Skip to content

Commit e51b4e9

Browse files
Update data-connections-overview.md
1 parent 33a7497 commit e51b4e9

File tree

1 file changed

+56
-42
lines changed

1 file changed

+56
-42
lines changed

articles/external-attack-surface-management/data-connections-overview.md

Lines changed: 56 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,14 @@ ms.topic: how-to
1313

1414
Microsoft Defender External Attack Surface Management (Defender EASM) now offers data connections to help users seamlessly integrate their attack surface data into other Microsoft solutions to supplement existing workflows with new insights. Users must get data from Defender EASM into the other security tools they use for remediation purposes to best operationalize their attack surface data.
1515

16-
17-
1816
The data connector sends Defender EASM asset data to two different platforms: Microsoft Log Analytics and Azure Data Explorer. Users need to be active customers to export Defender EASM data to either tool, and data connections are subject to the pricing model for each respective platform.
1917

2018
[Microsoft Log Analytics](https://learn.microsoft.com/azure/azure-monitor/logs/log-analytics-workspace-overview) provides SIEM (security information and event management) and SOAR (security orchestration, automation and response) capabilities. Defender EASM asset or insights information can be used in Log Analytics to enrich existing workflows in conjunction with other security data. This information can supplement firewall and configuration information, threat intelligence, compliance data and more to provide visibility into your external-facing infrastructure on the open internet. Users can create or enrich security incidents, build investigation playbooks, train machine learning algorithms, or trigger remediation actions.
2119

2220
[Azure Data Explorer](https://learn.microsoft.com/azure/data-explorer/data-explorer-overview) is a big data analytics platform that helps users analyze high volumes of data from various sources with flexible customization capabilities. Defender EASM asset and insights data can be integrated to leverage visualization, query, ingestion and management capabilities within the platform. Whether building custom reports with Power BI or hunting for assets that match precise KQL queries, exporting Defender EASM data to Azure Data Explorer enables users to leverage their attack surface data with endless customization potential.
2321

24-
![View of Data Connections page from Defender EASM resource.](media/dataconnector-1.png)
22+
![Screenshot of Data Connections page from Defender EASM resource.](media/dataconnector-1.png)
23+
2524

2625

2726
## Data content options
@@ -41,65 +40,76 @@ The Asset Data option will send data about all your inventory assets to the tool
4140
Attack Surface Insights provide an actionable set of results based on the key insights delivered through dashboards in Defender EASM. This option provides less granular metadata on each asset; instead, it categorizes assets based on the corresponding insight(s) and provides the high-level context required to investigate further. This option is ideal for those who want to integrate these pre-determined insights into custom reporting workflows in conjunction with data from other tools.
4241

4342

43+
44+
4445
## Configuring data connections
4546

4647
### Accessing data connections
4748

4849
Users can access Data Connections from the **Manage** section of the left-hand navigation pane within their Defender EASM resource blade. This page displays the data connectors for both Log Analytics and Azure Data Explorer, listing any current connections and providing the option to add, edit or remove connections.
4950

50-
![View of Data Connections page from Defender EASM resource with "Data Connections" in left-hand navigation highlighted.](media/dataconnector-2.png)
51+
![Screenshot of Data Connections page from Defender EASM resource with "Data Connections" in left-hand navigation highlighted.](media/dataconnector-2.png)
52+
53+
5154

5255

5356
### Connection prerequisites
5457

5558
To successfully create a data connection, users must first ensure that they have completed the required steps to grant Defender EASM permission to the tool of their choice. This process enables the application to ingest our exported data and provides the authentication credentials needed to configure the connection.
5659

60+
61+
62+
5763
#### Configuring Log Analytics permissions
5864

59-
1. Open the Log Analytics workspace that will ingest your Defender EASM data, or [create a new workspace](https://learn.microsoft.com/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal).
65+
1. Open the Log Analytics workspace that will ingest your Defender EASM data, or [create a new workspace](https://learn.microsoft.com/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal).
66+
67+
2. Select **Access control (IAM)** from the left-hand navigation pane. For more information on access control, see [identity documentation](https://learn.microsoft.com/azure/cloud-adoption-framework/decision-guides/identity/).
68+
69+
![Sceenshot of Log Analytics workspace with Access Control (IAM) highlighted in left-hand navigation pane.](media/dataconnector-3.png)
6070

61-
2. Select **Access control (IAM)** from the left-hand navigation pane. For more information on access control, see [identity documentation](https://learn.microsoft.com/azure/cloud-adoption-framework/decision-guides/identity/).
71+
3. On this page, select **+Add** to create a new role assignment.
6272

