You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-parsers-list.md
+17-22Lines changed: 17 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,8 @@ This document provides a list of Advanced Security Information Model (ASIM) pars
18
18
>
19
19
## Authentication parsers
20
20
21
+
To use ASIM authentication parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimAuthentication). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
22
+
21
23
- **Windows sign-ins**
22
24
- Collected using the Log Analytics Agent or Azure Monitor Agent.
23
25
- Collected using either the Security Events connectors to the SecurityEvent table or using the WEF connector to the WindowsEvent table.
@@ -30,12 +32,11 @@ This document provides a list of Advanced Security Information Model (ASIM) pars
30
32
- **AWS sign-ins**, collected using the AWS CloudTrail connector.
31
33
- **Okta authentication**, collected using the Okta connector.
32
34
- **PostgreSQL** sign-in logs.
33
-
34
-
Deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimAuthentication).
35
+
35
36
36
37
## DNS parsers
37
38
38
-
Microsoft Sentinel provides the following out-of-the-box, product-specific DNS parsers:
39
+
ASIM DNS parsers are available in every workspace. Microsoft Sentinel provides the following out-of-the-box parsers:
@@ -51,11 +52,12 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific DNS p
51
52
| **Zscaler ZIA** | | `_Im_Dns_ZscalerZIAVxx` |
52
53
||||
53
54
54
-
Deploy the workspace deployed parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimDNS).
55
+
Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimDNS).
55
56
56
57
## File Activity parsers
57
58
58
-
Microsoft Sentinel provides the following out-of-the-box, product-specific File Activity parsers:
59
+
To use ASIM File Activity parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](hhttps://aka.ms/ASimFileEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
60
+
59
61
60
62
- **Windows file activity**
61
63
- Reported by **Windows (event 4663)**:
@@ -69,11 +71,10 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific File
69
71
- **Microsoft Office 365 SharePoint and OneDrive events**, collected using the Office Activity connector.
70
72
- **Azure Storage**, including Blob, File, Queue, and Table Storage.
71
73
72
-
Deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimFileEvent).
73
-
74
74
## Network Session parsers
75
75
76
-
Microsoft Sentinel provides the following out-of-the-box, product-specific Network Session parsers:
76
+
ASIM Network Session parsers are available in every workspace. Microsoft Sentinel provides the following out-of-the-box parsers:
| **Windows Firewall logs** | Collected as Windows events using the Log Analytics Agent (Event table) or Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
98
99
| **Watchguard FirewareOW** | Collected using Syslog. | `_Im_NetworkSession_WatchGuardFirewareOSVxx` |
Note that the parsers marked with (*) are available for deployment from GitHub and are not yet built into workspaces.
102
-
103
-
Deploy the workspace deployed parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimNetworkSession).
102
+
Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimNetworkSession).
104
103
105
104
## Process Event parsers
106
105
107
-
Microsoft Sentinel provides the following built-in, product-specific Process Event parsers:
106
+
To use ASIM Process Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimProcessEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
108
107
109
108
- **Security Events process creation (Event 4688)**, collected using the Log Analytics Agent or Azure Monitor Agent
110
109
- **Security Events process termination (Event 4689)**, collected using the Log Analytics Agent or Azure Monitor Agent
111
110
- **Sysmon process creation (Event 1)**, collected using the Log Analytics Agent or Azure Monitor Agent
112
111
- **Sysmon process termination (Event 5)**, collected using the Log Analytics Agent or Azure Monitor Agent
113
112
- **Microsoft 365 Defender for Endpoint process creation**
114
113
115
-
Deploy Process Event parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimProcessEvent).
116
-
117
114
## Registry Event parsers
118
115
119
-
Microsoft Sentinel provides the following built-in, product-specific Registry Event parsers:
116
+
To use ASIM Registry Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](hhttps://aka.ms/AsimRegistryEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
120
117
121
-
- **Security Events registry update (Event 4657**), collected using the Log Analytics Agent or Azure Monitor Agent
118
+
- **Security Events registry update (Events 4657 and 4663)**, collected using the Log Analytics Agent or Azure Monitor Agent
122
119
- **Sysmon registry monitoring events (Events 12, 13, and 14)**, collected using the Log Analytics Agent or Azure Monitor Agent
123
120
- **Microsoft 365 Defender for Endpoint registry events**
124
121
125
-
Deploy Registry Event parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimRegistryEvent).
