You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/fortinet-fortindr-cloud.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,15 @@ title: "Fortinet FortiNDR Cloud (using Azure Functions) connector for Microsoft
3
3
description: "Learn how to install the connector Fortinet FortiNDR Cloud (using Azure Functions) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 04/26/2024
6
+
ms.date: 05/30/2024
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
ms.collection: sentinel-data-connector
10
10
---
11
11
12
12
# Fortinet FortiNDR Cloud (using Azure Functions) connector for Microsoft Sentinel
13
13
14
-
The Fortinet FortiNDR Cloud data connector provides the capability to ingest [Fortinet FortiNDR Cloud](https://docs.fortinet.com/product/fortindr-cloud)events stored in Amazon S3 into Microsoft Sentinel using the Amazon S3 REST API.
14
+
The Fortinet FortiNDR Cloud data connector provides the capability to ingest [Fortinet FortiNDR Cloud](https://docs.fortinet.com/product/fortindr-cloud)data into Microsoft Sentinel using the FortiNDR Cloud API
15
15
16
16
This is autogenerated content. For changes, contact the solution provider.
17
17
@@ -58,14 +58,15 @@ FncEventsDetections_CL
58
58
To integrate with Fortinet FortiNDR Cloud (using Azure Functions) make sure you have:
59
59
60
60
-**Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
61
-
-**MetaStream Credentials/permissions**: **AWS Access Key Id**, **AWS Secret Access Key**, **FortiNDR Cloud Account Code** are required to retrieve event data.
61
+
-**MetaStream Credentials**: **AWS Access Key Id**, **AWS Secret Access Key**, **FortiNDR Cloud Account Code** are required to retrieve event data.
62
+
-**API Credentials**: **FortiNDR Cloud API Token**, **FortiNDR Cloud Account UUID** are required to retrieve detection data.
62
63
63
64
64
65
## Vendor installation instructions
65
66
66
67
67
68
> [!NOTE]
68
-
> This connector uses Azure Functions to connect to the Amazon S3 REST API to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
69
+
> This connector uses Azure Functions to connect to the FortiNDR Cloud API to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
69
70
70
71
71
72
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
@@ -82,7 +83,7 @@ The provider should provide or link to detailed steps to configure the 'PROVIDER
82
83
83
84
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
84
85
85
-
>**IMPORTANT:** Before deploying the Fortinet FortiNDR Cloud connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the as well as the MetaStream credentials (available in FortiNDR Cloud account management), readily available.
86
+
>**IMPORTANT:** Before deploying the Fortinet FortiNDR Cloud connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the as well as the FortiNDR Cloud API credentials (available in FortiNDR Cloud account management), readily available.
The GitHub audit log connector provides the capability to ingest GitHub logs into Microsoft Sentinel. By connecting GitHub audit logs into Microsoft Sentinel, you can view this data in workbooks, use it to create custom alerts, and improve your investigation process.
15
15
16
-
**Note:** If you are intended to ingest GitHub subscribed events into Microsoft Sentinel , Please refer to GitHub (using Webhooks) Connector from "**Data Connectors**" gallery.
16
+
**Note:** If you intended to ingest GitHub subscribed events into Microsoft Sentinel, please refer to GitHub (using Webhooks) Connector from "**Data Connectors**" gallery.
17
+
18
+
This is autogenerated content. For changes, contact the solution provider.
17
19
18
20
## Connector attributes
19
21
@@ -47,8 +49,8 @@ To integrate with GitHub Enterprise Audit Log make sure you have:
47
49
48
50
Connect the GitHub Enterprise Organization-level Audit Log to Microsoft Sentinel
49
51
50
-
Enable GitHub audit Logs.
51
-
Follow [this](https://docs.github.com/en/github/authenticating-to-github/keeping-your-account-and-data-secure/creating-a-personal-access-token) to create or find your personal key
52
+
Enable GitHub audit logs.
53
+
Follow [this guide](https://docs.github.com/en/github/authenticating-to-github/keeping-your-account-and-data-secure/creating-a-personal-access-token) to create or find your personal access token.
To integrate with VMware vCenter make sure you have:
53
+
54
+
-**Include custom pre-requisites if the connectivity requires - else delete customs**: Description for any custom pre-requisite
55
+
56
+
50
57
## Vendor installation instructions
51
58
52
59
@@ -64,9 +71,9 @@ Typically, you should install the agent on a different computer from the one on
64
71
65
72
Follow the configuration steps below to get vCenter server logs into Microsoft Sentinel. Refer to the [Azure Monitor Documentation](/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
66
73
For vCenter Server logs, we have issues while parsing the data by OMS agent data using default settings.
67
-
So we advice to capture the logs into custom table **vCenter_CL** using below instructions.
74
+
So we advice to capture the logs into custom table **vcenter_CL** using below instructions.
68
75
1. Login to the server where you have installed OMS agent.
With an added statement you will need to create a filter which will specify the logs coming from the vcenter server to be forwarded to the custom table.
0 commit comments