@@ -330,25 +330,9 @@ Before setting up the new Azure Activity log connector, you must disconnect the
330
330
| ** Supported by** | Microsoft |
331
331
| | |
332
332
333
- ## Microsoft Defender for Cloud
333
+ ## Azure Defender
334
334
335
- | Connector attribute | Description |
336
- | --- | --- |
337
- | ** Data ingestion method** | ** Azure service-to-service integration:<br >[ Connect security alerts from Microsoft Defender for Cloud] ( connect-defender-for-cloud.md ) ** (Top connector article) |
338
- | ** Log Analytics table(s)** | SecurityAlert |
339
- | ** Supported by** | Microsoft |
340
- | | |
341
-
342
- <a name =" azure-defender-for-iot " ></a >
343
-
344
- ## Microsoft Defender for IoT
345
-
346
- | Connector attribute | Description |
347
- | --- | --- |
348
- | ** Data ingestion method** | ** Azure service-to-service integration: <br >[ API-based connections] ( connect-azure-windows-microsoft-services.md#api-based-connections ) ** |
349
- | ** Log Analytics table(s)** | SecurityAlert |
350
- | ** Supported by** | Microsoft |
351
- | | |
335
+ See [ Microsoft Defender for Cloud] ( #microsoft-defender-for-cloud ) .
352
336
353
337
## Azure Firewall
354
338
@@ -445,12 +429,14 @@ You will only see the storage types that you actually have defined resources for
445
429
446
430
| Connector attribute | Description |
447
431
| --- | --- |
448
- | ** Data ingestion method** | [ ** Log Analytics agent - custom logs ** ] ( connect-custom-logs .md ) |
449
- | ** Log Analytics table(s)** | Syslog |
432
+ | ** Data ingestion method** | [ ** Syslog ** ] ( connect-syslog .md ) |
433
+ | ** Log Analytics table(s)** | CommonSecurityLog (Barracuda)< br >Barracuda_CL |
450
434
| ** Vendor documentation/<br >installation instructions** | https://aka.ms/asi-barracuda-connector |
451
435
| ** Supported by** | [ Barracuda] ( https://www.barracuda.com/support ) |
452
436
| | |
453
437
438
+ See Barracuda instructions - note the assigned facilities for the different types of logs and be sure to add them to the default Syslog configuration.
439
+
454
440
## BETTER Mobile Threat Defense (MTD) (Preview)
455
441
456
442
| Connector attribute | Description |
@@ -1063,6 +1049,15 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
1063
1049
| ** Supported by** | Microsoft |
1064
1050
| | |
1065
1051
1052
+ # # Microsoft Defender for Cloud
1053
+
1054
+ | Connector attribute | Description |
1055
+ | --- | --- |
1056
+ | ** Data ingestion method** | ** Azure service-to-service integration:< br> [Connect security alerts from Microsoft Defender for Cloud](connect-defender-for-cloud.md)** (Top connector article) |
1057
+ | ** Log Analytics table(s)** | SecurityAlert |
1058
+ | ** Supported by** | Microsoft |
1059
+ | | |
1060
+
1066
1061
< a name=" microsoft-cloud-app-security-mcas" ></a>
1067
1062
1068
1063
# # Microsoft Defender for Cloud Apps
@@ -1093,6 +1088,17 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
1093
1088
| ** Supported by** | Microsoft |
1094
1089
| | |
1095
1090
1091
+ < a name=" azure-defender-for-iot" ></a>
1092
+
1093
+ # # Microsoft Defender for IoT
1094
+
1095
+ | Connector attribute | Description |
1096
+ | --- | --- |
1097
+ | ** Data ingestion method** | ** Azure service-to-service integration: < br> [API-based connections](connect-azure-windows-microsoft-services.md#api-based-connections)** |
1098
+ | ** Log Analytics table(s)** | SecurityAlert |
1099
+ | ** Supported by** | Microsoft |
1100
+ | | |
1101
+
1096
1102
# # Microsoft Defender for Office 365
1097
1103
1098
1104
| Connector attribute | Description |
0 commit comments