Skip to content

Commit 96ceec4

Browse files
Merge pull request #242629 from cwatson-cat/6-22-23-connector-refresh
Sentinel auto gen data connector refresh June
2 parents 1353c61 + 874cb88 commit 96ceec4

18 files changed

+141
-88
lines changed

articles/sentinel/data-connectors/ai-analyst-darktrace.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "AI Analyst Darktrace connector for Microsoft Sentinel"
33
description: "Learn how to install the connector AI Analyst Darktrace to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -17,7 +17,7 @@ The Darktrace connector lets users connect Darktrace Model Breaches in real-time
1717
| Connector attribute | Description |
1818
| --- | --- |
1919
| **Log Analytics table(s)** | CommonSecurityLog (Darktrace)<br/> |
20-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2121
| **Supported by** | [Darktrace](https://www.darktrace.com/en/contact/) |
2222

2323
## Query samples
@@ -57,7 +57,7 @@ Install the Microsoft Monitoring Agent on your Linux machine and configure the m
5757
5858
Run the following command to install and apply the CEF collector:
5959

60-
sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py python cef_installer.py {0} {1}
60+
`sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}`
6161

6262
2. Forward Common Event Format (CEF) logs to Syslog agent
6363

@@ -91,7 +91,7 @@ If the logs are not received, run the following connectivity validation script:
9191
9292
Run the following command to validate your connectivity:
9393

94-
sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py python cef_troubleshoot.py {0}
94+
`sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}`
9595

9696
4. Secure your machine
9797

articles/sentinel/data-connectors/apache-http-server.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Apache HTTP Server connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Apache HTTP Server to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -16,8 +16,6 @@ The Apache HTTP Server data connector provides the capability to ingest [Apache
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | ApacheHTTPServer |
20-
| **Kusto function url** | https://aka.ms/sentinel-apachehttpserver-parser |
2119
| **Log Analytics table(s)** | ApacheHTTPServer_CL<br/> |
2220
| **Data collection rules support** | Not currently supported |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -39,7 +37,7 @@ ApacheHTTPServer
3937

4038

4139
> [!NOTE]
42-
> This data connector depends on a parser based on a Kusto Function to work as expected. [Follow these steps](https://aka.ms/sentinel-apachehttpserver-parser) to create the Kusto Functions alias, **ApacheHTTPServer**
40+
> This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ApacheHTTPServer and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ApacheHTTPServer/Parsers/ApacheHTTPServer.txt). The function usually takes 10-15 minutes to activate after solution installation/update.
4341
4442
1. Install and onboard the agent for Linux or Windows
4543

articles/sentinel/data-connectors/apache-tomcat.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,19 @@ title: "Apache Tomcat connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Apache Tomcat to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# Apache Tomcat connector for Microsoft Sentinel
1212

13-
The Apache Tomcat data connector provides the capability to ingest [Apache Tomcat](http://tomcat.apache.org/) events into Microsoft Sentinel. Refer to [Apache Tomcat documentation](http://tomcat.apache.org/tomcat-10.0-doc/logging.html) for more information.
13+
The Apache Tomcat solution provides the capability to ingest [Apache Tomcat](http://tomcat.apache.org/) events into Microsoft Sentinel. Refer to [Apache Tomcat documentation](http://tomcat.apache.org/tomcat-10.0-doc/logging.html) for more information.
1414

1515
## Connector attributes
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | TomcatEvent |
20-
| **Kusto function url** | https://aka.ms/sentinel-ApacheTomcat-parser |
2119
| **Log Analytics table(s)** | Tomcat_CL<br/> |
2220
| **Data collection rules support** | Not currently supported |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -38,8 +36,7 @@ TomcatEvent
3836
## Vendor installation instructions
3937

4038

41-
> [!NOTE]
42-
> This data connector depends on a parser based on a Kusto Function to work as expected. [Follow these steps](https://aka.ms/sentinel-ApacheTomcat-parser) to create the Kusto Functions alias, **TomcatEvent**
39+
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias TomcatEvent and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tomcat/Parsers/TomcatEvent.txt).The function usually takes 10-15 minutes to activate after solution installation/update.
4340

4441

4542
> [!NOTE]

articles/sentinel/data-connectors/aruba-clearpass.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Aruba ClearPass connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Aruba ClearPass to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -16,10 +16,8 @@ The [Aruba ClearPass](https://www.arubanetworks.com/products/security/network-ac
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
19-
| **Kusto function alias** | ArubaClearPass |
20-
| **Kusto function url** | https://aka.ms/sentinel-arubaclearpass-parser |
2119
| **Log Analytics table(s)** | CommonSecurityLog (ArubaClearPass)<br/> |
22-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2321
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com/) |
2422

2523
## Query samples
@@ -47,7 +45,7 @@ ArubaClearPass
4745
## Vendor installation instructions
4846

4947

50-
>This data connector depends on a parser based on a Kusto Function to work as expected. [Follow the steps](https://aka.ms/sentinel-arubaclearpass-parser) to use the Kusto function alias, **ArubaClearPass**
48+
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias ArubaClearPass and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Aruba%20ClearPass/Parsers/ArubaClearPass.txt).The function usually takes 10-15 minutes to activate after solution installation/update.
5149

