Skip to content

Commit 92bd3e0

Browse files
committed
full draft
1 parent 7f7acd1 commit 92bd3e0

File tree

2 files changed

+43
-58
lines changed

2 files changed

+43
-58
lines changed

articles/defender-for-iot/organizations/integrate-overview.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -112,16 +112,5 @@ Integrate Microsoft Defender for Iot with partner services to view partner data
112112

113113
## Next steps
114114

115-
For more information, see:
116-
117-
**Device inventory**:
118-
119-
- [Use the Device inventory in the Azure portal](how-to-manage-device-inventory-for-organizations.md)
120-
- [Use the Device inventory in the OT sensor](how-to-investigate-sensor-detections-in-a-device-inventory.md)
121-
- [Use the Device inventory in the on-premises management console](how-to-investigate-all-enterprise-sensor-detections-in-a-device-inventory.md)
122-
123-
**Alerts**:
124-
125-
- [View alerts in the Azure portal](how-to-manage-cloud-alerts.md)
126-
- [View alerts in the OT sensor](how-to-view-alerts.md)
127-
- [View alerts in the on-premises management console](how-to-work-with-alerts-on-premises-management-console.md)
115+
> [!div class="nextstepaction"]
116+
> [Stream Defender for IoT cloud alerts to a partner SIEM](integrations/send-cloud-data-to-partners.md)

articles/defender-for-iot/organizations/integrations/send-cloud-data-to-partners.md

Lines changed: 41 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,12 @@ As more businesses convert OT systems to digital IT infrastructures, security op
1111

1212
We recommend using Microsoft Defender for IoT's out-of-the-box [data connector](../iot-solution.md) and [solution](../iot-advanced-threat-monitoring.md) to integrate with Microsoft Sentinel and bridge the gap between the IT and OT security challenge.
1313

14-
However, if you have other security information and event management (SIEM) systems, you can also use Microsoft Sentinel to forward Defender for IoT alerts on to that partner SIEM, via an Event Hub.
14+
However, if you have other security information and event management (SIEM) systems, you can also use Microsoft Sentinel to forward Defender for IoT cloud alerts on to that partner SIEM, via Microsoft Sentinel and an Event Hub.
1515

16-
This article describes how to use Microsoft Sentinel to forward Defender for IoT alert data on to partner SIEMs. While this article uses Splunk as an example, you can use this process with any SIEM that supports Event Hub ingestion, such as IBM QRadar.
16+
While this article uses Splunk as an example, you can use the process described below with any SIEM that supports Event Hub ingestion, such as IBM QRadar.
1717

1818
> [!IMPORTANT]
19-
> Using Event Hub and a Log Analytics export rule may incur additional charges. For more information, see Event Hubs pricing and Log Data Export pricing
20-
21-
> [!TIP]
22-
> This process described in this article supports alerts generated by cloud-connected sensors only. If you're working on-premises, such as in air-gapped environments, you may be able to create a forwarding alert rule to forward alert data directly from an OT sensor or on-premises management console. For more information, see [Integrations with Microsoft and partner services](../integrate-overview.md).
19+
> Using Event Hub and a Log Analytics export rule may incur additional charges. For more information, see [Event Hubs pricing](https://azure.microsoft.com/pricing/details/event-hubs/) and [Log Data Export pricing](https://azure.microsoft.com/pricing/details/monitor/).
2320
2421
## Prerequisites
2522

@@ -31,89 +28,88 @@ For more information, see [Tutorial: Connect Microsoft Defender for IoT with Mic
3128

3229
## Register an application in Azure Active Directory
3330

34-
You'll need Azure Active Directory (Azure AD) to defined as a service principal for the [Splunk Add-on for Microsoft Cloud Services](https://splunkbase.splunk.com/app/3110/). To do this, you'll need an Azure AD application with specific permissions.
31+
You'll need Azure Active Directory (Azure AD) defined as a service principal for the [Splunk Add-on for Microsoft Cloud Services](https://splunkbase.splunk.com/app/3110/). To do this, you'll need to create an Azure AD application with specific permissions.
3532

