Skip to content

Commit 7d37779

Browse files
authored
Merge pull request #232142 from cwatson-cat/3-26-23-gen-data-connectors-refresh-dc
Sentinel auto-gen data connectors: refresh list
2 parents 9c71f78 + 1a51fea commit 7d37779

File tree

76 files changed

+498
-320
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+498
-320
lines changed

articles/sentinel/TOC.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -345,7 +345,7 @@
345345
href: data-connectors/blackberry-cylanceprotect.md
346346
- name: Box (using Azure Function)
347347
href: data-connectors/box-using-azure-function.md
348-
- name: Braodcom Symantec DLP
348+
- name: Broadcom Symantec DLP
349349
href: data-connectors/braodcom-symantec-dlp.md
350350
- name: Cisco Application Centric Infrastructure
351351
href: data-connectors/cisco-application-centric-infrastructure.md
@@ -403,6 +403,8 @@
403403
href: data-connectors/cyberarkepm.md
404404
- name: Cyberpion Security Logs
405405
href: data-connectors/cyberpion-security-logs.md
406+
- name: Cybersixgill Actionable Alerts (using Azure Function)
407+
href: data-connectors/cybersixgill-actionable-alerts-using-azure-function.md
406408
- name: Darktrace Connector for Microsoft Sentinel REST API
407409
href: data-connectors/darktrace-connector-for-microsoft-sentinel-rest-api.md
408410
- name: Delinea Secret Server
@@ -529,6 +531,8 @@
529531
href: data-connectors/microsoft-defender-for-iot.md
530532
- name: Microsoft Defender for Office 365
531533
href: data-connectors/microsoft-defender-for-office-365.md
534+
- name: Microsoft Defender Threat Intelligence (Preview)
535+
href: data-connectors/microsoft-defender-threat-intelligence.md
532536
- name: Microsoft PowerBI
533537
href: data-connectors/microsoft-powerbi.md
534538
- name: Microsoft Project
@@ -651,6 +655,8 @@
651655
href: data-connectors/symantec-vip.md
652656
- name: Syslog
653657
href: data-connectors/syslog.md
658+
- name: Talon Insights
659+
href: data-connectors/talon-insights.md
654660
- name: Tenable.io Vulnerability Management (using Azure Function)
655661
href: data-connectors/tenable-io-vulnerability-management-using-azure-function.md
656662
- name: TheHive Project - TheHive (using Azure Function)

articles/sentinel/data-connectors-reference.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Find your Microsoft Sentinel data connector | Microsoft Docs
33
description: Learn about specific configuration steps for Microsoft Sentinel data connectors.
44
author: cwatson-cat
55
ms.topic: reference
6-
ms.date: 03/06/2023
6+
ms.date: 03/25/2023
77
ms.author: cwatson
88
---
99

@@ -134,14 +134,14 @@ Data connectors are available as part of the following offerings:
134134
## Citrix
135135

136136
- [Citrix ADC (former NetScaler)](data-connectors/citrix-adc-former-netscaler.md)
137-
- [CITRIX SECURITY ANALYTICS](data-connectors/citrix-security-analytics.md)
138137

139138
## Claroty
140139

141140
- [Claroty](data-connectors/claroty.md)
142141

143142
## Cloud Software Group
144143

144+
- [CITRIX SECURITY ANALYTICS](data-connectors/citrix-security-analytics.md)
145145
- [Citrix WAF (Web App Firewall)](data-connectors/citrix-waf-web-app-firewall.md)
146146

147147
## Cloudflare
@@ -182,6 +182,10 @@ Data connectors are available as part of the following offerings:
182182

183183
- [Cyberpion Security Logs](data-connectors/cyberpion-security-logs.md)
184184

185+
## Cybersixgill
186+
187+
- [Cybersixgill Actionable Alerts (using Azure Function)](data-connectors/cybersixgill-actionable-alerts-using-azure-function.md)
188+
185189
## Darktrace
186190

187191
- [AI Analyst Darktrace](data-connectors/ai-analyst-darktrace.md)
@@ -362,6 +366,7 @@ Data connectors are available as part of the following offerings:
362366
- [Microsoft Defender for Identity](data-connectors/microsoft-defender-for-identity.md)
363367
- [Microsoft Defender for IoT](data-connectors/microsoft-defender-for-iot.md)
364368
- [Microsoft Defender for Office 365](data-connectors/microsoft-defender-for-office-365.md)
369+
- [Microsoft Defender Threat Intelligence (Preview)](data-connectors/microsoft-defender-threat-intelligence.md)
365370
- [Microsoft PowerBI](data-connectors/microsoft-powerbi.md)
366371
- [Microsoft Project](data-connectors/microsoft-project.md)
367372
- [Microsoft Purview (Preview)](data-connectors/microsoft-purview.md)
@@ -555,6 +560,10 @@ Data connectors are available as part of the following offerings:
555560
- [Symantec ProxySG](data-connectors/symantec-proxysg.md)
556561
- [Symantec VIP](data-connectors/symantec-vip.md)
557562

