Skip to content

Commit d235209

Browse files
authored
Merge pull request #221332 from oshezaf/asim/update-audit-schema
asim/update-audit-schema
2 parents a4ed7fa + 4bb9644 commit d235209

File tree

2 files changed

+23
-25
lines changed

2 files changed

+23
-25
lines changed

articles/sentinel/normalization-parsers-list.md

Lines changed: 17 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ This document provides a list of Advanced Security Information Model (ASIM) pars
1818
>
1919
## Authentication parsers
2020

21+
To use ASIM authentication parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimAuthentication). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
22+
2123
- **Windows sign-ins**
2224
- Collected using the Log Analytics Agent or Azure Monitor Agent.
2325
- Collected using either the Security Events connectors to the SecurityEvent table or using the WEF connector to the WindowsEvent table.
@@ -30,12 +32,11 @@ This document provides a list of Advanced Security Information Model (ASIM) pars
3032
- **AWS sign-ins**, collected using the AWS CloudTrail connector.
3133
- **Okta authentication**, collected using the Okta connector.
3234
- **PostgreSQL** sign-in logs.
33-
34-
Deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimAuthentication).
35+
3536

3637
## DNS parsers
3738

38-
Microsoft Sentinel provides the following out-of-the-box, product-specific DNS parsers:
39+
ASIM DNS parsers are available in every workspace. Microsoft Sentinel provides the following out-of-the-box parsers:
3940

4041
| **Source** | **Notes** | **Parser**
4142
| --- | --------------------------- | ---------- |
@@ -51,11 +52,12 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific DNS p
5152
| **Zscaler ZIA** | | `_Im_Dns_ZscalerZIAVxx` |
5253
||||
5354

54-
Deploy the workspace deployed parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimDNS).
55+
Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimDNS).
5556

5657
## File Activity parsers
5758

58-
Microsoft Sentinel provides the following out-of-the-box, product-specific File Activity parsers:
59+
To use ASIM File Activity parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimFileEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
60+
5961

6062
- **Windows file activity**
6163
- Reported by **Windows (event 4663)**:
@@ -69,11 +71,10 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific File
6971
- **Microsoft Office 365 SharePoint and OneDrive events**, collected using the Office Activity connector.
7072
- **Azure Storage**, including Blob, File, Queue, and Table Storage.
7173

72-
Deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimFileEvent).
73-
7474
## Network Session parsers
7575

76-
Microsoft Sentinel provides the following out-of-the-box, product-specific Network Session parsers:
76+
ASIM Network Session parsers are available in every workspace. Microsoft Sentinel provides the following out-of-the-box parsers:
77+
7778

7879
| **Source** | **Notes** | **Parser** |
7980
| --- | --------------------------- | ------------------------------ |
@@ -90,52 +91,46 @@ Microsoft Sentinel provides the following out-of-the-box, product-specific Netwo
9091
| **Fortigate FortiOS** | IP connection logs collected using Syslog. | `_Im_NetworkSession_FortinetFortiGateVxx` |
9192
| **Microsoft 365 Defender for Endpoint** | | `_Im_NetworkSession_Microsoft365DefenderVxx`|
9293
| **Microsoft Defender for IoT micro agent** | | `_Im_NetworkSession_MD4IoTAgentVxx` |
93-
| **Microsoft Defender for IoT sensor** | | `_Im_NetworkSession_MD4IoTSensorVxx` * |
94+
| **Microsoft Defender for IoT sensor** | | `_Im_NetworkSession_MD4IoTSensorVxx` |
9495
| **Palo Alto PanOS traffic logs** | Collected using CEF. | `_Im_NetworkSession_PaloAltoCEFVxx` |
9596
| **Sysmon for Linux** (event 3) | Collected using the Log Analytics Agent<br> or the Azure Monitor Agent. |`_Im_NetworkSession_LinuxSysmonVxx` |
9697
| **Vectra AI** | | `_Im_NetworkSession_VectraIAVxx` |
9798
| **Windows Firewall logs** | Collected as Windows events using the Log Analytics Agent (Event table) or Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
9899
| **Watchguard FirewareOW** | Collected using Syslog. | `_Im_NetworkSession_WatchGuardFirewareOSVxx` |
99100
| **Zscaler ZIA firewall logs** | Collected using CEF. | `_Im_NetworkSessionZscalerZIAVxx` |
100101

101-
Note that the parsers marked with (*) are available for deployment from GitHub and are not yet built into workspaces.
102-
103-
Deploy the workspace deployed parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimNetworkSession).
102+
Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimNetworkSession).
104103

105104
## Process Event parsers
106105

107-
Microsoft Sentinel provides the following built-in, product-specific Process Event parsers:
106+
To use ASIM Process Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimProcessEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
108107

109108
- **Security Events process creation (Event 4688)**, collected using the Log Analytics Agent or Azure Monitor Agent
110109
- **Security Events process termination (Event 4689)**, collected using the Log Analytics Agent or Azure Monitor Agent
111110
- **Sysmon process creation (Event 1)**, collected using the Log Analytics Agent or Azure Monitor Agent
112111
- **Sysmon process termination (Event 5)**, collected using the Log Analytics Agent or Azure Monitor Agent
113112
- **Microsoft 365 Defender for Endpoint process creation**
114113

115-
Deploy Process Event parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimProcessEvent).
116-
117114
## Registry Event parsers
118115

119-
Microsoft Sentinel provides the following built-in, product-specific Registry Event parsers:
116+
To use ASIM Registry Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimRegistryEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
120117