126
-
127
122
## Web Session parsers
128
123
129
-
Microsoft Sentinel provides the following out-of-the-box, product-specific Web Session parsers:
124
+
ASIM Web Session parsers are available in every workspace. Microsoft Sentinel provides the following out-of-the-box parsers:
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-schema-audit.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.author: ofshezaf
10
10
11
11
# The Advanced Security Information Model (ASIM) Audit Events normalization schema reference (Public preview)
12
12
13
-
The Microsoft Sentinel Audit events normalization schema represents events associated with the audit trail of information systems. The audit trail logs system configuration and policy changes. Such changes are often performed by system administrators, but can also be performed by users when configuring the settings of their own applications.
13
+
The Microsoft Sentinel Audit events normalization schema represents events associated with the audit trail of information systems. The audit trail logs system configuration activities and policy changes. Such changes are often performed by system administrators, but can also be performed by users when configuring the settings of their own applications.
14
14
15
15
Every system logs audit events alongside its core activity logs. For example, a Firewall will log events about the network sessions is processes, as well as audit events about configuration changes applied to the Firewall itself.
16
16
@@ -27,7 +27,7 @@ For more information about normalization in Microsoft Sentinel, see [Normalizati
27
27
The main fields of an audit event are:
28
28
- The object, typically a configuration atom or policy rule that the event focuses on, represented by the field [Object](#object).
29
29
- The application context of the object, represented by the field [TargetAppName](#targetappname), which is aliased by [Application](#application).
30
-
- The operation performed on the object,represented by the field[EventType](#eventtype).
30
+
- The operation performed on the object,represented by the fields[EventType](#eventtype) and [EventOriginalType](#eventoriginaltype).
31
31
- The old and new values for the object, if applicable, represented by [OldValue](#oldvalue) and [NewValue](#newvalue) respectively.
32
32
33
33
Audit events also reference the following entities which are involved in the configuration operation:
@@ -55,7 +55,9 @@ The following list mentions fields that have specific guidelines for Audit Event
| <aname="eventtype"></a> **EventType**| Mandatory | Enumerated | Describes the operation reported by the record.<br><br> For Audit Event records, the allowed values are:<br> - `Set`<br>- `Read`<br>- `Create`<br>- `Delete`|
58
+
| <aname="eventtype"></a> **EventType**| Mandatory | Enumerated | Describes the operation reported by the record.<br><br> For Audit Event records, the allowed values are:<br> - `Set`<br>- `Read`<br>- `Create`<br>- `Delete`<br>- `Execute`<br>- `Install`<br>- `Clear`<br>- `Enable`<br>- `Disable`<br>- `Other`. <br><br>Audit events represent a large variety of operations, and the `Other` value enables mapping operations that have no corresponding `EventType`. However, the use of `Other` limit the usability of the event and should be avoided if possible. |
59
+
| <aname="eventsubtype"></a> **EventSubType**| Recommended | String | While [EventType](#eventtype) is an enumerated value that has to one of a limited set of options, **EventSubType** allows more specific labeling of the operation audited. |
60
+
| <aname="eventoriginaltype"></a> **EventOriginalType**| Optional | String | The operation as reported by the reporting system. |
59
61
|**EventSchema**| Mandatory | String | The name of the schema documented here is `AuditEvent`. |
60
62
|**EventSchemaVersion**| Mandatory | String | The version of the schema. The version of the schema documented here is `0.1`. |
61
63
@@ -80,6 +82,7 @@ Fields that appear in the table below are common to all ASIM schemas. Any guidel
80
82
|**ObjectType**| Mandatory | Enumerated | The type of [Object](#object). Allowed values are:<br>- `Configuration Atom`<br>- `Policy Rule`<br> - Other |
81
83
| <aname="oldvalue"></a> **OldValue**| Optional | String | The old value of [Object](#object) prior to the operation, if applicable. |
82
84
| <aname="newvalue"></a>**NewValue**| Optional | String | The new value of [Object](#object) after the operation was performed, if applicable. |
85
+
| <aname="value"></a>**Value**| Alias || Alias to [NewValue](#newvalue)|
83
86
|**ValueType**| Optional | Enumerated | The type of the old and new values. Allowed values are<br>- Other. |
0 commit comments