563+
## TALON CYBER SECURITY LTD
564+
565+
- [Talon Insights](data-connectors/talon-insights.md)
566+
558567
## Tenable
559568

560569
- [Tenable.io Vulnerability Management (using Azure Function)](data-connectors/tenable-io-vulnerability-management-using-azure-function.md)

articles/sentinel/data-connectors/akamai-security-events.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Akamai Security Events connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Akamai Security Events to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -16,10 +16,8 @@ Akamai Solution for Sentinel provides the capability to ingest [Akamai Security
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | AkamaiSIEMEvent |
20-
| **Kusto function url** | https://aka.ms/sentinel-akamaisecurityevents-parser |
2119
| **Log Analytics table(s)** | CommonSecurityLog (AkamaiSecurityEvents)<br/> |
22-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
2422

2523
## Query samples
@@ -39,7 +37,7 @@ AkamaiSIEMEvent
3937

4038

4139
> [!NOTE]
42-
> This data connector depends on a parser based on a Kusto Function to work as expected. [Follow these steps](https://aka.ms/sentinel-akamaisecurityevents-parser) to create the Kusto functions alias, **AkamaiSIEMEvent**
40+
> This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias Akamai Security Events and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Akamai%20Security%20Events/Parsers/AkamaiSIEMEvent.txt), on the second line of the query, enter the hostname(s) of your Akamai Security Events device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
4341
4442
1. Linux Syslog agent configuration
4543

@@ -96,4 +94,4 @@ Make sure to configure the machine's security according to your organization's s
9694

9795
## Next steps
9896

99-
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-akamai?tab=Overview) in the Azure Marketplace.
97+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-akamai?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/azure-ddos-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: "Azure DDoS Protection connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Azure DDoS Protection to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 03/14/2023
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# Azure DDoS Protection connector for Microsoft Sentinel
1212

13-
Connect to Azure DDoS Protection logs via Public IP Address Diagnostic Logs. In addition to the core DDoS protection in the platform, Azure DDoS Protection provides advanced DDoS mitigation capabilities against network attacks. It's automatically tuned to protect your specific Azure resources. Protection is simple to enable during the creation of new virtual networks. It can also be done after creation and requires no application or resource changes. For more information, see the [Microsoft Sentinel documentation](https://go.microsoft.com/fwlink/p/?linkid=2219760&wt.mc_id=sentinel_dataconnectordocs_content_cnl_csasci).
13+
Connect to Azure DDoS Protection Standard logs via Public IP Address Diagnostic Logs. In addition to the core DDoS protection in the platform, Azure DDoS Protection Standard provides advanced DDoS mitigation capabilities against network attacks. It's automatically tuned to protect your specific Azure resources. Protection is simple to enable during the creation of new virtual networks. It can also be done after creation and requires no application or resource changes. For more information, see the [Microsoft Sentinel documentation](https://go.microsoft.com/fwlink/p/?linkid=2219760&wt.mc_id=sentinel_dataconnectordocs_content_cnl_csasci).
1414

1515
## Connector attributes
1616

articles/sentinel/data-connectors/blackberry-cylanceprotect.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Blackberry CylancePROTECT connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Blackberry CylancePROTECT to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -16,10 +16,8 @@ The [Blackberry CylancePROTECT](https://www.blackberry.com/us/en/products/blackb
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | CylancePROTECT |
20-
| **Kusto function url** | https://aka.ms/sentinel-cylanceprotect-parser |
2119
| **Log Analytics table(s)** | Syslog (CylancePROTECT)<br/> |
22-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
2422

2523
## Query samples
@@ -56,7 +54,8 @@ To integrate with Blackberry CylancePROTECT make sure you have:
5654
## Vendor installation instructions
5755

5856

59-
>This data connector depends on a parser based on a Kusto Function to work as expected. [Follow the steps](https://aka.ms/sentinel-cylanceprotect-parser) to use the Kusto function alias, **CylancePROTECT**
57+
> [!NOTE]
58+
> This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias CyclanePROTECT and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Blackberry%20CylancePROTECT/Parsers/CylancePROTECT.txt), on the second line of the query, enter the hostname(s) of your CyclanePROTECT device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
6059
6160
1. Install and onboard the agent for Linux
6261

@@ -83,4 +82,4 @@ Configure the facilities you want to collect and their severities.
8382

8483
## Next steps
8584

86-
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-blackberrycylanceprotect?tab=Overview) in the Azure Marketplace.
85+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-blackberrycylanceprotect?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/braodcom-symantec-dlp.md

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,23 @@
11
---
2-
title: "Braodcom Symantec DLP connector for Microsoft Sentinel"
3-
description: "Learn how to install the connector Braodcom Symantec DLP to connect your data source to Microsoft Sentinel."
2+
title: "Broadcom Symantec DLP connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector Broadcom Symantec DLP to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

11-
# Braodcom Symantec DLP connector for Microsoft Sentinel
11+
# Broadcom Symantec DLP connector for Microsoft Sentinel
1212