63-
![Log Analytics workspace with Access Control (IAM) highlighted in left-hand navigation pane.](media/dataconnector-3.png)
73+
4. From the **Role** tab, select **Contributor**. Click **Next**.
6474

65-
3. On this page, select **+Add** to create a new role assignment.
75+
5. Open the **Members** tab. Click **+Select members** to open a configuration pane. Search for **EASM-API** and click on the value in the members list. Once done, click **Select**, then **Review + assign**.
6676

67-
4. From the **Role** tab, select **Contributor**. Click **Next**.
77+
6. Once the role assignment has been created, select **Agents** from the **Settings** section of the left-hand navigation menu.
6878

69-
5. Open the **Members** tab. Click **+Select members** to open a configuration pane. Search for **EASM-API** and click on the value in the members list. Once done, click **Select**, then **Review + assign**.
79+
![Screenshot of Log Analytics workspace with Agents section highlighted in left-hand navigation pane.](media/dataconnector-4.png)
7080

71-
6. Once the role assignment has been created, select **Agents** from the **Settings** section of the left-hand navigation menu.
81+
7. Expand the **Log Analytics agent instructions** section to view your Workspace ID and Primary key. These values will be used to set up your data connection. Save the values in the following format: WorksapceId=XXX;ApiKey=YYY
7282

73-
![Log Analytics workspace with Agents section highlighted in left-hand navigation pane.](media/dataconnector-4.png)
7483

75-
7. Expand the **Log Analytics agent instructions** section to view your Workspace ID and Primary key. These values will be used to set up your data connection. Save the values in the following format: WorksapceId=XXX;ApiKey=YYY
7684

7785

7886
#### Configuring Data Explorer permissions
7987

80-
1. Open the Data Explorer cluster that will ingest your Defender EASM data or [create a new cluster](https://learn.microsoft.com/azure/data-explorer/create-cluster-database-portal).
88+
1. Open the Data Explorer cluster that will ingest your Defender EASM data or [create a new cluster](https://learn.microsoft.com/azure/data-explorer/create-cluster-database-portal).
8189

82-
2. Select **Databases** in the Data section of the left-hand navigation menu.
90+
2. Select **Databases** in the Data section of the left-hand navigation menu.
8391

84-
3. Select **+Add Database** to create a database to house your Defender EASM data.
92+
3. Select **+Add Database** to create a database to house your Defender EASM data.
8593

86-
![Data Explorer cluster with Databases and Add Database sections highlighted.](media/dataconnector-5.png)
94+
![Screenshot of Data Explorer cluster with Databases and Add Database sections highlighted.](media/dataconnector-5.png)
8795

88-
4. Name your database, configure retention and cache periods, then select **Create**.
96+
4. Name your database, configure retention and cache periods, then select **Create**.
8997

90-
![Adding a new database configuration screen to a Data Explorer cluster.](media/dataconnector-6.png)
98+
![Sceenshot of adding a new database configuration screen to a Data Explorer cluster.](media/dataconnector-6.png)
9199

92-
5. Once your Defender EASM database has been created, click on the database name to open the details page. Select **Permissions** from the Overview section of the left-hand navigation menu.
100+
5. Once your Defender EASM database has been created, click on the database name to open the details page. Select **Permissions** from the Overview section of the left-hand navigation menu.
93101

94-
![Permissions section highlighted from left-hand navigation pane in Data Analytics instance.](media/dataconnector-7.png)
102+
![Screenshot of permissions section highlighted from left-hand navigation pane in Data Analytics instance.](media/dataconnector-7.png)
95103

96-
To successfully export Defender EASM data to Data Explorer, users must create two new permissions for the EASM API: **user** and **ingestor**.
104+
To successfully export Defender EASM data to Data Explorer, users must create two new permissions for the EASM API: **user** and **ingestor**.
97105

98-
6. First, select **+Add** and create a user. Search for **EASM API**, select the value then click **Select**.
106+
6. First, select **+Add** and create a user. Search for **EASM API**, select the value then click **Select**.
107+
108+
7. Select **+Add** to create an ingestor. Follow the same steps outlined above to add the EASM API as an ingestor.
109+
110+
8. Your database is now ready to connect to Defender EASM. You will need the cluster name, database name and region in the following format when configuring your Data Connection: ClusterName=XXX;Region=YYY;DatabaseName=ZZZ”
99111

100-
7. Select **+Add** to create an ingestor. Follow the same steps outlined above to add the EASM API as an ingestor.
101112

