Skip to content

Commit c6053fb

Browse files
authored
Merge pull request #268479 from austinmccollum/austinmc-splunk-migrate
initial article creation
2 parents 836cb78 + bcc2604 commit c6053fb

File tree

9 files changed

+166
-17
lines changed

9 files changed

+166
-17
lines changed

articles/sentinel/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,9 @@
6464
- name: Plan and design your migration
6565
items:
6666
- name: Plan your migration
67-
href: migration.md
67+
href: migration.md
68+
- name: Use the SIEM migration experience
69+
href: siem-migration.md
6870
- name: Track migration with a workbook
6971
href: migration-track.md
7072
- name: Migrate from ArcSight
294 KB
Loading
75.3 KB
Loading
22.6 KB
Loading

articles/sentinel/migration-splunk-detection-rules.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
11
---
2-
title: Migrate Splunk detection rules to Microsoft Sentinel | Microsoft Docs
2+
title: Migrate Splunk detection rules to Microsoft Sentinel
3+
titleSuffix: Microsoft Sentinel
34
description: Learn how to identify, compare, and migrate your Splunk detection rules to Microsoft Sentinel built-in rules.
45
author: limwainstein
56
ms.author: lwainstein
67
ms.topic: how-to
7-
ms.date: 05/03/2022
8+
ms.date: 03/11/2024
9+
#customer intent: As a SOC administrator, I want to migrate Splunk detection rules to KQL so I can migrate to Microsoft Sentinel.
810
---
911

1012
# Migrate Splunk detection rules to Microsoft Sentinel
@@ -22,11 +24,12 @@ Microsoft Sentinel uses machine learning analytics to create high-fidelity and a
2224
- Check that you understand the [rule terminology](#compare-rule-terminology).
2325
- Review any rules that haven't triggered any alerts in the past 6-12 months, and determine whether they're still relevant.
2426
- Eliminate low-level threats or alerts that you routinely ignore.
25-
- Use existing functionality, and check whether Microsoft Sentinels [built-in analytics rules](https://github.com/Azure/Azure-Sentinel/tree/master/Detections) might address your current use cases. Because Microsoft Sentinel uses machine learning analytics to produce high-fidelity and actionable incidents, its likely that some of your existing detections wont be required anymore.
27+
- Use existing functionality, and check whether Microsoft Sentinel's [built-in analytics rules](https://github.com/Azure/Azure-Sentinel/tree/master/Detections) might address your current use cases. Because Microsoft Sentinel uses machine learning analytics to produce high-fidelity and actionable incidents, it's likely that some of your existing detections won't be required anymore.
2628
- Confirm connected data sources and review your data connection methods. Revisit data collection conversations to ensure data depth and breadth across the use cases you plan to detect.
29+
- Test the capabilities of the [SIEM migration experience](siem-migration.md) to determine if the automated translation is suitable.
2730
- Explore community resources such as the [SOC Prime Threat Detection Marketplace](https://my.socprime.com/platform-overview/) to check whether your rules are available.
2831
- Consider whether an online query converter such as Uncoder.io might work for your rules.
29-
- If rules arent available or cant be converted, they need to be created manually, using a KQL query. Review the [rules mapping](#map-and-compare-rule-samples) to create new queries.
32+
- If rules aren't available or can't be converted, they need to be created manually, using a KQL query. Review the [rules mapping](#map-and-compare-rule-samples) to create new queries.
3033

3134
Learn more about [best practices for migrating detection rules](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/best-practices-for-migrating-detection-rules-from-arcsight/ba-p/2216417).
3235

@@ -41,14 +44,18 @@ Learn more about [best practices for migrating detection rules](https://techcomm
4144
1. **Confirm that you have any required data sources connected,** and review your data connection methods.
4245

4346
1. Verify whether your detections are available as built-in templates in Microsoft Sentinel:
47+
48+
- **Use the SIEM migration experience** to automate translation and migration.
49+
50+
For more information, see [Use the SIEM migration experience](siem-migration.md).
4451

4552
- **If the built-in rules are sufficient**, use built-in rule templates to create rules for your own workspace.
4653

4754
In Microsoft Sentinel, go to the **Configuration > Analytics > Rule templates** tab, and create and update each relevant analytics rule.
4855

4956
For more information, see [Detect threats out-of-the-box](detect-threats-built-in.md).
5057

51-
- **If you have detections that aren't covered by Microsoft Sentinel's built-in rules**, try an online query converter, such as [Uncoder.io](https://uncoder.io/) to convert your queries to KQL.
58+
- **If you have detections that aren't covered by Microsoft Sentinel's built-in rules**, try an online query converter, such as [Uncoder.io](https://uncoder.io/) or [SPL2KQL](https://azure.github.io/spl2kql) to convert your queries to KQL.
5259

