663+
- name: ZeroFox CTI (using Azure Functions)
664+
href: data-connectors/zerofox-cti.md
665+
- name: ZeroFox Enterprise - Alerts (Polling CCP)
666+
href: data-connectors/zerofox-enterprise-alerts-polling-ccp.md
637667
- name: Zimperium Mobile Threat Defense
638668
href: data-connectors/zimperium-mobile-threat-defense.md
639669
- name: Zoom Reports (using Azure Functions)

articles/sentinel/data-connectors-reference.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,7 @@ For more information about the codeless connector platform, see [Create a codele
104104

105105
- [Armis Activities (using Azure Functions)](data-connectors/armis-activities.md)
106106
- [Armis Alerts (using Azure Functions)](data-connectors/armis-alerts.md)
107+
- [Armis Alerts Activities (using Azure Functions)](data-connectors/armis-alerts-activities.md)
107108
- [Armis Devices (using Azure Functions)](data-connectors/armis-devices.md)
108109

109110
## Armorblox
@@ -175,6 +176,10 @@ For more information about the codeless connector platform, see [Create a codele
175176

176177
- [Corelight Connector Exporter](data-connectors/corelight-connector-exporter.md)
177178

179+
## Cribl
180+
181+
- [Cribl](data-connectors/cribl.md)
182+
178183
## Crowdstrike
179184

180185
- [CrowdStrike Falcon Adversary Intelligence (using Azure Functions)](data-connectors/crowdstrike-falcon-adversary-intelligence.md)
@@ -278,6 +283,14 @@ For more information about the codeless connector platform, see [Create a codele
278283

279284
- [GreyNoise Threat Intelligence (using Azure Functions)](data-connectors/greynoise-threat-intelligence.md)
280285

286+
## HYAS Infosec Inc
287+
288+
- [HYAS Protect (using Azure Functions)](data-connectors/hyas-protect.md)
289+
290+
## Illumio, Inc.
291+
292+
- [Illumio SaaS (using Azure Functions)](data-connectors/illumio-saas.md)
293+
281294
## H.O.L.M. Security Sweden AB
282295

283296
- [Holm Security Asset Data (using Azure Functions)](data-connectors/holm-security-asset-data.md)
@@ -286,6 +299,13 @@ For more information about the codeless connector platform, see [Create a codele
286299

287300
- [Imperva Cloud WAF (using Azure Functions)](data-connectors/imperva-cloud-waf.md)
288301

302+
## Infoblox
303+
304+
- [[Recommended] Infoblox Cloud Data Connector via AMA](data-connectors/recommended-infoblox-cloud-data-connector-via-ama.md)
305+
- [[Recommended] Infoblox SOC Insight Data Connector via AMA](data-connectors/recommended-infoblox-soc-insight-data-connector-via-ama.md)
306+
- [Infoblox Data Connector via REST API (using Azure Functions)](data-connectors/infoblox-data-connector-via-rest-api.md)
307+
- [Infoblox SOC Insight Data Connector via REST API](data-connectors/infoblox-soc-insight-data-connector-via-rest-api.md)
308+
289309
## Infosec Global
290310

291311
- [InfoSecGlobal Data Connector](data-connectors/infosecglobal-data-connector.md)
@@ -348,6 +368,7 @@ For more information about the codeless connector platform, see [Create a codele
348368
- [Azure Stream Analytics](data-connectors/azure-stream-analytics.md)
349369
- [Syslog via AMA](data-connectors/syslog-via-ama.md)
350370
- [Microsoft Defender Threat Intelligence (Preview)](data-connectors/microsoft-defender-threat-intelligence.md)
371+
- [Premium Microsoft Defender Threat Intelligence (Preview)](data-connectors/premium-microsoft-defender-threat-intelligence.md)
351372
- [Threat intelligence - TAXII](data-connectors/threat-intelligence-taxii.md)
352373
- [Threat Intelligence Platforms](data-connectors/threat-intelligence-platforms.md)
353374
- [Threat Intelligence Upload Indicators API (Preview)](data-connectors/threat-intelligence-upload-indicators-api.md)
@@ -423,11 +444,16 @@ For more information about the codeless connector platform, see [Create a codele
423444
## Palo Alto Networks
424445

