Skip to content

Commit 9d19f23

Browse files
Merge pull request #287730 from austinmccollum/patch-1
add ASIM tables
2 parents c73c246 + 4c98ceb commit 9d19f23

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/sentinel/use-matching-analytics-to-detect-threats.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ You must install one or more of the supported data connectors to produce high-fi
3030
- Syslog
3131
- Office activity logs
3232
- Azure activity logs
33+
- ASIM DNS logs
34+
- ASIM Network sessions
3335

3436
:::image type="content" source="media/use-matching-analytics-to-detect-threats/data-sources.png" alt-text="A screenshot that shows the Microsoft Defender Threat Intelligence Analytics rule data source connections.":::
3537

@@ -70,6 +72,8 @@ Microsoft Defender Threat Intelligence Analytics matches your logs with domain,
7072
- **Syslog events**, where `Facility == "cron"` ingested into the `Syslog` table matches domain and IPv4 indicators directly from the `SyslogMessage` field.
7173
- **Office activity logs** ingested into the `OfficeActivity` table match IPv4 indicators directly from the `ClientIP` field.
7274
- **Azure activity logs** ingested into the `AzureActivity` table match IPv4 indicators directly from the `CallerIpAddress` field.
75+
- **ASIM DNS logs** ingested into the `ASimDnsActivityLogs` table match domain indicators if populated in the `DnsQuery` field, and IPv4 indicators in the `DnsResponseName` field.
76+
- **ASIM Network Sessions** ingested into the `ASimNetworkSessionLogs` table match IPv4 indicators if populated in one or more of the following fields: `DstIpAddr`, `DstNatIpAddr`, `SrcNatIpAddr`, `SrcIpAddr`, `DvcIpAddr`.
7377

7478
## Triage an incident generated by matching analytics
7579

0 commit comments

Comments
 (0)