5360
Identify the trigger condition and rule action, and then construct and review your KQL query.
5461

@@ -71,7 +78,7 @@ Learn more about [best practices for migrating detection rules](https://techcomm
7178
Learn more about analytics rules:
7279

7380
- [**Create custom analytics rules to detect threats**](detect-threats-custom.md). Use [alert grouping](detect-threats-custom.md#alert-grouping) to reduce alert fatigue by grouping alerts that occur within a given timeframe.
74-
- [**Map data fields to entities in Microsoft Sentinel**](map-data-fields-to-entities.md) to enable SOC engineers to define entities as part of the evidence to track during an investigation. Entity mapping also makes it possible for SOC analysts to take advantage of an intuitive [investigation graph (investigate-cases.md#use-the-investigation-graph-to-deep-dive) that can help reduce time and effort.
81+
- [**Map data fields to entities in Microsoft Sentinel**](map-data-fields-to-entities.md) to enable SOC engineers to define entities as part of the evidence to track during an investigation. Entity mapping also makes it possible for SOC analysts to take advantage of an intuitive [investigation graph] (investigate-cases.md#use-the-investigation-graph-to-deep-dive) that can help reduce time and effort.
7582
- [**Investigate incidents with UEBA data**](investigate-with-ueba.md), as an example of how to use evidence to surface events, alerts, and any bookmarks associated with a particular incident in the incident preview pane.
7683
- [**Kusto Query Language (KQL)**](/azure/data-explorer/kusto/query/), which you can use to send read-only requests to your [Log Analytics](../azure-monitor/logs/log-analytics-tutorial.md) database to process data and return results. KQL is also used across other Microsoft services, such as [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender) and [Application Insights](../azure-monitor/app/app-insights-overview.md).
7784

@@ -84,7 +91,7 @@ This table helps you to clarify the concept of a rule in Microsoft Sentinel comp
8491
|**Rule type** |• Scheduled<br>• Real-time |• Scheduled query<br>• Fusion<br>• Microsoft Security<br>• Machine Learning (ML) Behavior Analytics |
8592
|**Criteria** |Define in SPL |Define in KQL |
8693
|**Trigger condition** |• Number of results<br>• Number of hosts<br>• Number of sources<br>• Custom |Threshold: Number of query results |
87-
|**Action** |• Add to triggered alerts<br>• Log Event<br>• Output results to lookup<br>• And more |• Create alert or incident<br>• Integrates with Logic Apps |
94+
|**Action** |• Add to triggered alerts<br>• Log Event<br>• Output results to look up<br>• And more |• Create alert or incident<br>• Integrates with Logic Apps |
8895

8996
## Map and compare rule samples
9097

articles/sentinel/migration-splunk-historical-data.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
11
---
2-
title: "Microsoft Sentinel migration: Export Splunk data to target platform | Microsoft Docs"
3-
description: Learn how to export your historical data from Splunk.
2+
title: Export Splunk data to target platform
3+
titleSuffix: Microsoft Sentinel
4+
description: Learn how to export your historical data from Splunk for a Microsoft Sentinel migration of security monitoring use cases.
45
author: limwainstein
56
ms.author: lwainstein
67
ms.topic: how-to
7-
ms.date: 05/03/2022
8+
ms.date: 03/11/2024
9+
#customer intent: As a SOC administrator, I want to migrate historical data from Splunk so I have continuity when I migrate to Microsoft Sentinel.
810
---
911

1012
# Export historical data from Splunk

articles/sentinel/migration.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: limwainstein
55
ms.author: lwainstein
66
ms.service: microsoft-sentinel
77
ms.topic: how-to
8-
ms.date: 05/03/2022
8+
ms.date: 03/11/2024
99
---
1010

1111
# Plan your migration to Microsoft Sentinel
@@ -25,6 +25,7 @@ In this guide, you learn how to migrate your legacy SIEM to Microsoft Sentinel.
2525
|---------|---------|
2626
|Plan your migration |**You are here** |
2727
|Track migration with a workbook |[Track your Microsoft Sentinel migration with a workbook](migration-track.md) |
28+
|Use the SIEM Migration experience | [SIEM Migration (Preview)](siem-migration.md) |
2829
|Migrate from ArcSight |[Migrate detection rules](migration-arcsight-detection-rules.md)<br>• [Migrate SOAR automation](migration-arcsight-automation.md)<br>• [Export historical data](migration-arcsight-historical-data.md) |
2930
|Migrate from Splunk |[Migrate detection rules](migration-splunk-detection-rules.md)<br>• [Migrate SOAR automation](migration-splunk-automation.md)<br>• [Export historical data](migration-splunk-historical-data.md)<br><br>If you want to migrate your Splunk Observability deployment, learn more about how to [migrate from Splunk to Azure Monitor Logs](../azure-monitor/logs/migrate-splunk-to-azure-monitor-logs.md). |
3031
|Migrate from QRadar |[Migrate detection rules](migration-qradar-detection-rules.md)<br>• [Migrate SOAR automation](migration-qradar-automation.md)<br>• [Export historical data](migration-qradar-historical-data.md) |

