You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| **Azure Activity administrative events** | Azure Activity events (in the `AzureActivity` table) in the category `Administrative`. | `ASimAuditEventAzureActivity` |
25
25
| **Exchange 365 administrative events** | Exchange Administrative events collected using the Office 365 connector (in the `OfficeActivity` table). | `ASimAuditEventMicrosoftOffice365` |
26
-
| **Windows Log clear event** | Windows Event 1102 collected using the Log Analytics agent Security Events connector or the Azure monitor agent Security Events and WEF connectors (using the `SecurityEvent`, `WindowsEvent`, or `Event` tables). | `ASimAuditEventMicrosoftWindowsEvents` |
26
+
| **Windows Log clear event** | Windows Event 1102 collected using the Log Analytics agent Security Events connector (legacy) or the Azure monitor agent Security Events and WEF connectors (using the `SecurityEvent`, `WindowsEvent`, or `Event` tables). | `ASimAuditEventMicrosoftWindowsEvents` |
27
27
28
28
## Authentication parsers
29
29
30
30
To use ASIM authentication parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/ASimAuthentication). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
31
31
32
32
- **Windows sign-ins**
33
-
- Collected using the Log Analytics Agent or Azure Monitor Agent.
33
+
- Collected using Azure Monitor Agent or the Log Analytics Agent (legacy).
34
34
- Collected using either the Security Events connectors to the SecurityEvent table or using the WEF connector to the WindowsEvent table.
35
35
- Reported as Security Events (4624, 4625, 4634, and 4647).
36
36
- reported by Microsoft Defender XDR for Endpoint, collected using the Microsoft Defender XDR connector.
@@ -56,8 +56,8 @@ ASIM DNS parsers are available in every workspace. Microsoft Sentinel provides t
| - **Infoblox NIOS**<br> - **BIND**<br> - **BlucCat** | The same parsers support multiple sources. | `_Im_Dns_InfobloxNIOSVxx` |
59
-
| **Microsoft DNS Server** | Collected using:<br>- DNS connector for the Log Analytics Agent<br>- DNS connector for the Azure Monitor Agent<br>- NXlog | <br>`_Im_Dns_MicrosoftOMSVxx`<br>See Normalized DNS logs.<br>`_Im_Dns_MicrosoftNXlogVxx` |
60
-
| **Sysmon for Windows** (event 22) | Collected using:<br>- the Log Analytics Agent<br>- the Azure Monitor Agent<br><br>For both agents, both collecting to the<br> `Event` and `WindowsEvent` tables are supported. | `_Im_Dns_MicrosoftSysmonVxx` |
59
+
| **Microsoft DNS Server** | Collected using:<br>- DNS connector for the Azure Monitor Agent<br>- NXlog<br>- DNS connector for the Log Analytics Agent (legacy) | <br>`_Im_Dns_MicrosoftOMSVxx`<br>See Normalized DNS logs.<br>`_Im_Dns_MicrosoftNXlogVxx` |
60
+
| **Sysmon for Windows** (event 22) | Collected using:<br>- Azure Monitor Agent<br>- The Log Analytics Agent (legacy)<br><br>For both agents, both collecting to the<br> `Event` and `WindowsEvent` tables are supported. | `_Im_Dns_MicrosoftSysmonVxx` |
61
61
| **Vectra AI** | |`_Im_Dns_VectraIAVxx` |
62
62
| **Zscaler ZIA** | | `_Im_Dns_ZscalerZIAVxx` |
63
63
||||
@@ -71,12 +71,12 @@ To use ASIM File Activity parsers, deploy the parsers from the [Microsoft Sentin
71
71
72
72
- **Windows file activity**
73
73
- Reported by **Windows (event 4663)**:
74
-
- Collected using the Log Analytics Agent based Security Events connector to the SecurityEvent table.
75
74
- Collected using the Azure Monitor Agent based Security Events connector to the SecurityEvent table.
