|
| 1 | +--- |
| 2 | +title: Use the SIEM migration experience |
| 3 | +titleSuffix: Microsoft Sentinel |
| 4 | +description: Migrate security monitoring use cases from other Security Information and Event Management (SIEM) systems to Microsoft Sentinel. |
| 5 | +author: austinmccollum |
| 6 | +ms.topic: how-to |
| 7 | +ms.date: 3/11/2024 |
| 8 | +ms.author: austinmc |
| 9 | +appliesto: Microsoft Sentinel |
| 10 | +#customer intent: As an SOC administrator, I want to use the SIEM migration experience so I can migrate to Microsoft Sentinel. |
| 11 | +--- |
| 12 | + |
| 13 | +# Migrate to Microsoft Sentinel with the SIEM migration experience (preview) |
| 14 | + |
| 15 | +Migrate your SIEM to Microsoft Sentinel for all your security monitoring use cases. Automated assistance from the SIEM Migration experience simplifies your migration. |
| 16 | + |
| 17 | +These features are currently included in the SIEM Migration experience: |
| 18 | + |
| 19 | +**Splunk** |
| 20 | +- The experience focuses on migrating Splunk security monitoring to Microsoft Sentinel. |
| 21 | +- The experience only supports migration of Splunk detections to Microsoft Sentinel analytics rules. |
| 22 | + |
| 23 | +## Prerequisites |
| 24 | + |
| 25 | +You need the following from the source SIEM: |
| 26 | + |
| 27 | +**Splunk** |
| 28 | +- The migration experience is compatible with both Splunk Enterprise and Splunk Cloud editions. |
| 29 | +- A Splunk admin role is required to export all Splunk alerts. For more information, see [Splunk role-based user access](https://docs.splunk.com/Documentation/Splunk/9.1.3/Security/Aboutusersandroles). |
| 30 | +- Export the historical data from Splunk to the relevant tables in the Log Analytics workspace. For more information, see [Export historical data from Splunk](migration-splunk-historical-data.md) |
| 31 | + |
| 32 | +You need the following on the target, Microsoft Sentinel: |
| 33 | + |
| 34 | +- The SIEM migration experience deploys analytics rules. This capability requires the **Microsoft Sentinel Contributor** role. For more information, see [Permissions in Microsoft Sentinel](roles.md). |
| 35 | +- Ingest security data previously used in your source SIEM into Microsoft Sentinel by enabling an out-of-the-box (OOTB) data connector. |
| 36 | + - If the data connector isn't installed yet, find the relevant solution in **Content hub**. |
| 37 | + - If no data connector exists, create a custom ingestion pipeline.<br>For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md) or [Custom data ingestion and transformation](data-transformation.md). |
| 38 | + |
| 39 | +## Translate Splunk detection rules |
| 40 | + |
| 41 | +At the core of Splunk detection rules is the Search Processing Language (SPL). The SIEM migration experience systematically translates SPL to Kusto query language (KQL) for each Splunk rule. Carefully review translations and make adjustments to ensure migrated rules function as intended in your Microsoft Sentinel workspace. For more information on the concepts important in translating detection rules, see [migrate Splunk detection rules](migration-splunk-detection-rules.md). |
| 42 | + |
| 43 | +Capabilities in public preview: |
| 44 | + |
| 45 | +- Translate simple queries with a single data source |
| 46 | +- Direct translations listed in the article, [Splunk to Kusto cheat sheet](/azure/data-explorer/kusto/query/splunk-cheat-sheet) |
| 47 | +- Review translated query error feedback with edit capability to save time in the detection rule translation process |
| 48 | + |
| 49 | +Here are some of the priorities that are important to us as we continue to develop the translation technology: |
| 50 | + |
| 51 | +- Splunk Common Information Model (CIM) to Microsoft Sentinel's Advanced Security Information Model (ASIM) translation support |