articles/sentinel/siem-migration.md

Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: Use the SIEM migration experience
3+
titleSuffix: Microsoft Sentinel
4+
description: Migrate security monitoring use cases from other Security Information and Event Management (SIEM) systems to Microsoft Sentinel.
5+
author: austinmccollum
6+
ms.topic: how-to
7+
ms.date: 3/11/2024
8+
ms.author: austinmc
9+
appliesto: Microsoft Sentinel
10+
#customer intent: As an SOC administrator, I want to use the SIEM migration experience so I can migrate to Microsoft Sentinel.
11+
---
12+
13+
# Migrate to Microsoft Sentinel with the SIEM migration experience (preview)
14+
15+
Migrate your SIEM to Microsoft Sentinel for all your security monitoring use cases. Automated assistance from the SIEM Migration experience simplifies your migration.
16+
17+
These features are currently included in the SIEM Migration experience:
18+
19+
**Splunk**
20+
- The experience focuses on migrating Splunk security monitoring to Microsoft Sentinel.
21+
- The experience only supports migration of Splunk detections to Microsoft Sentinel analytics rules.
22+
23+
## Prerequisites
24+
25+
You need the following from the source SIEM:
26+
27+
**Splunk**
28+
- The migration experience is compatible with both Splunk Enterprise and Splunk Cloud editions.
29+
- A Splunk admin role is required to export all Splunk alerts. For more information, see [Splunk role-based user access](https://docs.splunk.com/Documentation/Splunk/9.1.3/Security/Aboutusersandroles).
30+
- Export the historical data from Splunk to the relevant tables in the Log Analytics workspace. For more information, see [Export historical data from Splunk](migration-splunk-historical-data.md)
31+
32+
You need the following on the target, Microsoft Sentinel:
33+
34+
- The SIEM migration experience deploys analytics rules. This capability requires the **Microsoft Sentinel Contributor** role. For more information, see [Permissions in Microsoft Sentinel](roles.md).
35+
- Ingest security data previously used in your source SIEM into Microsoft Sentinel by enabling an out-of-the-box (OOTB) data connector.
36+
- If the data connector isn't installed yet, find the relevant solution in **Content hub**.
37+
- If no data connector exists, create a custom ingestion pipeline.<br>For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md) or [Custom data ingestion and transformation](data-transformation.md).
38+
39+
## Translate Splunk detection rules
40+
41+
At the core of Splunk detection rules is the Search Processing Language (SPL). The SIEM migration experience systematically translates SPL to Kusto query language (KQL) for each Splunk rule. Carefully review translations and make adjustments to ensure migrated rules function as intended in your Microsoft Sentinel workspace. For more information on the concepts important in translating detection rules, see [migrate Splunk detection rules](migration-splunk-detection-rules.md).
42+
43+
Capabilities in public preview:
44+
45+
- Translate simple queries with a single data source
46+
- Direct translations listed in the article, [Splunk to Kusto cheat sheet](/azure/data-explorer/kusto/query/splunk-cheat-sheet)
47+
- Review translated query error feedback with edit capability to save time in the detection rule translation process
48+
49+
Here are some of the priorities that are important to us as we continue to develop the translation technology:
50+
51+
- Splunk Common Information Model (CIM) to Microsoft Sentinel's Advanced Security Information Model (ASIM) translation support
52+
- Translated queries feature a completeness status with translation states
53+
- Multiple data sources and index
54+
- Rule correlations
55+
- Support for macros
56+
- Support for lookups
57+
- Complex queries with joins
58+
59+
## Start the SIEM migration experience
60+
61+
1. Navigate to Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**.
62+
63+
1. Select **SIEM Migration (Preview)**.
64+
65+
:::image type="content" source="media/siem-migration/siem-migration-experience.png" alt-text="Screenshot showing content hub with menu item for the SIEM migration experience.":::
66+
67+
## Upload Splunk detections
68+
69+
1. From Splunk Web, select **Search and Reporting** in the **Apps** panel.
70+
71+
1. Run the following query:
72+
73+
`| rest splunk_server=local count=0 /services/saved/searches | search disabled=0 | table title,search ,*`
74+
75+
1. Select the export button and choose JSON as the format.
76+
77+
1. Save the file.
78+
79+
1. Upload the exported Splunk JSON file.
80+
81+
> [!NOTE]
82+
> The Splunk export must be a valid JSON file and the upload size is limited to 50 MB.
83+
84+
:::image type="content" source="media/siem-migration/upload-file.png" alt-text="Screenshot showing the upload files tab.":::
85+
86+
## Configure rules
87+
88+
1. Select **Configure Rules**.
89+
90+
1. Review the analysis of the Splunk export.
91+
92+
- **Name** is the original Splunk detection rule name.
93+
- **Compatibility** indicates if a Sentinel OOTB analytics rule matches the Splunk detection logic.
94+
95+
:::image type="content" source="media/siem-migration/configure-rules.png" alt-text="Screenshot showing the results of the automatic rule mapping." lightbox="media/siem-migration/configure-rules.png":::
96+
97+
> [!NOTE]
98+
> Check the schema of the data types and fields used in the rule logic. Microsoft Sentinel Analytics require that the data type be present in the Log Analytics Workspace before the rule is enabled. It's also important the fields used in the query are accurate for the defined data type schema.
99+
100+
1. When the review is complete, select **Review and migrate**.
101+
102+
## Deploy the Analytics rules
103+
104+
1. Select **Deploy** to start the deployment of analytics rules to your Microsoft Sentinel workspace.
105+
106+
The following resources are deployed:
107+
- For all OOTB matches, the corresponding solutions with the matched analytics rule are installed, and the matched rules are deployed as active analytics rules.
108+
- All custom rules translated to Sentinel analytics rules are deployed as active analytics rules.
109+
110+
1. View the properties of deployed rules from Microsoft Sentinel **Analytics**.
111+
112+
- All migrated rules are deployed with the Prefix **[Splunk Migrated]**.
113+
- All migrated rules are set to disabled.
114+
- The following properties are retained from the Splunk export wherever possible:<br>
115+
`Severity`<br>
116+
`queryFrequency`<br>
117+
`queryPeriod`<br>
118+
`triggerOperator`<br>
119+
`triggerThreshold`<br>
120+
`suppressionDuration`
121+
122+
1. Enable rules you've reviewed and verified.
123+
124+
## Next step
125+
126+
In this article, you learned how to use the SIEM migration experience.
127+
128+
> [!div class="nextstepaction"]
129+
> [Migrate Splunk detection rules](migration-splunk-detection-rules.md)