3633
**To register an Azure AD application and define permissions**:
3734

38-
1. In [Azure AD](/azure/active-directory/), register a new application and add a new client secret for the service principal.
35+
1. In [Azure AD](/azure/active-directory/), register a new application. On the **Certificates & secrets** page, add a new client secret for the service principal.
3936

4037
For more information, see [Register an application with the Microsoft identity platform](/azure/active-directory/develop/quickstart-register-app)
4138

4239
1. In your app's **API permissions** page, grant API permissions to read data from your app.
4340

44-
1. Select to add a permission and then select **Microsoft Graph** > **Application permissions** > **SecurityEvents.ReadWrite.All**.
41+
1. Select to add a permission and then select **Microsoft Graph** > **Application permissions** > **SecurityEvents.ReadWrite.All** > **Add permissions**.
4542

46-
1. Make sure that admin consent is required for your permissions.
43+
1. Make sure that admin consent is required for your permission.
4744

4845
For more information, see [Configure a client application to access a web API](/azure/active-directory/develop/quickstart-configure-app-access-web-apis#add-permissions-to-access-your-web-api)
4946

50-
1. From your app's **Overview** and **Certificates & secrets** pages, note the following values for your app:
47+
1. From your app's **Overview** page, note the following values for your app:
48+
49+
- **Display name**
50+
- **Application (client) ID**
51+
- **Directory (tenant) ID**
5152

52-
- Display name
53-
- Application (Client) ID
54-
- Application (Client) secret
55-
- Directory (tenant) ID
5653

54+
1. From the **Certificates & secrets** page, note the values of your client secret **Value** and *Secret ID**.
5755

5856
## Create an Azure Event Hub
5957

6058
Create an Azure Event Hub to use as a bridge between Microsoft Sentinel and your partner SIEM. Start this step by creating an Azure Event Hub namespace, and then adding an Azure Event Hub.
6159

6260
**To create your Event Hub namespace and Event Hub**:
6361

62+
1. In Azure Event Hubs, create a new Event Hubs namespace. In your new namespace, create a new Azure event hub.
6463

65-
1. In Azure Event Hubs, create a new Event Hubs namespace and then create an Azure event hub within the namespace.
66-
67-
Make sure to define the **Partition Count** and **Message Retention** settings.
64+
In your event hub, make sure to define the **Partition Count** and **Message Retention** settings.
6865

6966
For more information, see [Create an event hub using the Azure portal](/azure/event-hubs/event-hubs-create).
7067

71-
1. In your Event Hubs namespace, select the **Access control (IAM)** page and add a new role assignment. Add the Azure AD service principle that you'd created earlier, and define the delegate as **Azure Event Hubs Data Receiver**.
68+
1. In your Event Hubs namespace, select the **Access control (IAM)** page and add a new role assignment.
69+
70+
Select to use the **Azure Event Hubs Data Receiver** role, and add the Azure AD service principle app that you'd created [earlier](#register-an-application-in-azure-active-directory) as a member.
7271

73-
For more information, see:
72+
For more information, see: [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal).
7473

75-
1. In your Event Hubs namespace, make a note of the following values:
74+
1. In your Event Hubs namespace's **Overview** page, make a note of the namespace's **Host name** value.
7675

77-
- Host name
78-
- Azure Event Hub name
76+
1. In your Event Hubs namespace's **Event Hubs** page, make a note of your event hub's name.
7977

8078
## Forward Microsoft Sentinel incidents to your Event Hub
8179

82-
To forward Microsoft Sentinel incidents or alerts to Azure Event Hub, you’ll need to define your Microsoft Sentinel workspace with a data export rule.
80+
To forward Microsoft Sentinel incidents or alerts to Azure Event Hub, create a data export from Azure Log Analytics.
8381

