You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| **Azure Activity administrative events** | Azure Activity events (in the `AzureActivity` table) in the category `Administrative`. | `ASimAuditEventAzureActivity` |
25
25
| **Exchange 365 administrative events** | Exchange Administrative events collected using the Office 365 connector (in the `OfficeActivity` table). | `ASimAuditEventMicrosoftOffice365` |
26
-
| **Windows Log clear event** | Windows Event 1102 collected using the Azure Monitor Agent Security Events and WEF connectors (using the `SecurityEvent`, `WindowsEvent`, or `Event` tables). | `ASimAuditEventMicrosoftWindowsEvents` |
27
-
26
+
| **Windows Log clear event** | Windows Event 1102 collected using the Log Analytics agent Security Events connector or the Azure monitor agent Security Events and WEF connectors (using the `SecurityEvent`, `WindowsEvent`, or `Event` tables). | `ASimAuditEventMicrosoftWindowsEvents` |
27
+
28
28
## Authentication parsers
29
29
30
30
To use ASIM authentication parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimAuthentication). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
31
31
32
32
- **Windows sign-ins**
33
-
- Collected using the Azure Monitor Agent.
33
+
- Collected using the Log Analytics Agent or Azure Monitor Agent.
34
34
- Collected using either the Security Events connectors to the SecurityEvent table or using the WEF connector to the WindowsEvent table.
35
35
- Reported as Security Events (4624, 4625, 4634, and 4647).
36
36
- reported by Microsoft Defender XDR for Endpoint, collected using the Microsoft Defender XDR connector.
@@ -56,10 +56,11 @@ ASIM DNS parsers are available in every workspace. Microsoft Sentinel provides t
| - **Infoblox NIOS**<br> - **BIND**<br> - **BlucCat** | The same parsers support multiple sources. | `_Im_Dns_InfobloxNIOSVxx` |
59
-
| **Microsoft DNS Server** | Collected using:<br>- DNS connector for the Azure Monitor Agent<br>- NXlog | <br>`_Im_Dns_MicrosoftOMSVxx`<br>See Normalized DNS logs.<br>`_Im_Dns_MicrosoftNXlogVxx` |
60
-
| **Sysmon for Windows** (event 22) | Collected using the Azure Monitor Agentto the `Event` and `WindowsEvent` tables. | `_Im_Dns_MicrosoftSysmonVxx` |
59
+
| **Microsoft DNS Server** | Collected using:<br>- DNS connector for the Log Analytics Agent<br>- DNS connector for the Azure Monitor Agent<br>- NXlog | <br>`_Im_Dns_MicrosoftOMSVxx`<br>See Normalized DNS logs.<br>`_Im_Dns_MicrosoftNXlogVxx` |
60
+
| **Sysmon for Windows** (event 22) | Collected using:<br>- the Log Analytics Agent<br>- the Azure Monitor Agent<br><br>For both agents, both collecting to the<br> `Event` and `WindowsEvent` tables are supported. | `_Im_Dns_MicrosoftSysmonVxx` |
61
61
| **Vectra AI** | |`_Im_Dns_VectraIAVxx` |
62
62
| **Zscaler ZIA** | | `_Im_Dns_ZscalerZIAVxx` |
63
+
||||
63
64
64
65
Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimDNS).
65
66
@@ -70,11 +71,13 @@ To use ASIM File Activity parsers, deploy the parsers from the [Microsoft Sentin
70
71
71
72
- **Windows file activity**
72
73
- Reported by **Windows (event 4663)**:
74
+
- Collected using the Log Analytics Agent based Security Events connector to the SecurityEvent table.
73
75
- Collected using the Azure Monitor Agent based Security Events connector to the SecurityEvent table.
74
76
- Collected using the Azure Monitor Agent based WEF (Windows Event Forwarding) connector to the WindowsEvent table.
75
77
- Reported using **Sysmon file activity events** (Events 11, 23, and 26):
78
+
- Collected using the Log Analytics Agent to the Event table.
76
79
- Collected using the Azure Monitor Agent based WEF (Windows Event Forwarding) connector to the WindowsEvent table.
77
-
- Reported by **Microsoft Defender for Endpoint**, collected using the Microsoft Defender XDR connector.
80
+
- Reported by **Microsoft Defender XDR for Endpoint**, collected using the Microsoft Defender XDR connector.
78
81
- **Microsoft Office 365 SharePoint and OneDrive events**, collected using the Office Activity connector.
79
82
- **Azure Storage**, including Blob, File, Queue, and Table Storage.
80
83
@@ -101,9 +104,9 @@ ASIM Network Session parsers are available in every workspace. Microsoft Sentine
| **Windows Firewall logs** | Collected as Windows events using the Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
109
+
| **Windows Firewall logs** | Collected as Windows events using the Log Analytics Agent (Event table) or Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
107
110
| **Watchguard FirewareOW** | Collected using Syslog. | `_Im_NetworkSession_WatchGuardFirewareOSVxx` |
@@ -113,18 +116,18 @@ Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHu
113
116
114
117
To use ASIM Process Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimProcessEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
115
118
116
-
- **Security Events process creation (Event 4688)**, collected using the Azure Monitor Agent
117
-
- **Security Events process termination (Event 4689)**, collected using the Azure Monitor Agent
118
-
- **Sysmon process creation (Event 1)**, collected using the Azure Monitor Agent
119
-
- **Sysmon process termination (Event 5)**, collected using the Azure Monitor Agent
120
-
- **Microsoft Defender for Endpoint process creation**
119
+
- **Security Events process creation (Event 4688)**, collected using the Log Analytics Agent or Azure Monitor Agent
120
+
- **Security Events process termination (Event 4689)**, collected using the Log Analytics Agent or Azure Monitor Agent
121
+
- **Sysmon process creation (Event 1)**, collected using the Log Analytics Agent or Azure Monitor Agent
122
+
- **Sysmon process termination (Event 5)**, collected using the Log Analytics Agent or Azure Monitor Agent
123
+
- **Microsoft Defender XDR for Endpoint process creation**
121
124
122
125
## Registry Event parsers
123
126
124
127
To use ASIM Registry Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimRegistryEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
125
128
126
-
- **Security Events registry update (Events 4657 and 4663)**, collected using the Azure Monitor Agent
127
-
- **Sysmon registry monitoring events (Events 12, 13, and 14)**, collected using the Azure Monitor Agent
129
+
- **Security Events registry update (Events 4657 and 4663)**, collected using the Log Analytics Agent or Azure Monitor Agent
130
+
- **Sysmon registry monitoring events (Events 12, 13, and 14)**, collected using the Log Analytics Agent or Azure Monitor Agent
128
131
- **Microsoft Defender XDR for Endpoint registry events**
129
132
130
133
## Web Session parsers
@@ -135,7 +138,7 @@ ASIM Web Session parsers are available in every workspace. Microsoft Sentinel pr
0 commit comments