articles/sentinel/whats-new.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: What's new in Microsoft Sentinel
3-
description: This article describes new features in Microsoft Sentinel from the past few months.
3+
description: Learn about the latest new features and announcement in Microsoft Sentinel from the past few months.
44
author: yelevin
55
ms.author: yelevin
6-
ms.topic: conceptual
7-
ms.date: 02/28/2024
6+
ms.topic: concept
7+
ms.date: 03/11/2024
88
---
99

1010
# What's new in Microsoft Sentinel
@@ -23,7 +23,15 @@ The listed features were released in the last three months. For information abou
2323

2424
## March 2024
2525

26-
[Data connectors for Syslog and CEF based on Azure Monitor Agent now generally available (GA)](#data-connectors-for-syslog-and-cef-based-on-azure-monitor-agent-now-generally-available-ga)
26+
- [SIEM migration experience (preview)](#siem-migration-experience-preview)
27+
- [Data connectors for Syslog and CEF based on Azure Monitor Agent now generally available (GA)](#data-connectors-for-syslog-and-cef-based-on-azure-monitor-agent-now-generally-available-ga)
28+
29+
### SIEM migration experience (preview)
30+
31+
The new Microsoft Sentinel Migration experience helps customers and partners to automate the process of migrating their security monitoring use cases hosted in non-Microsoft products into Microsoft Sentinel.
32+
- This first version of the tool supports migrations from Splunk
33+
34+
For more information, see [Migrate to Microsoft Sentinel with the SIEM migration experience](siem-migration.md)
2735

2836
### Data connectors for Syslog and CEF based on Azure Monitor Agent now generally available (GA)
2937

@@ -86,7 +94,7 @@ Incident tasks, which help you standardize your incident investigation and respo
8694

8795
Microsoft Sentinel data connectors for Amazon Web Services (AWS) and Google Cloud Platform (GCP) now include supporting configurations to ingest data into workspaces in Azure Government clouds.
8896

89-
The configurations for these connectors for Azure Government customers differs slightly from the public cloud configuration. See the relevant documentation for details:
97+
The configurations for these connectors for Azure Government customers differ slightly from the public cloud configuration. See the relevant documentation for details:
9098

9199
- [Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data](connect-aws.md)
92100
- [Ingest Google Cloud Platform log data into Microsoft Sentinel](connect-google-cloud-platform.md)

0 commit comments

Comments
 (0)