You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/infoblox-cloud-data-connector.md
+28-25Lines changed: 28 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,10 +88,12 @@ InfobloxCDC
88
88
## Vendor installation instructions
89
89
90
90
91
-
>**IMPORTANT:** This data connector depends on a parser based on a Kusto Function to work as expected called [**InfobloxCDC**](https://aka.ms/sentinel-InfobloxCloudDataConnector-parser) which is deployed with the solution.
91
+
> [!IMPORTANT]
92
+
> This data connector depends on a parser based on a Kusto Function to work as expected called **InfobloxCDC** which is deployed with the solution.
92
93
93
94
94
-
>**IMPORTANT:** This Microsoft Sentinel data connector assumes an Infoblox Cloud Data Connector host has already been created and configured in the Infoblox Cloud Services Portal (CSP). As the [**Infoblox Cloud Data Connector**](https://docs.infoblox.com/display/BloxOneThreatDefense/Deploying+the+Data+Connector+Solution) is a feature of BloxOne Threat Defense, access to an appropriate BloxOne Threat Defense subscription is required. See this [**quick-start guide**](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-data-connector.pdf) for more information and licensing requirements.
95
+
> [!IMPORTANT]
96
+
> This Microsoft Sentinel data connector assumes an Infoblox Cloud Data Connector host has already been created and configured in the Infoblox Cloud Services Portal (CSP). As the [**Infoblox Cloud Data Connector**](https://docs.infoblox.com/display/BloxOneThreatDefense/Deploying+the+Data+Connector+Solution) is a feature of BloxOne Threat Defense, access to an appropriate BloxOne Threat Defense subscription is required. See this [**quick-start guide**](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-data-connector.pdf) for more information and licensing requirements.
95
97
96
98
1. Linux Syslog agent configuration
97
99
@@ -101,7 +103,7 @@ Install and configure the Linux agent to collect your Common Event Format (CEF)
101
103
102
104
1.1 Select or create a Linux machine
103
105
104
-
Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Microsoft Sentinel or other clouds.
106
+
Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-premises environment, Microsoft Sentinel or other clouds.
105
107
106
108
1.2 Install the CEF collector on the Linux machine
107
109
@@ -118,35 +120,36 @@ Install the Microsoft Monitoring Agent on your Linux machine and configure the m
118
120
2. Configure Infoblox BloxOne to send Syslog data to the Infoblox Cloud Data Connector to forward to the Syslog agent
119
121
120
122
Follow the steps below to configure the Infoblox CDC to send BloxOne data to Microsoft Sentinel via the Linux Syslog agent.
121
-
2. Navigate to **Manage > Data Connector**.
122
-
3. Click the **Destination Configuration** tab at the top.
123
-
4. Click **Create > Syslog**.
124
-
-**Name**: Give the new Destination a meaningful **name**, such as **Microsoft-Sentinel-Destination**.
125
-
-**Description**: Optionally give it a meaningful **description**.
126
-
-**State**: Set the state to **Enabled**.
127
-
-**Format**: Set the format to **CEF**.
128
-
-**FQDN/IP**: Enter the IP address of the Linux device on which the Linux agent is installed.
129
-
-**Port**: Leave the port number at **514**.
130
-
-**Protocol**: Select desired protocol and CA certificate if applicable.
131
-
- Click **Save & Close**.
132
-
5. Click the **Traffic Flow Configuration** tab at the top.
133
-
6. Click **Create**.
134
-
-**Name**: Give the new Traffic Flow a meaningful **name**, such as **Microsoft-Sentinel-Flow**.
135
-
-**Description**: Optionally give it a meaningful **description**.
136
-
-**State**: Set the state to **Enabled**.
137
-
- Expand the **CDC Enabled Host** section.
138
-
-**On-Prem Host**: Select your desired on-prem host for which the Data Connector service is enabled.
139
-
- Expand the **Source Configuration** section.
123
+
124
+
1. Navigate to **Manage > Data Connector**.
125
+
1. Click the **Destination Configuration** tab at the top.
126
+
1. Click **Create > Syslog**.
127
+
-**Name**: Give the new Destination a meaningful **name**, such as **Microsoft-Sentinel-Destination**.
128
+
-**Description**: Optionally give it a meaningful **description**.
129
+
-**State**: Set the state to **Enabled**.
130
+
-**Format**: Set the format to **CEF**.
131
+
-**FQDN/IP**: Enter the IP address of the Linux device on which the Linux agent is installed.
132
+
-**Port**: Leave the port number at **514**.
133
+
-**Protocol**: Select desired protocol and CA certificate if applicable.
134
+
- Click **Save & Close**.
135
+
1. Click the **Traffic Flow Configuration** tab at the top.
136
+
1. Click **Create**.
137
+
-**Name**: Give the new Traffic Flow a meaningful **name**, such as **Microsoft-Sentinel-Flow**.
138
+
-**Description**: Optionally give it a meaningful **description**.
139
+
-**State**: Set the state to **Enabled**.
140
+
- Expand the **CDC Enabled Host** section.
141
+
-**On-Prem Host**: Select your desired on-premises host for which the Data Connector service is enabled.