76
75
- Collected using the Azure Monitor Agent based WEF (Windows Event Forwarding) connector to the WindowsEvent table.
76
+
- Collected using the Log Analytics Agent based Security Events connector to the SecurityEvent table (legacy).
77
77
- Reported using **Sysmon file activity events** (Events 11, 23, and 26):
78
-
- Collected using the Log Analytics Agent to the Event table.
79
78
- Collected using the Azure Monitor Agent based WEF (Windows Event Forwarding) connector to the WindowsEvent table.
79
+
- Collected using the Log Analytics Agent to the Event table (legacy).
80
80
- Reported by **Microsoft Defender XDR for Endpoint**, collected using the Microsoft Defender XDR connector.
81
81
- **Microsoft Office 365 SharePoint and OneDrive events**, collected using the Office Activity connector.
82
82
- **Azure Storage**, including Blob, File, Queue, and Table Storage.
@@ -104,9 +104,9 @@ ASIM Network Session parsers are available in every workspace. Microsoft Sentine
| **Windows Firewall logs** | Collected as Windows events using the Log Analytics Agent (Event table) or Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
109
+
| **Windows Firewall logs** | Collected as Windows events using Azure Monitor Agent (WindowsEvent table) or the Log Analytics Agent (Event table) (legacy). Supports Windows events 5150 to 5159. | `_Im_NetworkSession_MicrosoftWindowsEventFirewallVxx`|
110
110
| **Watchguard FirewareOW** | Collected using Syslog. | `_Im_NetworkSession_WatchGuardFirewareOSVxx` |
@@ -116,18 +116,18 @@ Deploy the workspace deployed parsers version from the [Microsoft Sentinel GitHu
116
116
117
117
To use ASIM Process Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimProcessEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
118
118
119
-
- **Security Events process creation (Event 4688)**, collected using the Log Analytics Agent or Azure Monitor Agent
120
-
- **Security Events process termination (Event 4689)**, collected using the Log Analytics Agent or Azure Monitor Agent
121
-
- **Sysmon process creation (Event 1)**, collected using the Log Analytics Agent or Azure Monitor Agent
122
-
- **Sysmon process termination (Event 5)**, collected using the Log Analytics Agent or Azure Monitor Agent
119
+
- **Security Events process creation (Event 4688)**, collected using Azure Monitor Agent or the Log Analytics Agent (legacy)
120
+
- **Security Events process termination (Event 4689)**, collected using Azure Monitor Agent or the Log Analytics Agent (legacy)
121
+
- **Sysmon process creation (Event 1)**, collected using Azure Monitor Agent or the Log Analytics Agent (legacy)
122
+
- **Sysmon process termination (Event 5)**, collected using Azure Monitor Agent or the Log Analytics Agent (legacy)
123
123
- **Microsoft Defender XDR for Endpoint process creation**
124
124
125
125
## Registry Event parsers
126
126
127
127
To use ASIM Registry Event parsers, deploy the parsers from the [Microsoft Sentinel GitHub repository](https://aka.ms/AsimRegistryEvent). Microsoft Sentinel provides the following parsers in the packages deployed from GitHub:
128
128
129
-
- **Security Events registry update (Events 4657 and 4663)**, collected using the Log Analytics Agent or Azure Monitor Agent
130
-
- **Sysmon registry monitoring events (Events 12, 13, and 14)**, collected using the Log Analytics Agent or Azure Monitor Agent
129
+
- **Security Events registry update (Events 4657 and 4663)**, collected using Azure Monitor Agent or the Log Analytics Agent (legacy)
130
+
- **Sysmon registry monitoring events (Events 12, 13, and 14)**, collected using Azure Monitor Agent or the Log Analytics Agent (legacy)
131
131
- **Microsoft Defender XDR for Endpoint registry events**
132
132
133
133
## Web Session parsers
@@ -138,7 +138,7 @@ ASIM Web Session parsers are available in every workspace. Microsoft Sentinel pr
0 commit comments