Skip to content

Commit c341e56

Browse files
authored
Merge pull request #265004 from cmcclister/Broken-link-fix-cwatson-cat
Broken Links Fixed
2 parents aac0a10 + 520f606 commit c341e56

File tree

4 files changed

+3
-4
lines changed

4 files changed

+3
-4
lines changed

articles/sentinel/data-connectors/crowdstrike-falcon-data-replicator-v2-using-azure-functions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ The [Crowdstrike](https://www.crowdstrike.com/) Falcon Data Replicator connector
1818
| --- | --- |
1919
| **Azure function app code** | https://aka.ms/sentinel-CrowdstrikeReplicatorV2-functionapp |
2020
| **Kusto function alias** | CrowdstrikeReplicator |
21-
| **Kusto function url** | https://aka.ms/sentinel-crowdstrikereplicator-parser |
2221
| **Log Analytics table(s)** | CrowdStrike_Additional_Events_CL<br/> ASimNetworkSessionLogs<br/> ASimDnsActivityLogs<br/> ASimAuditEventLogs<br/> ASimFileEventLogs<br/> ASimAuthenticationEventLogs<br/> ASimProcessEventLogs<br/> ASimRegistryEventLogs<br/> ASimUserManagementActivityLogs<br/> CrowdStrike_Secondary_Data_CL<br/> |
2322
| **Data collection rules support** | Not currently supported |
2423
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |

articles/sentinel/data-connectors/deprecated-claroty-via-legacy-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: cwatson
1010

1111
# [Deprecated] Claroty via Legacy Agent connector for Microsoft Sentinel
1212

13-
The [Claroty](https://claroty.com/) data connector provides the capability to ingest [Continuous Threat Detection](https://claroty.com/resources/datasheets/continuous-threat-detection) and [Secure Remote Access](https://claroty.com/secure-remote-access/) events into Microsoft Sentinel.
13+
The [Claroty](https://claroty.com/) data connector provides the capability to ingest [Continuous Threat Detection](https://claroty.com/resources/datasheets/continuous-threat-detection) and [Secure Remote Access](https://claroty.com/industrial-cybersecurity/sra) events into Microsoft Sentinel.
1414

1515
## Connector attributes
1616

articles/sentinel/data-connectors/google-workspace-g-suite-using-azure-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ To integrate with Google Workspace (G Suite) (using Azure Functions) make sure y
9999
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
100100
101101

102-
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias GWorkspaceReports and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Parsers/GWorkspaceActivityReports), on the second line of the query, enter the hostname(s) of your GWorkspaceReports device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
102+
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias GWorkspaceReports and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Parsers/GWorkspaceActivityReports.yaml), on the second line of the query, enter the hostname(s) of your GWorkspaceReports device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
103103

104104

105105
**STEP 1 - Ensure the prerequisites to obtain the Google Pickel String**

articles/sentinel/data-connectors/recommended-claroty-via-ama.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: cwatson
1010

1111
# [Recommended] Claroty via AMA connector for Microsoft Sentinel
1212

13-
The [Claroty](https://claroty.com/) data connector provides the capability to ingest [Continuous Threat Detection](https://claroty.com/resources/datasheets/continuous-threat-detection) and [Secure Remote Access](https://claroty.com/secure-remote-access/) events into Microsoft Sentinel.
13+
The [Claroty](https://claroty.com/) data connector provides the capability to ingest [Continuous Threat Detection](https://claroty.com/resources/datasheets/continuous-threat-detection) and [Secure Remote Access](https://claroty.com/industrial-cybersecurity/sra) events into Microsoft Sentinel.
1414

1515
## Connector attributes
1616

0 commit comments

Comments
 (0)