Skip to content

Commit 5d00004

Browse files
authored
Merge pull request #236360 from cwatson-cat/4-29-23-dc-rfh
Sentinel auto gen data connectors - refresh list EO April
2 parents 09b0e2e + b21653d commit 5d00004

File tree

6 files changed

+67
-40
lines changed

6 files changed

+67
-40
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22567,6 +22567,11 @@
2256722567
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-cast-access-request.md",
2256822568
"redirect_url": "/azure/healthcare-apis/dicom/dicom-cast-overview",
2256922569
"redirect_document_id": false
22570+
},
22571+
{
22572+
"source_path_from_root": "/articles/sentinel/data-connectors/azure-information-protection.md",
22573+
"redirect_url": "/azure/sentinel/data-connectors-reference",
22574+
"redirect_document_id": false
2257022575
}
2257122576
]
2257222577
}

articles/sentinel/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -321,8 +321,6 @@
321321
href: data-connectors/azure-event-hub.md
322322
- name: Azure Firewall
323323
href: data-connectors/azure-firewall.md
324-
- name: Azure Information Protection
325-
href: data-connectors/azure-information-protection.md
326324
- name: Azure Key Vault
327325
href: data-connectors/azure-key-vault.md
328326
- name: Azure Kubernetes Service (AKS)
@@ -407,6 +405,8 @@
407405
href: data-connectors/cyberpion-security-logs.md
408406
- name: Cybersixgill Actionable Alerts (using Azure Function)
409407
href: data-connectors/cybersixgill-actionable-alerts-using-azure-function.md
408+
- name: Cynerio Security Events
409+
href: data-connectors/cynerio-security-events.md
410410
- name: Darktrace Connector for Microsoft Sentinel REST API
411411
href: data-connectors/darktrace-connector-for-microsoft-sentinel-rest-api.md
412412
- name: Delinea Secret Server

articles/sentinel/data-connectors-reference.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Find your Microsoft Sentinel data connector | Microsoft Docs
33
description: Learn about specific configuration steps for Microsoft Sentinel data connectors.
44
author: cwatson-cat
55
ms.topic: reference
6-
ms.date: 04/18/2023
6+
ms.date: 03/25/2023
77
ms.author: cwatson
88
---
99

@@ -188,6 +188,10 @@ Data connectors are available as part of the following offerings:
188188

189189
- [Cybersixgill Actionable Alerts (using Azure Function)](data-connectors/cybersixgill-actionable-alerts-using-azure-function.md)
190190

191+
## Cynerio
192+
193+
- [Cynerio Security Events](data-connectors/cynerio-security-events.md)
194+
191195
## Darktrace
192196

193197
- [AI Analyst Darktrace](data-connectors/ai-analyst-darktrace.md)
@@ -352,7 +356,6 @@ Data connectors are available as part of the following offerings:
352356
- [Azure Data Lake Storage Gen1](data-connectors/azure-data-lake-storage-gen1.md)
353357
- [Azure DDoS Protection](data-connectors/azure-ddos-protection.md)
354358
- [Azure Event Hub](data-connectors/azure-event-hub.md)
355-
- [Azure Information Protection](data-connectors/azure-information-protection.md)
356359
- [Azure Key Vault](data-connectors/azure-key-vault.md)
357360
- [Azure Kubernetes Service (AKS)](data-connectors/azure-kubernetes-service-aks.md)
358361
- [Azure Logic Apps](data-connectors/azure-logic-apps.md)

articles/sentinel/data-connectors/auth0-access-management-using-azure-function.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ To integrate with Auth0 Access Management (using Azure Function) make sure you h
5656
Follow the instructions to obtain the credentials.
5757

5858
1. In Auth0 Dashboard, go to **Applications > Applications**.
59-
2. Select your Application.
59+
2. Select your Application. This should be a "Machine-to-Machine" Application configured with at least **read:logs** and **read:logs_users** permissions.
6060
3. Copy **Domain, ClientID, Client Secret**
6161

6262

articles/sentinel/data-connectors/azure-information-protection.md

Lines changed: 0 additions & 35 deletions
This file was deleted.
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: "Cynerio Security Events connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Cynerio Security Events to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 04/29/2023
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
---
10+
11+
# Cynerio Security Events connector for Microsoft Sentinel
12+
13+
The [Cynerio](https://www.cynerio.com/) connector allows you to easily connect your Cynerio Security Events with Microsoft Sentinel, to view IDS Events. This gives you more insight into your organization network security posture and improves your security operation capabilities.
14+
15+
## Connector attributes
16+
17+
| Connector attribute | Description |
18+
| --- | --- |
19+
| **Log Analytics table(s)** | CynerioEvent_CL<br/> |
20+
| **Data collection rules support** | Not currently supported |
21+
| **Supported by** | [Cynerio](https://cynerio.com) |
22+
23+
## Query samples
24+
25+
**SSH Connections events in the last 24 hours**
26+
```kusto
27+
CynerioEvent_CL
28+
29+
| where date_t > ago(24h) and title_s == 'SSH Connection'
30+
```
31+
32+
33+
34+
## Vendor installation instructions
35+
36+
Configure and connect Cynerio
37+
38+
Cynerio can integrate with and export events directly to Microsoft Sentinel via Azure Server. Follow these steps to establish integration:
39+
40+
1. In the Cynerio console, go to Settings > Integrations tab (default), and click on the **+Add Integration** button at the top right.
41+
42+
2. Scroll down to the **SIEM** section.
43+
44+
3. On the Microsoft Sentinel card, click the Connect button.
45+
46+
4. The Integration Details window opens. Use the parameters below to fill out the form and set up the connection.
47+
48+
49+
50+
51+
52+
## Next steps
53+
54+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/cynerio1681887657820.cynerio-medical-device-security-sentinel-connector?tab=Overview) in the Azure Marketplace.

0 commit comments

Comments
 (0)