You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/siem-migration.md
+30-15Lines changed: 30 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,10 +6,12 @@ author: austinmccollum
6
6
ms.topic: how-to
7
7
ms.date: 3/11/2024
8
8
ms.author: austinmc
9
+
appliesto:
10
+
- Microsoft Sentinel in the Azure portal
9
11
#customer intent: As an SOC administrator, I want to use the SIEM migration experience so I can migrate to Microsoft Sentinel.
10
12
---
11
13
12
-
# Migrate to Microsoft Sentinel with the SIEM migration experience (preview)
14
+
# Migrate to Microsoft Sentinel with the SIEM migration experience
13
15
14
16
Migrate your SIEM to Microsoft Sentinel for all your security monitoring use cases. Automated assistance from the SIEM Migration experience simplifies your migration.
15
17
@@ -31,35 +33,33 @@ You need the following from the source SIEM:
31
33
You need the following on the target, Microsoft Sentinel:
32
34
33
35
- The SIEM migration experience deploys analytics rules. This capability requires the **Microsoft Sentinel Contributor** role. For more information, see [Permissions in Microsoft Sentinel](roles.md).
34
-
- Ingest security data previously used in your source SIEM into Microsoft Sentinel by enabling an out-of-the-box (OOTB) data connector.
35
-
- If the data connector isn't installed yet, find the relevant solution in **Content hub**.
36
+
- Ingest security data previously used in your source SIEM into Microsoft Sentinel. Install and enable out-of-the-box (OOTB) data connectors to match your security monitoring estate from your source SIEM.
37
+
- If the data connectors aren't installed yet, find the relevant solutions in **Content hub**.
36
38
- If no data connector exists, create a custom ingestion pipeline.<br>For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md) or [Custom data ingestion and transformation](data-transformation.md).
37
39
38
40
## Translate Splunk detection rules
39
41
40
42
At the core of Splunk detection rules is the Search Processing Language (SPL). The SIEM migration experience systematically translates SPL to Kusto query language (KQL) for each Splunk rule. Carefully review translations and make adjustments to ensure migrated rules function as intended in your Microsoft Sentinel workspace. For more information on the concepts important in translating detection rules, see [migrate Splunk detection rules](migration-splunk-detection-rules.md).
41
43
42
-
Capabilities in public preview:
44
+
Current capabilities:
43
45
44
46
- Translate simple queries with a single data source
45
47
- Direct translations listed in the article, [Splunk to Kusto cheat sheet](/azure/data-explorer/kusto/query/splunk-cheat-sheet)
46
48
- Review translated query error feedback with edit capability to save time in the detection rule translation process
49
+
- Translated queries feature a completeness status with translation states
47
50
48
51
Here are some of the priorities that are important to us as we continue to develop the translation technology:
49
52
50
53
- Splunk Common Information Model (CIM) to Microsoft Sentinel's Advanced Security Information Model (ASIM) translation support
51
-
- Translated queries feature a completeness status with translation states
52
-
- Multiple data sources and index
53
-
- Rule correlations
54
-
- Support for macros
55
-
- Support for lookups
56
-
- Complex queries with joins
54
+
- Support for Splunk macros
55
+
- Support for Splunk lookups
56
+
- Translation of complex correlation logic that queries and correlates events across multiple data sources
57
57
58
58
## Start the SIEM migration experience
59
59
60
60
1. Navigate to Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**.
61
61
62
-
1. Select **SIEM Migration (Preview)**.
62
+
1. Select **SIEM Migration**.
63
63
64
64
:::image type="content" source="media/siem-migration/siem-migration-experience.png" alt-text="Screenshot showing content hub with menu item for the SIEM migration experience.":::
65
65
@@ -89,7 +89,12 @@ Here are some of the priorities that are important to us as we continue to devel
89
89
1. Review the analysis of the Splunk export.
90
90
91
91
-**Name** is the original Splunk detection rule name.
92
-
-**Compatibility** indicates if a Sentinel OOTB analytics rule matches the Splunk detection logic.
92
+
-**Translation Type** indicates if a Sentinel OOTB analytics rule matches the Splunk detection logic.