121-
- **Security Events registry update (Event 4657**), collected using the Log Analytics Agent or Azure Monitor Agent
118+
- **Security Events registry update (Events 4657 and 4663)**, collected using the Log Analytics Agent or Azure Monitor Agent
122119
- **Sysmon registry monitoring events (Events 12, 13, and 14)**, collected using the Log Analytics Agent or Azure Monitor Agent
123120
- **Microsoft 365 Defender for Endpoint registry events**
124121

125-
Deploy Registry Event parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimRegistryEvent).
126-
127122
## Web Session parsers
128123

129-
Microsoft Sentinel provides the following out-of-the-box, product-specific Web Session parsers:
124+
ASIM Web Session parsers are available in every workspace. Microsoft Sentinel provides the following out-of-the-box parsers:
125+
130126

131127
| **Source** | **Notes** | **Parser** |
132128
| --- | --------------------------- | ------------------------------ |
133129
| **Squid Proxy** | | `_Im_WebSession_SquidProxyVxx` |
134130
| **Vectra AI Streams** | | `_Im_WebSession_VectraAIVxx` |
135131
| **Zscaler ZIA** | Collected using CEF | `_Im_WebSessionZscalerZIAVxx` |
136132

137-
138-
These parsers can be deployed from the [Microsoft Sentinel GitHub repository](https://aka.ms/DeployASIM).
133+
Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHub repository](https://aka.ms/DeployASIM).
139134

140135
## <a name="next-steps"></a>Next steps
141136

articles/sentinel/normalization-schema-audit.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.author: ofshezaf
1010

1111
# The Advanced Security Information Model (ASIM) Audit Events normalization schema reference (Public preview)
1212

13-
The Microsoft Sentinel Audit events normalization schema represents events associated with the audit trail of information systems. The audit trail logs system configuration and policy changes. Such changes are often performed by system administrators, but can also be performed by users when configuring the settings of their own applications.
13+
The Microsoft Sentinel Audit events normalization schema represents events associated with the audit trail of information systems. The audit trail logs system configuration activities and policy changes. Such changes are often performed by system administrators, but can also be performed by users when configuring the settings of their own applications.
1414

1515
Every system logs audit events alongside its core activity logs. For example, a Firewall will log events about the network sessions is processes, as well as audit events about configuration changes applied to the Firewall itself.
1616

@@ -27,7 +27,7 @@ For more information about normalization in Microsoft Sentinel, see [Normalizati
2727
The main fields of an audit event are:
2828
- The object, typically a configuration atom or policy rule that the event focuses on, represented by the field [Object](#object).
2929
- The application context of the object, represented by the field [TargetAppName](#targetappname), which is aliased by [Application](#application).
30-
- The operation performed on the object,represented by the field [EventType](#eventtype).
30+
- The operation performed on the object, represented by the fields [EventType](#eventtype) and [EventOriginalType](#eventoriginaltype).
3131
- The old and new values for the object, if applicable, represented by [OldValue](#oldvalue) and [NewValue](#newvalue) respectively.
3232

3333
Audit events also reference the following entities which are involved in the configuration operation:
@@ -55,7 +55,9 @@ The following list mentions fields that have specific guidelines for Audit Event
5555

5656
| Field | Class | Type | Description |
5757
|---------------------|-------------|------------|--------------------|
58-
| <a name="eventtype"></a> **EventType** | Mandatory | Enumerated | Describes the operation reported by the record.<br><br> For Audit Event records, the allowed values are:<br> - `Set`<br>- `Read`<br>- `Create`<br>- `Delete` |
58+
| <a name="eventtype"></a> **EventType** | Mandatory | Enumerated | Describes the operation reported by the record.<br><br> For Audit Event records, the allowed values are:<br> - `Set`<br>- `Read`<br>- `Create`<br>- `Delete`<br>- `Execute`<br>- `Install`<br>- `Clear`<br>- `Enable`<br>- `Disable`<br>- `Other`. <br><br>Audit events represent a large variety of operations, and the `Other` value enables mapping operations that have no corresponding `EventType`. However, the use of `Other` limit the usability of the event and should be avoided if possible. |
59+
| <a name="eventsubtype"></a> **EventSubType** | Recommended | String | While [EventType](#eventtype) is an enumerated value that has to one of a limited set of options, **EventSubType** allows more specific labeling of the operation audited. |
60+
| <a name="eventoriginaltype"></a> **EventOriginalType** | Optional | String | The operation as reported by the reporting system. |
5961
| **EventSchema** | Mandatory | String | The name of the schema documented here is `AuditEvent`. |
6062
| **EventSchemaVersion** | Mandatory | String | The version of the schema. The version of the schema documented here is `0.1`. |
6163

@@ -80,6 +82,7 @@ Fields that appear in the table below are common to all ASIM schemas. Any guidel
8082
| **ObjectType** | Mandatory | Enumerated | The type of [Object](#object). Allowed values are:<br>- `Configuration Atom`<br>- `Policy Rule`<br> - Other |
8183
| <a name="oldvalue"></a> **OldValue** | Optional | String | The old value of [Object](#object) prior to the operation, if applicable. |
8284
| <a name="newvalue"></a>**NewValue** | Optional | String | The new value of [Object](#object) after the operation was performed, if applicable. |
85+
| <a name="value"></a>**Value** | Alias | | Alias to [NewValue](#newvalue) |
8386
| **ValueType** | Optional | Enumerated | The type of the old and new values. Allowed values are<br>- Other. |
8487

8588
### Actor fields

0 commit comments

Comments
 (0)