@@ -330,25 +330,9 @@ Before setting up the new Azure Activity log connector, you must disconnect the
330330| ** Supported by** | Microsoft |
331331| | |
332332
333- ## Microsoft Defender for Cloud
333+ ## Azure Defender
334334
335- | Connector attribute | Description |
336- | --- | --- |
337- | ** Data ingestion method** | ** Azure service-to-service integration:<br >[ Connect security alerts from Microsoft Defender for Cloud] ( connect-defender-for-cloud.md ) ** (Top connector article) |
338- | ** Log Analytics table(s)** | SecurityAlert |
339- | ** Supported by** | Microsoft |
340- | | |
341-
342- <a name =" azure-defender-for-iot " ></a >
343-
344- ## Microsoft Defender for IoT
345-
346- | Connector attribute | Description |
347- | --- | --- |
348- | ** Data ingestion method** | ** Azure service-to-service integration: <br >[ API-based connections] ( connect-azure-windows-microsoft-services.md#api-based-connections ) ** |
349- | ** Log Analytics table(s)** | SecurityAlert |
350- | ** Supported by** | Microsoft |
351- | | |
335+ See [ Microsoft Defender for Cloud] ( #microsoft-defender-for-cloud ) .
352336
353337## Azure Firewall
354338
@@ -445,12 +429,14 @@ You will only see the storage types that you actually have defined resources for
445429
446430| Connector attribute | Description |
447431| --- | --- |
448- | ** Data ingestion method** | [ ** Log Analytics agent - custom logs ** ] ( connect-custom-logs .md ) |
449- | ** Log Analytics table(s)** | Syslog |
432+ | ** Data ingestion method** | [ ** Syslog ** ] ( connect-syslog .md ) |
433+ | ** Log Analytics table(s)** | CommonSecurityLog (Barracuda)< br >Barracuda_CL |
450434| ** Vendor documentation/<br >installation instructions** | https://aka.ms/asi-barracuda-connector |
451435| ** Supported by** | [ Barracuda] ( https://www.barracuda.com/support ) |
452436| | |
453437
438+ See Barracuda instructions - note the assigned facilities for the different types of logs and be sure to add them to the default Syslog configuration.
439+
454440## BETTER Mobile Threat Defense (MTD) (Preview)
455441
456442| Connector attribute | Description |
@@ -1063,6 +1049,15 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
10631049| ** Supported by** | Microsoft |
10641050| | |
10651051
1052+ # # Microsoft Defender for Cloud
1053+
1054+ | Connector attribute | Description |
1055+ | --- | --- |
1056+ | ** Data ingestion method** | ** Azure service-to-service integration:< br> [Connect security alerts from Microsoft Defender for Cloud](connect-defender-for-cloud.md)** (Top connector article) |
1057+ | ** Log Analytics table(s)** | SecurityAlert |
1058+ | ** Supported by** | Microsoft |
1059+ | | |
1060+
10661061< a name=" microsoft-cloud-app-security-mcas" ></a>
10671062
10681063# # Microsoft Defender for Cloud Apps
@@ -1093,6 +1088,17 @@ Add http://localhost:8081/ under **Authorized redirect URIs** while creating [We
10931088| ** Supported by** | Microsoft |
10941089| | |
10951090
1091+ < a name=" azure-defender-for-iot" ></a>
1092+
1093+ # # Microsoft Defender for IoT
1094+
1095+ | Connector attribute | Description |
1096+ | --- | --- |
1097+ | ** Data ingestion method** | ** Azure service-to-service integration: < br> [API-based connections](connect-azure-windows-microsoft-services.md#api-based-connections)** |
1098+ | ** Log Analytics table(s)** | SecurityAlert |
1099+ | ** Supported by** | Microsoft |
1100+ | | |
1101+
10961102# # Microsoft Defender for Office 365
10971103
10981104| Connector attribute | Description |
0 commit comments