Skip to content

Commit 9bc2594

Browse files
authored
Merge pull request #212057 from limwainstein/cef-ama-connector
New CEF AMA connector
2 parents fdbe675 + 7d7086d commit 9bc2594

10 files changed

+410
-1
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,8 @@
248248
href: ama-migrate.md
249249
- name: CEF over Syslog sources
250250
href: connect-common-event-format.md
251+
- name: CEF via AMA
252+
href: connect-cef-ama.md
251253
- name: DNS via AMA
252254
href: connect-dns-ama.md
253255
- name: Syslog (raw) sources

articles/sentinel/connect-cef-ama.md

Lines changed: 386 additions & 0 deletions
Large diffs are not rendered by default.

articles/sentinel/connect-dns-ama.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: limwainstein
55
ms.topic: how-to
66
ms.date: 01/05/2022
77
ms.author: lwainstein
8-
#Customer intent: As a security operator, I want proactively monitor Windows DNS activities so that I can prevent threats and attacks on DNS servers.
8+
#Customer intent: As a security operator, I want to proactively monitor Windows DNS activities so that I can prevent threats and attacks on DNS servers.
99
---
1010

1111
# Stream and filter data from Windows DNS servers with the AMA connector

articles/sentinel/data-connectors-reference.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -528,6 +528,14 @@ See Barracuda instructions - note the assigned facilities for the different type
528528
| **Vendor documentation/<br>installation instructions** | [Configuring the Log to a Syslog Server action](https://help.symantec.com/cs/DLP15.7/DLP/v27591174_v133697641/Configuring-the-Log-to-a-Syslog-Server-action?locale=EN_US) |
529529
| **Supported by** | Microsoft |
530530

531+
## Common Event Format (CEF) via AMA
532+
533+
| Connector attribute | Description |
534+
| --- | --- |
535+
| **Data ingestion method** | **[Azure monitor Agent-based connection](connect-cef-ama.md)** |
536+
| **Log Analytics table(s)** | [CommonSecurityLog](/azure/azure-monitor/reference/tables/commonsecuritylog) |
537+
| **DCR support** | Standard DCR |
538+
| **Supported by** | Microsoft |
531539

532540
## Check Point
533541

51.2 KB
Loading
61.6 KB
Loading
65.8 KB
Loading
68.4 KB
Loading
78 KB
Loading

articles/sentinel/whats-new.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ If you're looking for items older than six months, you'll find them in the [Arch
3131
- [Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
3232
- [Out of the box anomaly detection on the SAP audit log (Preview)](#out-of-the-box-anomaly-detection-on-the-sap-audit-log-preview)
3333
- [IoT device entity page (Preview)](#iot-device-entity-page-preview)
34+
- [Common Event Format (CEF) via AMA](#common-event-format-cef-via-ama-preview)
3435

3536
### Account enrichment fields removed from Azure AD Identity Protection connector
3637

@@ -120,6 +121,18 @@ The new [IoT device entity page](entity-pages.md) is designed to help the SOC in
120121
121122
Learn more about [investigating IoT device entities in Microsoft Sentinel](iot-advanced-threat-monitoring.md).
122123
124+
### Common Event Format (CEF) via AMA (Preview)
125+
126+
The [Common Event Format (CEF) via AMA](connect-cef-ama.md) connector allows you to quickly filter and upload logs over CEF from multiple on-premises appliances to Microsoft Sentinel via the Azure Monitor Agent (AMA).
127+
128+
The AMA supports Data Collection Rules (DCRs), which you can use to filter the logs before ingestion, for quicker upload, efficient analysis, and querying.
129+
130+
Here are some benefits of using AMA for CEF log collection:
131+
132+
- AMA is faster compared to the existing Log Analytics Agent (MMA/OMS).
133+
- AMA provides centralized configuration using Data Collection Rules (DCRs), and also supports multiple DCRs.
134+
- AMA is Syslog RFC compliant, a faster and a more resilient and reliant agent, more secure with lower footprint on the installed machine.
135+
123136
## September 2022
124137
125138
- [Create automation rule conditions based on custom details (Preview)](#create-automation-rule-conditions-based-on-custom-details-preview)

0 commit comments

Comments
 (0)