142
+
- Expand the **Source Configuration** section.
140
143
-**Source**: Select **BloxOne Cloud Source**.
141
144
- Select all desired **log types** you wish to collect. Currently supported log types are:
142
145
- Threat Defense Query/Response Log
143
146
- Threat Defense Threat Feeds Hits Log
144
147
- DDI Query/Response Log
145
148
- DDI DHCP Lease Log
146
-
- Expand the **Destination Configuration** section.
149
+
- Expand the **Destination Configuration** section.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/island-enterprise-browser-admin-audit-polling-ccp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ To integrate with Island Enterprise Browser Admin Audit (Polling CCP) make sure
44
44
45
45
Connect Island to Microsoft Sentinel
46
46
47
-
Provide the Island API URL and Key. API URL is https://management.island.io/api/external/v1/adminActions for US or https://eu.management.island.io/api/external/v1/adminActions for EU.
47
+
Provide the Island API URL and Key. API URL is ```https://management.island.io/api/external/v1/adminActions``` for US or ```https://eu.management.island.io/api/external/v1/adminActions``` for EU.
48
48
Generate the API Key in the Management Console under Settings > API.
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-microsoftdefenderforoffice?tab=Overview) in the Azure Marketplace.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/netskope-using-azure-functions.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,12 +49,10 @@ Netskope
49
49
To integrate with Netskope (using Azure Functions) make sure you have:
50
50
51
51
-**Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
52
-
-**Netskope API Token**: A Netskope API Token is required. [See the documentation to learn more about Netskope API](https://innovatechcloud.goskope.com/docs/Netskope_Help/en/rest-api-v1-overview.html). **Note:** A Netskope account is required
53
-
52
+
-**Netskope API Token**: A Netskope account and API Token are required.
54
53
55
54
## Vendor installation instructions
56
55
57
-
58
56
> [!NOTE]
59
57
> - This connector uses Azure Functions to connect to Netskope to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
60
58
> - This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias Netskope and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Netskope/Parsers/Netskope.txt), on the second line of the query, enter the hostname(s) of your Netskope device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
@@ -72,7 +70,7 @@ To integrate with Netskope (using Azure Functions) make sure you have:
72
70
73
71
Option 1 - Azure Resource Manager (ARM) Template
74
72
75
-
This method provides an automated deployment of the Netskope connector using an ARM Tempate.
73
+
This method provides an automated deployment of the Netskope connector using an ARM Template.
76
74
77
75
1. Click the **Deploy to Azure** button below.
78
76
@@ -94,10 +92,10 @@ This method provides the step-by-step instructions to deploy the Netskope connec
94
92
95
93
**1. Create a Function App**
96
94
97
-
1. From the Azure Portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
95
+
1. From the Azure portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
98
96
2. In the **Basics** tab, ensure Runtime stack is set to **Powershell Core**.
99
97
3. In the **Hosting** tab, ensure the **Consumption (Serverless)** plan type is selected.
100
-
4. Make other preferrable configuration changes, if needed, then click **Create**.
98
+
4. Make other preferable configuration changes, if needed, then click **Create**.
101
99
102
100
103
101
**2. Import Function App Code**
@@ -121,9 +119,9 @@ This method provides the step-by-step instructions to deploy the Netskope connec
121
119
timeInterval
122
120
logTypes
123
121
logAnalyticsUri (optional)
124
-
- Enter the URI that corresponds to your region. The `uri` value must follow the following schema: `https://<Tenant Name>.goskope.com` - There is no need to add subsquent parameters to the Uri, the Function App will dynamically append the parameteres in the proper format.
122
+
- Enter the URI that corresponds to your region. The `uri` value must follow the following schema: `https://<Tenant Name>.goskope.com` - There is no need to add subsequent parameters to the Uri, the Function App will dynamically append the parameters in the proper format.
125
123
- Set the `timeInterval` (in minutes) to the default value of `5` to correspond to the default Timer Trigger of every `5` minutes. If the time interval needs to be modified, it is recommended to change the Function App Timer Trigger accordingly to prevent overlapping data ingestion.
126
-
- Set the `logTypes` to `alert, page, application, audit, infrastructure, network` - This list represents all the avaliable log types. Select the log types based on logging requirements, seperating each by a single comma.
124
+
- Set the `logTypes` to `alert, page, application, audit, infrastructure, network` - This list represents all the available log types. Select the log types based on logging requirements, separating each by a single comma.
127
125
> [!NOTE]
128
126
> If using Azure Key Vault, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
129
127
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/symantec-vip.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,12 +64,9 @@ Configure the facilities you want to collect and their severities.
64
64
2. Select **Apply below configuration to my machines** and select the facilities and severities.
65
65
3. Click **Save**.
66
66
67
+
3. Connect the Symantec VIP
67
68
68
-
3. Configure and connect the Symantec VIP
69
-
70
-
[Follow these instructions](https://help.symantec.com/cs/VIP_EG_INSTALL_CONFIG/VIP/v134652108_v128483142/Configuring-syslog) to configure the Symantec VIP Enterprise Gateway to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
71
-
72
-
69
+
Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
0 commit comments