Skip to content

Commit aebcf4b

Browse files
committed
updates from Preeti and miriam
1 parent 7f84ef7 commit aebcf4b

File tree

7 files changed

+37
-24
lines changed

7 files changed

+37
-24
lines changed

articles/sentinel/connect-asc-iot.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,7 @@ ms.author: rkarlin
2222

2323

2424
> [!IMPORTANT]
25-
> The Azure Security Center for IoT data connector is currently in public preview.
26-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
27-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
> The Azure Security Center for IoT data connector is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2826
2927
Use the Azure Security Center for IoT connector to stream all your Azure Security Center for IoT events into Azure Sentinel.
3028

@@ -36,7 +34,7 @@ Use the Azure Security Center for IoT connector to stream all your Azure Securit
3634
- **Read** and **Write** permissions on the **Azure IoT Hub resource group**
3735

3836
> [!NOTE]
39-
> You must have the Azure Security Center Standard tier licensing running on your subscription to send general Azure resource alerts. With the free tier licensing required for Azure Security Center for IoT, only Azure Security Center for IoT related alerts will be forwarded to Azure Sentinel.
37+
> While you must enable the Azure Security Center **Standard** tier license on your subscription to stream IoT resource alerts to Azure Sentinel, you only need to enable the Azure Security Center **Free** tier license on your subscription to view Azure Security Center for IoT alerts in Azure Sentinel.
4038
4139
## Connect to Azure Security Center for IoT
4240

articles/sentinel/connect-data-sources.md

Lines changed: 21 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,35 +41,46 @@ The following data connection methods are supported by Azure Sentinel:
4141

4242
- **Service to service integration**:<br> Some services are connected natively, such as AWS and Microsoft services, these services leverage the Azure foundation for out-of-the box integration, the following solutions can be connected in a few clicks:
4343
- [Amazon Web Services - CloudTrail](connect-aws.md)
44-
- [Office 365](connect-office-365.md)
45-
- [Azure AD audit logs and sign-ins](connect-azure-active-directory.md)
4644
- [Azure Activity](connect-azure-activity.md)
45+
- [Azure AD audit logs and sign-ins](connect-azure-active-directory.md)
4746
- [Azure AD Identity Protection](connect-azure-ad-Identity-protection.md)
48-
- [Azure Security Center](connect-azure-security-center.md)
49-
- [Azure Information Protection](connect-azure-information-protection.md)
5047
- [Azure Advanced Threat Protection](connect-azure-atp.md)
48+
- [Azure Information Protection](connect-azure-information-protection.md)
49+
- [Azure Security Center](connect-azure-security-center.md)
5150
- [Cloud App Security](connect-cloud-app-security.md)
51+
- [Domain name server](connect-dns.md)
52+
- [Office 365](connect-office-365.md)
53+
- [Microsoft Defender ATP](connect-microsoft-defender-advanced-threat-protection.md)
54+
- [Microsoft web application firewall](connect-microsoft-waf.md)
5255
- [Windows security events](connect-windows-security-events.md)
5356
- [Windows firewall](connect-windows-firewall.md)
57+
- [Windows security events](connect-windows-security-events.md)
5458

5559
- **External solutions via API**: Some data sources are connected using APIs that are provided by the connected data source. Typically, most security technologies provide a set of APIs through which event logs can be retrieved.The APIs connect to Azure Sentinel and gather specific data types and send them to Azure Log Analytics. Appliances connected via API include:
5660
- [Barracuda](connect-barracuda.md)
57-
- [Symantec](connect-symantec.md)
61+
- [Barracuda CloudGen Firewall](connect-barracuda-cloudgen-firewall.md)
5862
- [Citrix Analytics (Security)](connect-citrix-analytics.md)
63+
- [F5 BIG-IP](connect-f3-big-ip.md)
64+
- [Forcepoint DLP](connect-forcepoint-dlp.md)
65+
- [Squadra Technologies secRMM](connect-squadra-secrmm.md)
66+
- [Symantec ICDX](connect-symantec.md)
67+
- [Zimperium](connect-zimperium.md)
68+
5969