425446
- [Palo Alto Prisma Cloud CSPM (using Azure Functions)](data-connectors/palo-alto-prisma-cloud-cspm.md)
447+
- [Azure CloudNGFW By Palo Alto Networks](data-connectors/azure-cloudngfw-by-palo-alto-networks.md)
426448

427449
## Perimeter 81
428450

429451
- [Perimeter 81 Activity Logs](data-connectors/perimeter-81-activity-logs.md)
430452

453+
## Phosphorus Cybersecurity
454+
455+
- [Phosphorus Devices](data-connectors/phosphorus-devices.md)
456+
431457
## Prancer Enterprise
432458

433459
- [Prancer Data Connector](data-connectors/prancer-data-connector.md)
@@ -442,6 +468,10 @@ For more information about the codeless connector platform, see [Create a codele
442468
- [Qualys Vulnerability Management (using Azure Functions)](data-connectors/qualys-vulnerability-management.md)
443469
- [Qualys VM KnowledgeBase (using Azure Functions)](data-connectors/qualys-vm-knowledgebase.md)
444470

471+
## Radiflow
472+
473+
- [Radiflow iSID via AMA](data-connectors/radiflow-isid-via-ama.md)
474+
445475
## Rubrik, Inc.
446476

447477
- [Rubrik Security Cloud data connector (using Azure Functions)](data-connectors/rubrik-security-cloud-data-connector.md)
@@ -470,6 +500,10 @@ For more information about the codeless connector platform, see [Create a codele
470500

471501
- [Seraphic Web Security](data-connectors/seraphic-web-security.md)
472502

503+
## Silverfort Ltd.
504+
505+
- [Silverfort Admin Console](data-connectors/silverfort-admin-console.md)
506+
473507
## Slack
474508

475509
- [Slack Audit (using Azure Functions)](data-connectors/slack-audit.md)
@@ -545,6 +579,11 @@ For more information about the codeless connector platform, see [Create a codele
545579
- [Zero Networks Segment Audit](data-connectors/zero-networks-segment-audit.md)
546580
- [Zero Networks Segment Audit (Function) (using Azure Functions)](data-connectors/zero-networks-segment-audit.md)
547581

582+
## Zerofox, Inc.
583+
584+
- [ZeroFox CTI (using Azure Functions)](data-connectors/zerofox-cti.md)
585+
- [ZeroFox Enterprise - Alerts (Polling CCP)](data-connectors/zerofox-enterprise-alerts-polling-ccp.md)
586+
548587
## Zimperium, Inc.
549588