102-
8. Your database is now ready to connect to Defender EASM. You will need the cluster name, database name and region in the following format when configuring your Data Connection: ClusterName=XXX;Region=YYY;DatabaseName=ZZZ”
103113

104114

105115
### Add a connection
@@ -108,14 +118,16 @@ Users can connect their Defender EASM data to either Log Analytics or Azure Data
108118

109119
A configuration pane will open on the right-hand side of the Data Connections screen. The following four fields are required:
110120

111-
- **Name**: enter a name for this data connection.
112-
- **Connection String**: enter the details required to connect your Defender EASM resource to another tool. For Log Analytics, users enter the workspaceID and coinciding API key associated to their account. For Azure Data Explorer, users enter the cluster name, region and database name associated to their account. Both values must be entered in the format shown when the field is blank.
113-
- **Content**: users can select to integrate asset data, attack surface insights or both datasets.
114-
- **Frequency**: select the frequency that the Defender EASM connection sends updated data to the tool of your choice. Available options are daily, weekly and monthly.
121+
- **Name**: enter a name for this data connection.
122+
- **Connection String**: enter the details required to connect your Defender EASM resource to another tool. For Log Analytics, users enter the workspaceID and coinciding API key associated to their account. For Azure Data Explorer, users enter the cluster name, region and database name associated to their account. Both values must be entered in the format shown when the field is blank.
123+
- **Content**: users can select to integrate asset data, attack surface insights or both datasets.
124+
- **Frequency**: select the frequency that the Defender EASM connection sends updated data to the tool of your choice. Available options are daily, weekly and monthly.
125+
126+
![Screenshot of "add a data connection" pop-up box.](media/dataconnector-8.png)
127+
128+
Once all four fields are configured, select **Add** to create the data connection. At this point, the Data Connections page will display a banner that indicates the resource has been successfully created and data will begin populating within 30 minutes. Once connections are created, they will be listed under the applicable tool on the main Data Connections page.
115129

116-
![Add a data connection pop-up box.](media/dataconnector-8.png)
117130

118-
Once all four fields are configured, select **Add** to create the data connection. At this point, the Data Connections page will display a banner that indicates the resource has been successfully created and data will begin populating within 30 minutes. Once connections are created, they will be listed under the applicable tool on the main Data Connections page.
119131

120132

121133
### Edit or delete a connection
@@ -124,23 +136,25 @@ Users can edit or delete a data connection. For example, you may notice that a c
124136

125137
To edit or delete a data connection:
126138

127-
1. Select the appropriate connection from the list on the main Data Connections page.
139+
1. Select the appropriate connection from the list on the main Data Connections page.
140+
141+
![Screenshot of data connections page with "disconnected" section highlighted.](media/dataconnector-9.png)
142+
143+
2. This action will open a page that provides additional data about the connection. This page displays the configurations you elected when creating the connection, as well as any error messages. Users will also see the following additional data:
144+
- **Recurring**: the day of the week or month that Defender EASM sends updated data to the connected tool.
145+
- **Created**: the date and time that the data connection was created.
146+
- **Updated**: the date and time that the data connection was last updated.
128147

129-
![Data connections page with "disconnected" section highlighted.](media/dataconnector-9.png)
148+
![Screenshot of the details page for a data connection with an example error message.](media/dataconnector-10.png)
130149

131-
2. This action will open a page that provides additional data about the connection. This page displays the configurations you elected when creating the connection, as well as any error messages. Users will also see the following additional data:
132-
- **Recurring**: the day of the week or month that Defender EASM sends updated data to the connected tool.
133-
- **Created**: the date and time that the data connection was created.
134-
- **Updated**: the date and time that the data connection was last updated.
135150

136-
![View of the details page for a data connection with an example error message.](media/dataconnector-10.png)
151+
3. From this page, users can elect to reconnect, edit or delete their data connection.
137152

153+
- **Reconnect**: this option attempts to validate the data connection without any changes to the configuration. This option is best for those who have validated the authentication credentials used for the data connection.
154+
- **Edit**: this option allows users to change the configuration for the data connection.
155+
- **Delete**: this option deletes the data connection.
138156

139-
3. From this page, users can elect to reconnect, edit or delete their data connection.
140157

141-
- **Reconnect**: this option attempts to validate the data connection without any changes to the configuration. This option is best for those who have validated the authentication credentials used for the data connection.
142-
- **Edit**: this option allows users to change the configuration for the data connection.
143-
- **Delete**: this option deletes the data connection.
144158

145159

146160
## Next steps

0 commit comments

Comments
 (0)