93
+
-**Translation State** has the following values:
94
+
-**Fully Translated** queries in this rule were fully translated to KQL
95
+
-**Partially Translated** queries in this rule weren't fully translated to KQL
96
+
-**Not Translated** indicates an error in translation
97
+
-**Manually Translated** when any rule is reviewed and saved
93
98
94
99
:::image type="content" source="media/siem-migration/configure-rules.png" alt-text="Screenshot showing the results of the automatic rule mapping." lightbox="media/siem-migration/configure-rules.png":::
95
100
@@ -100,11 +105,21 @@ Here are some of the priorities that are important to us as we continue to devel
100
105
101
106
## Deploy the Analytics rules
102
107
103
-
1. Select **Deploy** to start the deployment of analytics rules to your Microsoft Sentinel workspace.
108
+
1. (Optional) Select **Export Templates** to download the Analytics rules as ARM templates for us in your CI/CD or custom deployment processes.
109
+
110
+
:::image type="content" source="media/siem-migration/export-templates.png" alt-text="Screenshot showing the Review and Migrate tab highlighting the Export Templates button.":::
111
+
112
+
1.**Deploy** starts the deployment of the selected analytics rules to your Microsoft Sentinel workspace.
104
113
105
114
The following resources are deployed:
106
115
- For all OOTB matches, the corresponding solutions with the matched analytics rule are installed, and the matched rules are deployed as active analytics rules.
107
-
- All custom rules translated to Sentinel analytics rules are deployed as active analytics rules.
116
+
- All custom rules translated to Sentinel analytics rules are deployed as active analytics rules in the disabled state.
117
+
118
+
1. Before exiting the SIEM Migration experience, **Download Migration Summary** to keep a summary of the Analytics deployment.
119
+
120
+
:::image type="content" source="media/siem-migration/download-migration-summary.png" alt-text="Screenshot showing the Download Migration Summary button from the Review and Migrate tab.":::
121
+
122
+
## Validate and enable rules
108
123
109
124
1. View the properties of deployed rules from Microsoft Sentinel **Analytics**.
110
125
@@ -118,7 +133,7 @@ Here are some of the priorities that are important to us as we continue to devel
-[Data connectors for Syslog and CEF based on Azure Monitor Agent now generally available (GA)](#data-connectors-for-syslog-and-cef-based-on-azure-monitor-agent-now-generally-available-ga)
30
30
31
+
### SIEM migration experience now generally available (GA)
32
+
33
+
At the beginning of the month, we announced the SIEM migration preview. Now at the end of the month, it's already GA! The new Microsoft Sentinel Migration experience helps customers and partners automate the process of migrating their security monitoring use cases hosted in non-Microsoft products into Microsoft Sentinel.
34
+
- This first version of the tool supports migrations from Splunk
35
+
36
+
For more information, see [Migrate to Microsoft Sentinel with the SIEM migration experience](siem-migration.md)
37
+
38
+
Join our Security Community for a [webinar](https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR_0A4IaJRDNBnp8pjCkWnwhUM1dFNFpVQlZJREdEQjkwQzRaV0RZRldEWC4u) showcasing the SIEM migration experience on May 2nd, 2024.
39
+
31
40
### Amazon Web Services S3 connector now generally available (GA)
32
41
33
42
Microsoft Sentinel has released the AWS S3 data connector to general availability (GA). You can use this connector to ingest logs from several AWS services to Microsoft Sentinel using an S3 bucket and AWS's simple message queuing service.
@@ -44,12 +53,6 @@ See our blog post for more details, [Create Codeless Connectors with the Codeles
44
53
45
54
For more information on the CCP, see [Create a codeless connector for Microsoft Sentinel (Public preview)](create-codeless-connector.md).
46
55
47
-
### SIEM migration experience (preview)
48
-
49
-
The new Microsoft Sentinel Migration experience helps customers and partners to automate the process of migrating their security monitoring use cases hosted in non-Microsoft products into Microsoft Sentinel.
50
-
- This first version of the tool supports migrations from Splunk
51
-
52
-
For more information, see [Migrate to Microsoft Sentinel with the SIEM migration experience](siem-migration.md)
53
56
54
57
### Data connectors for Syslog and CEF based on Azure Monitor Agent now generally available (GA)
0 commit comments