6070
- **External solutions via agent**: Azure Sentinel can be connected to all other data sources that can perform real-time log streaming using the Syslog protocol, via an agent. <br>Most appliances use the Syslog protocol to send event messages that include the log itself and data about the log. The format of the logs varies, but most appliances support the Common Event Format (CEF) based formatting for logs data. <br>The Azure Sentinel agent, which is based on the Log Analytics agent, converts CEF formatted logs into a format that can be ingested by Log Analytics. Depending on the appliance type, the agent is installed either directly on the appliance, or on a dedicated Linux server. The agent for Linux receives events from the Syslog daemon over UDP, but if a Linux machine is expected to collect a high volume of Syslog events, they are sent over TCP from the Syslog daemon to the agent and from there to Log Analytics.
6171
- Firewalls, proxies, and endpoints:
62-
- [F5](connect-f5.md)
6372
- [Check Point](connect-checkpoint.md)
6473
- [Cisco ASA](connect-cisco.md)
74+
- [ExtraHop Reveal(x)](connect-extrahop.md)
75+
- [F5](connect-f5.md)
76+
- [Forcepoint products](connect-forcepoint-casb-ngfw.md)
6577
- [Fortinet](connect-fortinet.md)
66-
- [Palo Alto](connect-paloalto.md)
78+
- [Palo Alto Networks](connect-paloalto.md)
79+
- [One Identity Safeguard](connect-one-identity.md)
6780
- [Other CEF appliances](connect-common-event-format.md)
6881
- [Other Syslog appliances](connect-syslog.md)
69-
- [Barracuda CloudGen Firewall](connect-barracuda-cloudgen-firewall.md)
70-
- [ExtraHop Reveal(x)](connect-extrahop.md)
71-
- [One Identity Safeguard](connect-one-identity.md)
7282
- [Trend Micro Deep Security](connect-trend-micro.md)
83+
- [Zscaler](connect-zscaler.md)
7384
- DLP solutions
7485
- [Threat intelligence providers](connect-threat-intelligence.md)
7586
- [DNS machines](connect-dns.md) - agent installed directly on the DNS machine

articles/sentinel/connect-forcepoint-casb-ngfw.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,8 @@ ms.author: rkarlin
1919

2020
# Connect your Forcepoint products to Azure Sentinel
2121

22-
​> [!IMPORTANT]
23-
> The Forcepoint products data connector in Azure Sentinel is currently in public preview.
24-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22+
> [!IMPORTANT]
23+
> The Forcepoint products data connector in Azure Sentinel is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2624
2725

2826
This article explains how to connect your Forcepoint products to Azure Sentinel.

articles/sentinel/connect-forcepoint-dlp.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,8 @@ ms.author: rkarlin
1919

2020
# Connect your Forcepoint DLP to Azure Sentinel
2121

22-
​> [!IMPORTANT]
23-
> The Forcepoint DLP data connector in Azure Sentinel is currently in public preview.
24-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22+
> [!IMPORTANT]
23+
> The Forcepoint DLP data connector in Azure Sentinel is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2624
2725

2826

articles/sentinel/connect-squadra-secrmm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.author: rkarlin
1818

1919
# Connect your Squadra Technologies secRMM data to Azure Sentinel
2020

21-
> [!IMPORTANT]
21+
> [!IMPORTANT]
2222
> The Squadra Technologies secRMM data connector in Azure Sentinel is currently in public preview.
2323
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2424
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).

articles/sentinel/connect-zimperium-mtd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.author: rkarlin
1919
# Connect your Zimperium Mobile Threat Defense to Azure Sentinel
2020

2121

22-
> [!IMPORTANT]
22+
> [!IMPORTANT]
2323
> The Zimperium Mobile Threat Defense data connector in Azure Sentinel is currently in public preview.
2424
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2525
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).

articles/sentinel/fusion.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,14 @@ ms.author: rkarlin
1717
---
1818
# Advanced multistage attack detection in Azure Sentinel
1919

20+
21+
> [!IMPORTANT]
22+
> Some Fusion features in Azure Sentinel are currently in public preview.
23+
> These features are provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
26+
27+
2028
By using Fusion technology that’s based on machine learning, Azure Sentinel can automatically detect multistage attacks by combining anomalous behaviors and suspicious activities that are observed at various stages of the kill-chain. Azure Sentinel then generates incidents that would otherwise be very difficult to catch. These incidents encase two or more alerts or activities. By design, these incidents are low volume, high fidelity, and high severity.
2129

2230
Customized for your environment, this detection not only reduces false positive rates but can also detect attacks with limited or missing information.

0 commit comments

Comments
 (0)