Skip to content

Commit d6e31b2

Browse files
committed
Datacnnectors update
1 parent 8c5f955 commit d6e31b2

14 files changed

+534
-86
lines changed

articles/sentinel/data-connectors/amazon-web-services-s3.md

Lines changed: 3 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Amazon Web Services S3 connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Amazon Web Services S3 to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -25,64 +25,10 @@ This is autogenerated content. For changes, contact the solution provider.
2525

2626
| Connector attribute | Description |
2727
| --- | --- |
28-
| **Log Analytics table(s)** | AWSGuardDuty<br/> AWSVPCFlow<br/> AWSCloudTrail<br/> AWSCloudWatch<br/>|
29-
| **Data collection rules support** | [Supported as listed](/azure/azure-monitor/logs/tables-feature-support) |
28+
| **Log Analytics table(s)** | AWSGuardDuty<br/> AWSVPCFlow<br/> AWSCloudTrail<br/> AWSCloudWatch<br/> |
29+
| **Data collection rules support** | Not currently supported |
3030
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
3131

32-
## Query samples
33-
34-
**High severity findings summarized by activity type**
35-
36-
```kusto
37-
AWSGuardDuty
38-
39-
| where Severity > 7
40-
41-
| summarize count() by ActivityType
42-
```
43-
44-
**Top 10 rejected actions of type IPv4**
45-
46-
```kusto
47-
AWSVPCFlow
48-
49-
| where Action == "REJECT"
50-
51-
| where Type == "IPv4"
52-
53-
| take 10
54-
```
55-
56-
**User creation events summarized by region**
57-
58-
```kusto
59-
AWSCloudTrail
60-
61-
| where EventName == "CreateUser"
62-
63-
| summarize count() by AWSRegion
64-
```
65-
66-
67-
68-
## Prerequisites
69-
70-
To integrate with Amazon Web Services S3 make sure you have:
71-
72-
- **Environment**: you must have the following AWS resources defined and configured: S3, Simple Queue Service (SQS), IAM roles and permissions policies, and the AWS services whose logs you want to collect.
73-
74-
75-
## Vendor installation instructions
76-
77-
1. Set up your AWS environment
78-
79-
The​re are two options for setting up your AWS environment to send logs from an S3 bucket to your Log Analytics Workspace:
80-
81-
82-
2. Add connection
83-
84-
85-
8632

8733
## Next steps
8834

articles/sentinel/data-connectors/api-protection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "API Protection connector for Microsoft Sentinel"
33
description: "Learn how to install the connector API Protection to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 10/28/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -72,7 +72,7 @@ Copy the values shown below and save them for configuration of the API log forwa
7272

7373
Step 3: Install the 42Crunch protection and log forwarder
7474

75-
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the [42Crunch repository](https://hub.docker.com/u/42crunch). The exact installation depends on your environment, consult the [42Crunch protection documentation](https://docs.42crunch.com/latest/content/concepts/api_firewall_deployment_architecture.htm) for full details. Two common installation scenarios are described below:
75+
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the [42Crunch repository](https://hub.docker.com/u/42crunch). The exact installation will depend on your environment, consult the [42Crunch protection documentation](https://docs.42crunch.com/latest/content/concepts/api_firewall_deployment_architecture.htm) for full details. Two common installation scenarios are described below:
7676

7777

7878
Installation via Docker Compose
@@ -89,11 +89,11 @@ In order to test the data ingestion the user should deploy the sample *httpbin*
8989

9090
4.1 Install the sample
9191

92-
The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which installs the httpbin API server, the 42Crunch API protection, and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
92+
The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which will install the httpbin API server, the 42Crunch API protection and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
9393

9494
4.2 Run the sample
9595

96-
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the *localhost* at port 8080 using curl, or similar. You should see a mixture of passing and failing API calls.
96+
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the *localhost* at port 8080 using Postman, curl, or similar. You should see a mixture of passing and failing API calls.
9797