5250
1. Linux Syslog agent configuration
5351

@@ -69,7 +67,7 @@ Install the Microsoft Monitoring Agent on your Linux machine and configure the m
6967
7068
Run the following command to install and apply the CEF collector:
7169

72-
sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py python cef_installer.py {0} {1}
70+
`sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}`
7371

7472
2. Forward Aruba ClearPass logs to a Syslog agent
7573

@@ -93,11 +91,11 @@ If the logs are not received, run the following connectivity validation script:
9391
9492
Run the following command to validate your connectivity:
9593

96-
sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py python cef_troubleshoot.py {0}
94+
`sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}`
9795

9896
4. Secure your machine
9997

100-
Make sure to configure the machine's security according to your organizations security policy
98+
Make sure to configure the machine's security according to your organization's security policy
10199

102100

103101
[Learn more >](https://aka.ms/SecureCEF)

articles/sentinel/data-connectors/awake-security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Awake Security connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Awake Security to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -17,7 +17,7 @@ The Awake Security CEF connector allows users to send detection model matches fr
1717
| Connector attribute | Description |
1818
| --- | --- |
1919
| **Log Analytics table(s)** | CommonSecurityLog (AwakeSecurity)<br/> |
20-
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
20+
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
2121
| **Supported by** | [Arista - Awake Security](https://awakesecurity.com/) |
2222

2323
## Query samples
@@ -66,7 +66,7 @@ Install the Microsoft Monitoring Agent on your Linux machine and configure the m
6666
6767
Run the following command to install and apply the CEF collector:
6868

69-
sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py python cef_installer.py {0} {1}
69+
`sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}`
7070

7171
2. Forward Awake Adversarial Model match results to a CEF collector.
7272

@@ -101,7 +101,7 @@ If the logs are not received, run the following connectivity validation script:
101101
102102
Run the following command to validate your connectivity:
103103

104-
sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py python cef_troubleshoot.py {0}
104+
`sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}`
105105

106106
4. Secure your machine
107107

articles/sentinel/data-connectors/azure-ddos-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: "Azure DDoS Protection connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Azure DDoS Protection to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 06/06/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# Azure DDoS Protection connector for Microsoft Sentinel
1212

13-
Connect to Azure DDoS Protection logs via Public IP Address Diagnostic Logs. In addition to the core DDoS protection in the platform, Azure DDoS Protection provides advanced DDoS mitigation capabilities against network attacks. It's automatically tuned to protect your specific Azure resources. Protection is simple to enable during the creation of new virtual networks. It can also be done after creation and requires no application or resource changes. For more information, see the [Microsoft Sentinel documentation](https://go.microsoft.com/fwlink/p/?linkid=2219760&wt.mc_id=sentinel_dataconnectordocs_content_cnl_csasci).
13+
Connect to Azure DDoS Protection Standard logs via Public IP Address Diagnostic Logs. In addition to the core DDoS protection in the platform, Azure DDoS Protection Standard provides advanced DDoS mitigation capabilities against network attacks. It's automatically tuned to protect your specific Azure resources. Protection is simple to enable during the creation of new virtual networks. It can also be done after creation and requires no application or resource changes. For more information, see the [Microsoft Sentinel documentation](https://go.microsoft.com/fwlink/p/?linkid=2219760&wt.mc_id=sentinel_dataconnectordocs_content_cnl_csasci).
1414

1515
## Connector attributes
1616

articles/sentinel/data-connectors/box-using-azure-function.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Box (using Azure Functions) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Box (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 02/23/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---

articles/sentinel/data-connectors/cyberark-enterprise-password-vault-epv-events.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: "CyberArk Enterprise Password Vault (EPV) Events connector for Microsoft
33
description: "Learn how to install the connector CyberArk Enterprise Password Vault (EPV) Events to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 05/22/2023
6+
ms.date: 06/22/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# CyberArk Enterprise Password Vault (EPV) Events connector for Microsoft Sentinel
1212

13-
CyberArk Enterprise Password Vault generates an xml Syslog message for every action taken against the Vault. The EPV will send the xml messages through the Sentinel.xsl translator to be converted into CEF standard format and sent to a syslog staging server of your choice (syslog-ng, rsyslog). The Log Analytics agent installed on your syslog staging server will import the messages into Microsoft Log Analytics. Refer to the [CyberArk documentation](https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/DV-Integrating-with-SIEM-Applications.htm) for more guidance on SIEM integrations.
13+
CyberArk Enterprise Password Vault generates an xml Syslog message for every action taken against the Vault. The EPV will send the xml messages through the Microsoft Sentinel.xsl translator to be converted into CEF standard format and sent to a syslog staging server of your choice (syslog-ng, rsyslog). The Log Analytics agent installed on your syslog staging server will import the messages into Microsoft Log Analytics. Refer to the [CyberArk documentation](https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/DV-Integrating-with-SIEM-Applications.htm) for more guidance on SIEM integrations.
1414

1515
## Connector attributes
1616

0 commit comments

Comments
 (0)