550589
- [Zimperium Mobile Threat Defense](data-connectors/zimperium-mobile-threat-defense.md)
Lines changed: 160 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,160 @@
1+
---
2+
title: "Armis Alerts Activities (using Azure Functions) connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Armis Alerts Activities (using Azure Functions) to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 10/15/2024
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
ms.collection: sentinel-data-connector
10+
---
11+
12+
# Armis Alerts Activities (using Azure Functions) connector for Microsoft Sentinel
13+
14+
The [Armis](https://www.armis.com/) Alerts Activities connector gives the capability to ingest Armis Alerts and Activities into Microsoft Sentinel through the Armis REST API. Refer to the API documentation: `https://<YourArmisInstance>.armis.com/api/v1/docs` for more information. The connector provides the ability to get alert and activity information from the Armis platform and to identify and prioritize threats in your environment. Armis uses your existing infrastructure to discover and identify devices without having to deploy any agents.
15+
16+
This is autogenerated content. For changes, contact the solution provider.
17+
18+
## Connector attributes
19+
20+
| Connector attribute | Description |
21+
| --- | --- |
22+
| **Azure function app code** | https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-functionapp |
23+
| **Log Analytics table(s)** | Armis_Alerts_CL<br/> Armis_Activities_CL<br/> |
24+
| **Data collection rules support** | Not currently supported |
25+
| **Supported by** | [Armis Corporation](https://support.armis.com/) |
26+
27+
## Query samples
28+
29+
**Armis Alert Events - All Alerts.**
30+
31+
```kusto
32+
Armis_Alerts_CL
33+
34+
| sort by TimeGenerated desc
35+
```
36+
37+
**Armis Activity Events - All Activities.**
38+
39+
```kusto
40+
Armis_Activities_CL
41+
42+
| sort by TimeGenerated desc
43+
```
44+
45+
46+
47+
## Prerequisites
48+
49+
To integrate with Armis Alerts Activities (using Azure Functions) make sure you have:
50+
51+
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
52+
- **REST API Credentials/permissions**: **Armis Secret Key** is required. See the documentation to learn more about API on the `https://<YourArmisInstance>.armis.com/api/v1/doc`
53+
54+
55+
## Vendor installation instructions
56+
57+
58+
> [!NOTE]
59+
> This connector uses Azure Functions to connect to the Armis API to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
60+
61+
62+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
63+
64+
65+
> [!NOTE]
66+
> This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ArmisActivities/ArmisAlerts and load the function code. The function usually takes 10-15 minutes to activate after solution installation/update.
67+
68+
69+
**STEP 1 - Configuration steps for the Armis API**
70+
71+
Follow these instructions to create an Armis API secret key.
72+
1. Log into your Armis instance
73+
2. Navigate to Settings -> API Management
74+
3. If the secret key has not already been created, press the Create button to create the secret key
75+
4. To access the secret key, press the Show button
76+
5. The secret key can now be copied and used during the Armis Alerts Activities connector configuration
77+
78+
79+
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
80+
81+
>**IMPORTANT:** Before deploying the Armis Alerts Activities data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following) readily available.., as well as the Armis API Authorization Key(s)
82+
83+
84+
85+
Option 1 - Azure Resource Manager (ARM) Template
86+
87+
Use this method for automated deployment of the Armis connector.
88+
89+
1. Click the **Deploy to Azure** button below.
90+
91+
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-azuredeploy) [![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-azuredeploy-gov)
92+
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
93+
3. Enter the below information :
94+
Function Name
95+
Workspace ID
96+
Workspace Key
97+
Armis Secret Key
98+
Armis URL (https://<armis-instance>.armis.com/api/v1/)
99+
Armis Alert Table Name
100+
Armis Activity Table Name
101+
Armis Schedule
102+
Avoid Duplicates (Default: true)
103+
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
104+
5. Click **Purchase** to deploy.
105+
106+
Option 2 - Manual Deployment of Azure Functions
107+
108+
Use the following step-by-step instructions to deploy the Armis Alerts Activities data connector manually with Azure Functions (Deployment via Visual Studio Code).
109+
110+
111+
**1. Deploy a Function App**
112+
113+
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
114+
115+
1. Download the [Azure Function App](https://aka.ms/sentinel-ArmisAlertsActivitiesAPI-functionapp) file. Extract archive to your local development computer.
116+
2. Start VS Code. Choose File in the main menu and select Open Folder.
117+
3. Select the top level folder from extracted files.
118+
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.
119+
If you aren't already signed in, choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose **Sign in to Azure**
120+
If you're already signed in, go to the next step.
121+
5. Provide the following information at the prompts:
122+
123+
a. **Select folder:** Choose a folder from your workspace or browse to one that contains your function app.
124+
125+
b. **Select Subscription:** Choose the subscription to use.
126+
127+
c. Select **Create new Function App in Azure** (Don't choose the Advanced option)
128+
129+
d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. ARMISXXXXX).
130+
131+
e. **Select a runtime:** Choose Python 3.11
132+
133+
f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
134+
135+
6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied.
136+
7. Go to Azure Portal for the Function App configuration.
137+
138+
139+
**2. Configure the Function App**
140+
141+
1. In the Function App, select the Function App Name and select **Configuration**.
142+
2. In the **Application settings** tab, select **+ New application setting**.
143+
3. Add each of the following application settings individually, with their respective values (case-sensitive):
144+
Workspace ID
145+
Workspace Key
146+
Armis Secret Key
147+
Armis URL (https://<armis-instance>.armis.com/api/v1/)
148+
Armis Alert Table Name
149+
Armis Activity Table Name
150+
Armis Schedule
151+
Avoid Duplicates (Default: true)
152+
logAnalyticsUri (optional)
153+
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
154+
4. Once all application settings have been entered, click **Save**.
155+
156+
157+
158+
## Next steps
159+
160+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/armisinc1668090987837.armis-solution?tab=Overview) in the Azure Marketplace.

0 commit comments

Comments
 (0)