9898
4.3 Verify the data ingestion on Log Analytics
9999

articles/sentinel/data-connectors/atlassian-confluence-audit.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Atlassian Confluence Audit (using Azure Functions) connector for Microso
33
description: "Learn how to install the connector Atlassian Confluence Audit (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 10/15/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -20,7 +20,7 @@ This is autogenerated content. For changes, contact the solution provider.
2020
| Connector attribute | Description |
2121
| --- | --- |
2222
| **Application settings** | ConfluenceUsername<br/>ConfluenceAccessToken<br/>ConfluenceHomeSiteName<br/>WorkspaceID<br/>WorkspaceKey<br/>logAnalyticsUri (optional) |
23-
| **Azure function app code** | [https://aka.ms/sentinel-confluenceauditapi-functionapp](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) |
23+
| **Azure function app code** | https://aka.ms/sentinel-confluenceauditapi-functionapp |
2424
| **Log Analytics table(s)** | Confluence_Audit_CL<br/> |
2525
| **Data collection rules support** | Not currently supported |
2626
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -89,7 +89,7 @@ Use the following step-by-step instructions to deploy the Confluence Audit data
8989

9090
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
9191
92-
1. Download the [Azure Function App](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) file. Extract archive to your local development computer.
92+
1. Download the [Azure Function App](https://aka.ms/sentinel-confluenceauditapi-functionapp) file. Extract archive to your local development computer.
9393
2. Start VS Code. Choose File in the main menu and select Open Folder.
9494
3. Select the top level folder from extracted files.
9595
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.

articles/sentinel/data-connectors/bitglass.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Bitglass (using Azure Functions) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Bitglass (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 10/15/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -63,7 +63,7 @@ To integrate with Bitglass (using Azure Functions) make sure you have:
6363

6464
Follow the instructions to obtain the credentials.
6565

66-
1. Please contact Bitglass [support](https://pages.bitglass.com/Contact.html) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
66+
1. Please contact Bitglass [support](https://www.forcepoint.com/company/contact-us) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
6767
2. Save credentials for using in the data connector.
6868

6969

articles/sentinel/data-connectors/cohesity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Cohesity (using Azure Functions) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Cohesity (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -50,7 +50,7 @@ To integrate with Cohesity (using Azure Functions) make sure you have:
5050
> This connector uses Azure Functions that connect to the Azure Blob Storage and KeyVault. This might result in additional costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/), [Azure Blob Storage pricing page](https://azure.microsoft.com/pricing/details/storage/blobs/) and [Azure KeyVault pricing page](https://azure.microsoft.com/pricing/details/key-vault/) for details.
5151
5252

53-
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Functions App.
53+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
5454
5555