| 52 | +- Translated queries feature a completeness status with translation states |
| 53 | +- Multiple data sources and index |
| 54 | +- Rule correlations |
| 55 | +- Support for macros |
| 56 | +- Support for lookups |
| 57 | +- Complex queries with joins |
| 58 | + |
| 59 | +## Start the SIEM migration experience |
| 60 | + |
| 61 | +1. Navigate to Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Content management**, select **Content hub**. |
| 62 | + |
| 63 | +1. Select **SIEM Migration (Preview)**. |
| 64 | + |
| 65 | +:::image type="content" source="media/siem-migration/siem-migration-experience.png" alt-text="Screenshot showing content hub with menu item for the SIEM migration experience."::: |
| 66 | + |
| 67 | +## Upload Splunk detections |
| 68 | + |
| 69 | +1. From Splunk Web, select **Search and Reporting** in the **Apps** panel. |
| 70 | + |
| 71 | +1. Run the following query: |
| 72 | + |
| 73 | + `| rest splunk_server=local count=0 /services/saved/searches | search disabled=0 | table title,search ,*` |
| 74 | + |
| 75 | +1. Select the export button and choose JSON as the format. |
| 76 | + |
| 77 | +1. Save the file. |
| 78 | + |
| 79 | +1. Upload the exported Splunk JSON file. |
| 80 | + |
| 81 | +> [!NOTE] |
| 82 | +> The Splunk export must be a valid JSON file and the upload size is limited to 50 MB. |
| 83 | +
|
| 84 | +:::image type="content" source="media/siem-migration/upload-file.png" alt-text="Screenshot showing the upload files tab."::: |
| 85 | + |
| 86 | +## Configure rules |
| 87 | + |
| 88 | +1. Select **Configure Rules**. |
| 89 | + |
| 90 | +1. Review the analysis of the Splunk export. |
| 91 | + |
| 92 | + - **Name** is the original Splunk detection rule name. |
| 93 | + - **Compatibility** indicates if a Sentinel OOTB analytics rule matches the Splunk detection logic. |
| 94 | + |
| 95 | + :::image type="content" source="media/siem-migration/configure-rules.png" alt-text="Screenshot showing the results of the automatic rule mapping." lightbox="media/siem-migration/configure-rules.png"::: |
| 96 | + |
| 97 | + > [!NOTE] |
| 98 | + > Check the schema of the data types and fields used in the rule logic. Microsoft Sentinel Analytics require that the data type be present in the Log Analytics Workspace before the rule is enabled. It's also important the fields used in the query are accurate for the defined data type schema. |
| 99 | +
|
| 100 | +1. When the review is complete, select **Review and migrate**. |
| 101 | + |
| 102 | +## Deploy the Analytics rules |
| 103 | + |
| 104 | +1. Select **Deploy** to start the deployment of analytics rules to your Microsoft Sentinel workspace. |
| 105 | + |
| 106 | + The following resources are deployed: |
| 107 | + - For all OOTB matches, the corresponding solutions with the matched analytics rule are installed, and the matched rules are deployed as active analytics rules. |
| 108 | + - All custom rules translated to Sentinel analytics rules are deployed as active analytics rules. |
| 109 | + |
| 110 | +1. View the properties of deployed rules from Microsoft Sentinel **Analytics**. |
| 111 | + |
| 112 | + - All migrated rules are deployed with the Prefix **[Splunk Migrated]**. |
| 113 | + - All migrated rules are set to disabled. |
| 114 | + - The following properties are retained from the Splunk export wherever possible:<br> |
| 115 | + `Severity`<br> |
| 116 | + `queryFrequency`<br> |
| 117 | + `queryPeriod`<br> |
| 118 | + `triggerOperator`<br> |
| 119 | + `triggerThreshold`<br> |
| 120 | + `suppressionDuration` |
| 121 | + |
| 122 | +1. Enable rules you've reviewed and verified. |
| 123 | + |
| 124 | +## Next step |
| 125 | + |
| 126 | +In this article, you learned how to use the SIEM migration experience. |
| 127 | + |
| 128 | +> [!div class="nextstepaction"] |
| 129 | +> [Migrate Splunk detection rules](migration-splunk-detection-rules.md) |
0 commit comments