You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-asc-iot.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,9 +22,7 @@ ms.author: rkarlin
22
22
23
23
24
24
> [!IMPORTANT]
25
-
> The Azure Security Center for IoT data connector is currently in public preview.
26
-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
27
-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25
+
> The Azure Security Center for IoT data connector is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
28
26
29
27
Use the Azure Security Center for IoT connector to stream all your Azure Security Center for IoT events into Azure Sentinel.
30
28
@@ -36,7 +34,7 @@ Use the Azure Security Center for IoT connector to stream all your Azure Securit
36
34
-**Read** and **Write** permissions on the **Azure IoT Hub resource group**
37
35
38
36
> [!NOTE]
39
-
> You must have the Azure Security Center Standard tier licensing running on your subscription to send general Azure resource alerts. With the free tier licensing required for Azure Security Center for IoT, only Azure Security Center for IoT related alerts will be forwarded to Azure Sentinel.
37
+
> While you must enable the Azure Security Center **Standard** tier license on your subscription to stream IoT resource alerts to Azure Sentinel, you only need to enable the Azure Security Center **Free** tier license on your subscription to view Azure Security Center for IoT alerts in Azure Sentinel.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-data-sources.md
+21-10Lines changed: 21 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,35 +41,46 @@ The following data connection methods are supported by Azure Sentinel:
41
41
42
42
-**Service to service integration**:<br> Some services are connected natively, such as AWS and Microsoft services, these services leverage the Azure foundation for out-of-the box integration, the following solutions can be connected in a few clicks:
43
43
-[Amazon Web Services - CloudTrail](connect-aws.md)
44
-
-[Office 365](connect-office-365.md)
45
-
-[Azure AD audit logs and sign-ins](connect-azure-active-directory.md)
46
44
-[Azure Activity](connect-azure-activity.md)
45
+
-[Azure AD audit logs and sign-ins](connect-azure-active-directory.md)
47
46
-[Azure AD Identity Protection](connect-azure-ad-Identity-protection.md)
-**External solutions via API**: Some data sources are connected using APIs that are provided by the connected data source. Typically, most security technologies provide a set of APIs through which event logs can be retrieved.The APIs connect to Azure Sentinel and gather specific data types and send them to Azure Log Analytics. Appliances connected via API include:
-**External solutions via agent**: Azure Sentinel can be connected to all other data sources that can perform real-time log streaming using the Syslog protocol, via an agent. <br>Most appliances use the Syslog protocol to send event messages that include the log itself and data about the log. The format of the logs varies, but most appliances support the Common Event Format (CEF) based formatting for logs data. <br>The Azure Sentinel agent, which is based on the Log Analytics agent, converts CEF formatted logs into a format that can be ingested by Log Analytics. Depending on the appliance type, the agent is installed either directly on the appliance, or on a dedicated Linux server. The agent for Linux receives events from the Syslog daemon over UDP, but if a Linux machine is expected to collect a high volume of Syslog events, they are sent over TCP from the Syslog daemon to the agent and from there to Log Analytics.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-forcepoint-casb-ngfw.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,10 +19,8 @@ ms.author: rkarlin
19
19
20
20
# Connect your Forcepoint products to Azure Sentinel
21
21
22
-
> [!IMPORTANT]
23
-
> The Forcepoint products data connector in Azure Sentinel is currently in public preview.
24
-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25
-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
+
> [!IMPORTANT]
23
+
> The Forcepoint products data connector in Azure Sentinel is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26
24
27
25
28
26
This article explains how to connect your Forcepoint products to Azure Sentinel.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-forcepoint-dlp.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,10 +19,8 @@ ms.author: rkarlin
19
19
20
20
# Connect your Forcepoint DLP to Azure Sentinel
21
21
22
-
> [!IMPORTANT]
23
-
> The Forcepoint DLP data connector in Azure Sentinel is currently in public preview.
24
-
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25
-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
+
> [!IMPORTANT]
23
+
> The Forcepoint DLP data connector in Azure Sentinel is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
Copy file name to clipboardExpand all lines: articles/sentinel/connect-squadra-secrmm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.author: rkarlin
18
18
19
19
# Connect your Squadra Technologies secRMM data to Azure Sentinel
20
20
21
-
> [!IMPORTANT]
21
+
> [!IMPORTANT]
22
22
> The Squadra Technologies secRMM data connector in Azure Sentinel is currently in public preview.
23
23
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24
24
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
Copy file name to clipboardExpand all lines: articles/sentinel/connect-zimperium-mtd.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.author: rkarlin
19
19
# Connect your Zimperium Mobile Threat Defense to Azure Sentinel
20
20
21
21
22
-
> [!IMPORTANT]
22
+
> [!IMPORTANT]
23
23
> The Zimperium Mobile Threat Defense data connector in Azure Sentinel is currently in public preview.
24
24
> This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
25
25
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
Copy file name to clipboardExpand all lines: articles/sentinel/fusion.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,6 +17,14 @@ ms.author: rkarlin
17
17
---
18
18
# Advanced multistage attack detection in Azure Sentinel
19
19
20
+
21
+
> [!IMPORTANT]
22
+
> Some Fusion features in Azure Sentinel are currently in public preview.
23
+
> These features are provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
24
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25
+
26
+
27
+
20
28
By using Fusion technology that’s based on machine learning, Azure Sentinel can automatically detect multistage attacks by combining anomalous behaviors and suspicious activities that are observed at various stages of the kill-chain. Azure Sentinel then generates incidents that would otherwise be very difficult to catch. These incidents encase two or more alerts or activities. By design, these incidents are low volume, high fidelity, and high severity.
21
29
22
30
Customized for your environment, this detection not only reduces false positive rates but can also detect attacks with limited or missing information.
0 commit comments