5656
**STEP 1 - Get a Cohesity DataHawk API key (see troubleshooting [instruction 1](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CohesitySecurity/Data%20Connectors/Helios2Sentinel/IncidentProducer))**
Lines changed: 131 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
---
2+
title: "CommvaultSecurityIQ (using Azure Functions) connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector CommvaultSecurityIQ (using Azure Functions) to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 11/20/2024
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
ms.collection: sentinel-data-connector
10+
---
11+
12+
# CommvaultSecurityIQ (using Azure Functions) connector for Microsoft Sentinel
13+
14+
This Azure Function enables Commvault users to ingest alerts/events into their Microsoft Sentinel instance. With Analytic Rules,Microsoft Sentinel can automatically create Microsoft Sentinel incidents from incoming events and logs.
15+
16+
This is autogenerated content. For changes, contact the solution provider.
17+
18+
## Connector attributes
19+
20+
| Connector attribute | Description |
21+
| --- | --- |
22+
| **Application settings** | apiUsername<br/>apipassword<br/>apiToken<br/>workspaceID<br/>workspaceKey<br/>uri<br/>logAnalyticsUri (optional)(add any other settings required by the Function App)Set the <code>uri</code> value to: <code>&lt;add uri value&gt;</code> |
23+
| **Azure function app code** | Add%20GitHub%20link%20to%20Function%20App%20code |
24+
| **Log Analytics table(s)** | CommvaultSecurityIQ_CL<br/> |
25+
| **Data collection rules support** | Not currently supported |
26+
| **Supported by** | [Commvault](https://www.commvault.com/support) |
27+
28+
## Query samples
29+
30+
**Last 10 events/alerts **
31+
32+
```kusto
33+
CommvaultSecurityIQ_CL
34+
35+
| where TimeGenerated > ago(24h)
36+
37+
| limit 10
38+
```
39+
40+
41+
42+
## Prerequisites
43+
44+
To integrate with CommvaultSecurityIQ (using Azure Functions) make sure you have:
45+
46+
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
47+
- **Commvault Environment Endpoint URL**: Make sure to follow the documentation and set the secret value in KeyVault
48+
- **Commvault QSDK Token**: Make sure to follow the documentation and set the secret value in KeyVault
49+
50+
51+
## Vendor installation instructions
52+
53+
54+
> [!NOTE]
55+
> This connector uses Azure Functions to connect to a Commvault Instance to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
56+
57+
58+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
59+
60+
61+
**STEP 1 - Configuration steps for the Commvalut QSDK Token**
62+
63+
[Follow these instructions](/cloud-app-security/api-authentication) to create an API Token.
64+
65+
66+
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
67+
68+
>**IMPORTANT:** Before deploying the CommvaultSecurityIQ data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the Commvault Endpoint URL and QSDK Token, readily available.
69+
70+
71+
72+
73+
**Option 1 - Azure Resource Manager (ARM) Template**
74+
75+
Use this method for automated deployment of the Commvault Security IQ data connector.
76+
77+
1. Click the **Deploy to Azure** button below.
78+
79+
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-CommvaultSecurityIQ-azuredeploy)
80+
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
81+
3. Enter the **Workspace ID**, **Workspace Key**, **API Username**, **API Password**, 'and/or Other required fields'.
82+
>Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
83+
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
84+
5. Click **Purchase** to deploy.
85+
86+
87+
**Option 2 - Manual Deployment of Azure Functions**
88+
89+
Use the following step-by-step instructions to deploy the CommvaultSecurityIQ data connector manually with Azure Functions.
90+
91+
1. Create a Function App
92+
93+
1. From the Azure Portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp).
94+
2. Click **+ Add** at the top.
95+
3. In the **Basics** tab, ensure Runtime stack is set to **'Add Required Language'**.
96+
4. In the **Hosting** tab, ensure **Plan type** is set to **'Add Plan Type'**.
97+
5. 'Add other required configurations'.
98+
5. 'Make other preferable configuration changes', if needed, then click **Create**.
99+
100+
2. Import Function App Code
101+
102+
1. In the newly created Function App, select **Functions** from the navigation menu and click **+ Add**.
103+
2. Select **Timer Trigger**.
104+
3. Enter a unique Function **Name** in the New Function field and leave the default cron schedule of every 5 minutes, then click **Create Function**.
105+
4. Click on the function name and click **Code + Test** from the left pane.
106+
5. Copy the [Function App Code](<Add GitHub link to Function App code>) and paste into the Function App `run.ps1` editor.
107+
6. Click **Save**.
108+
109+
3. Configure the Function App
110+
111+
1. In the Function App screen, click the Function App name and select **Configuration**.
112+
2. In the **Application settings** tab, select **+ New application setting**.
113+
3. Add each of the following 'x (number of)' application settings individually, under Name, with their respective string values (case-sensitive) under Value:
114+
apiUsername
115+
apipassword
116+
apiToken
117+
workspaceID
118+
workspaceKey
119+
uri
120+
logAnalyticsUri (optional)
121+
(add any other settings required by the Function App)
122+
Set the `uri` value to: `<add uri value>`
123+
>Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Azure Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
124+
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: https://<CustomerId>.ods.opinsights.azure.us.
125+
4. Once all application settings have been entered, click **Save**.
126+
127+
128+
129+
## Next steps
130+
131+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/commvault.microsoft-sentinel-solution-commvaultsecurityiq?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/dataminr-pulse-alerts-data-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Dataminr Pulse Alerts Data Connector (using Azure Functions) connector f
33
description: "Learn how to install the connector Dataminr Pulse Alerts Data Connector (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 10/28/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -223,7 +223,7 @@ If you're already signed in, go to the next step.
223223

224224
2) To add integration settings in Dataminr RTAP using the function URL
225225

226-
1. Open any API request tool.
226+
1. Open any API request tool like Postman.
227227
2. Click on '+' to create a new request.
228228
3. Select HTTP request method as **'POST'**.
229229
4. Enter the url prepapred in **point 1)**, in the request URL part.

articles/sentinel/data-connectors/forescout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Forescout connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Forescout to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 11/20/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -41,7 +41,7 @@ ForescoutEvent
4141

4242

4343
> [!NOTE]
44-
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Forescout%20(Legacy)/Parsers/ForescoutEvent.yaml) which is deployed with the Microsoft Sentinel Solution.
44+
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://aka.ms/sentinel-forescout-parser) which is deployed with the Microsoft Sentinel Solution.
4545
4646

4747
> [!NOTE]

0 commit comments

Comments
 (0)