13-
The [Broadcom Symantec Data Loss Prevention (DLP)](https://www.broadcom.com/products/cyber-security/information-protection/data-loss-prevention) connector allows you to easily connect your Symantec DLP with Azure Sentinel, to create custom dashboards, alerts, and improve investigation. This gives you more insight into your organization’s information, where it travels, and improves your security operation capabilities.
13+
The [Broadcom Symantec Data Loss Prevention (DLP)](https://www.broadcom.com/products/cyber-security/information-protection/data-loss-prevention) connector allows you to easily connect your Symantec DLP with Microsoft Sentinel, to create custom dashboards, alerts, and improve investigation. This gives you more insight into your organization’s information, where it travels, and improves your security operation capabilities.
1414

1515
## Connector attributes
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | SymantecDLP |
20-
| **Kusto function url** | https://aka.ms/sentinel-symantecdlp-parser |
2119
| **Log Analytics table(s)** | CommonSecurityLog (SymantecDLP)<br/> |
22-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
2422

2523
## Query samples
@@ -43,25 +41,24 @@ SymantecDLP
4341
```
4442

4543

46-
4744
## Vendor installation instructions
4845

4946

50-
>This data connector depends on a parser based on a Kusto Function to work as expected. [Follow the steps](https://aka.ms/sentinel-symantecdlp-parser) to use the Kusto function alias, **SymantecDLP**
47+
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias SymantecDLP and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Broadcom%20SymantecDLP/Parsers/SymantecDLP.txt). The function usually takes 10-15 minutes to activate after solution installation/update.
5148

5249
1. Linux Syslog agent configuration
5350

54-
Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Azure Sentinel.
51+
Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
5552

5653
> Notice that the data from all regions will be stored in the selected workspace
5754
5855
1.1 Select or create a Linux machine
5956

60-
Select or create a Linux machine that Azure Sentinel will use as the proxy between your security solution and Azure Sentinel this machine can be on your on-prem environment, Azure or other clouds.
57+
Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds.
6158

6259
1.2 Install the CEF collector on the Linux machine
6360

64-
Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Azure Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.
61+
Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.
6562

6663
> 1. Make sure that you have Python on your machine using the following command: python –version.
6764
@@ -73,7 +70,7 @@ Install the Microsoft Monitoring Agent on your Linux machine and configure the m
7370

7471
2. Forward Symantec DLP logs to a Syslog agent
7572

76-
Configure Symantec DLP to forward Syslog messages in CEF format to your Azure Sentinel workspace via the Syslog agent.
73+
Configure Symantec DLP to forward Syslog messages in CEF format to your Microsoft Sentinel workspace via the Syslog agent.
7774
1. [Follow these instructions](https://help.symantec.com/cs/DLP15.7/DLP/v27591174_v133697641/Configuring-the-Log-to-a-Syslog-Server-action?locale=EN_US) to configure the Symantec DLP to forward syslog
7875
2. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
7976

@@ -106,4 +103,4 @@ Make sure to configure the machine's security according to your organization's s
106103

107104
## Next steps
108105

109-
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-broadcomsymantecdlp?tab=Overview) in the Azure Marketplace.
106+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-broadcomsymantecdlp?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/cisco-application-centric-infrastructure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Cisco Application Centric Infrastructure connector for Microsoft Sentine
33
description: "Learn how to install the connector Cisco Application Centric Infrastructure to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -17,7 +17,7 @@ ms.author: cwatson
1717
| Connector attribute | Description |
1818
| --- | --- |
1919
| **Log Analytics table(s)** | Syslog (CiscoACIEvent)<br/> |
20-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2121
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
2222

2323
## Query samples
@@ -68,4 +68,4 @@ Open Log Analytics to check if the logs are received using the Syslog schema.
6868

6969
## Next steps
7070

71-
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-ciscoaci?tab=Overview) in the Azure Marketplace.
71+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-ciscoaci?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/cisco-meraki.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Cisco Meraki connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Cisco Meraki to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -16,8 +16,6 @@ The [Cisco Meraki](https://meraki.cisco.com/) connector allows you to easily con
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | CiscoMeraki |
20-
| **Kusto function url** | https://aka.ms/sentinel-ciscomeraki-parser |
2119
| **Log Analytics table(s)** | meraki_CL<br/> |
2220
| **Data collection rules support** | Not currently supported |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -56,11 +54,7 @@ To integrate with Cisco Meraki make sure you have:
5654
## Vendor installation instructions
5755

5856

59-
>This data connector depends on a parser (based on a Kusto Function) to work as expected. You have 2 options to get this parser into workspace
60-
61-
> 1. If you have installed this connector via Meraki solution in ContentHub then navigate to parser definition from your workspace (Logs --> Functions --> CiscoMeraki --> Load the function code) to add your Meraki device list in the query and save the function.
62-
63-
> 2. If you have not installed the Meraki solution from ContentHub then [Follow the steps](https://aka.ms/sentinel-ciscomeraki-parser) to use the Kusto function alias, **CiscoMeraki**
57+
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias CiscoMeraki and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CiscoMeraki/Parsers/CiscoMeraki.txt). The function usually takes 10-15 minutes to activate after solution installation/update.
6458

6559
1. Install and onboard the agent for Linux
6660

0 commit comments

Comments
 (0)