82+
In your rule, make sure to define the following settings:
8483

85-
In the Azure Portal, navigate to Log Analytics > select the workspace name related to Microsoft Sentinel > Data Export > New export rule.
86-
thumbnail image 8 of blog post titled
84+
- Configure the **Source** as **SecurityIncident**
85+
- Configure the **Destination** as **Event Type**, using the Event Hub namespace and Event Hub name you'd recorded earlier.
8786

88-
Name the rule, configure the Source as SecurityIncident and the Destination as Event Type utilizing the Event Hub Namespace and Event Hub Name configured previously. Click on Create.
89-
thumbnail image 9 of blog post titled
87+
For more information, see [Log Analytics workspace data export in Azure Monitor](/azure/azure-monitor/logs/logs-data-export?tabs=portal#create-or-update-a-data-export-rule).
9088

9189
## Configure Splunk to consume Microsoft Sentinel incidents
9290

91+
Once you have your event hub and export rule configured, configure Splunk to consume Microsoft Sentinel incidents from the event hub.
9392

94-
5. Configure Splunk to consume Microsoft Sentinel Incidents from Azure Event Hub
95-
For Microsoft Defender for IoT alerts to be ingested into Azure Event Hub, install the Splunk Add-on for Microsoft Cloud Services app.
93+
1. Install the [Splunk Add-on for Microsoft Cloud Services](https://splunkbase.splunk.com/app/3110/) app.
9694

95+
1. In the Splunk Add-on for Microsoft Cloud Services app, add an Azure App account.
9796

98-
For the installation, open the Splunk portal and navigate to Apps > Find More Apps. For the dashboard find the Splunk Add-on for Microsoft Cloud Services app and Install.
99-
thumbnail image 10 of blog post titled
97+
1. Enter a meaningful name for the account.
98+
1. Enter the client ID, client secret, and tenant ID details that you'd recorded earlier.
99+
1. Define the account class type as **Azure Public Cloud**.
100100

101-
To add the Azure AD Service Principal, open the Splunk app and navigate to Azure App Account > Add. Use the details you’d noted earlier:
102-
Define a Name for the Azure App Account
101+
1. Go to the Splunk Add-on for Microsoft Cloud Services inputs, and create a new input for your Azure event hub.
103102

104-
Add the Client ID, Client Secret, Tenant ID
103+
1. Enter a meaningful name for your input.
104+
1. Select the Azure App Account that you'd just created in the Splunk Add-on for Microsoft Services app.
105+
1. Enter your event hub namespace FQDN and event hub name.
105106

106-
Choose Azure Public Cloud as Account Class Type
107+
Leave other settings as their defaults.
107108

108-
Click Update to save and close the configuration.
109-
thumbnail image 11 of blog post titled
109+
Once data starts getting ingested into Splunk from your event hub, query the data by using the following value in your search field: `sourcetype="mscs:azure:eventhub"`
110110

111-
Now navigate to Inputs within the Splunk Add-on for Microsoft Cloud Services app and select Azure Event Hub in Create New Input selection.
111+
## Next steps
112112

113-
Define a Name for the Azure Event Hub as Input, select the Azure App Account created before, define the Event Hub Namespace (FQDN), Event Hub Name, let the other settings as default and click Update to save and close the configuration.
114-
thumbnail image 12 of blog post titled
115-
116-
Once the ingestion is processed, you can query the data by using sourcetype="mscs:azure:eventhub" in search field.
117-
thumbnail image 13 of blog post titled
118-
113+
This article describes how to forward alerts generated by cloud-connected sensors only. If you're working on-premises, such as in air-gapped environments, you may be able to create a forwarding alert rule to forward alert data directly from an OT sensor or on-premises management console.
119114

115+
For more information, see [Integrations with Microsoft and partner services](../integrate-overview.md).

0 commit comments

Comments
 (0)