Skip to content

Commit e9adba9

Browse files
authored
Merge pull request #172353 from oshezaf/normalization/rename-dns-ti-rules
Updated network and DNS content/parser lists
2 parents f4ab4e1 + 2a71a34 commit e9adba9

File tree

2 files changed

+15
-3
lines changed

2 files changed

+15
-3
lines changed

articles/sentinel/network-normalization-schema.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,19 @@ To use a source-agnostic parser that unifies all built-in parsers, and ensure th
102102

103103
Deploy the [source-agnostic and source-specific parsers](normalization-about-parsers.md) from the [Azure Sentinel GitHub repository](https://aka.ms/AzSentinelNetworkSession).
104104

105-
## Add your own normalized parsers
105+
### Built-in source-specific parsers
106+
107+
Azure Sentinel provides the following built-in, product-specific Network Session parsers:
108+
109+
- Source specific parsers:
110+
- **Microsoft 365 Defender for Endpoints** - vimNetworkSessionMicrosoft365Defender
111+
- **Microsoft Defender for IoT - Endpoint (MD4IoT)** - vimNetworkSessionMD4IoT
112+
- **Microsoft Sysmon for Linux** - vimNetworkSessionSysmonLinux
113+
- **Windows Events Firewall** - Windows firewall activity as collected using Windows Events 515x, collected using either the Log Analytics Agent or the Azure Monitor Agent into either the Event or the WindowsEvent table, vimNetworkSessionMicrosoftWindowsEventFirewall
114+
115+
The parsers can be deployed from the [Azure Sentinel GitHub repository](https://aka.ms/AzSentinelNetworkSession).
116+
117+
### Add your own normalized parsers
106118

107119
When implementing custom parsers for the Network Session information model, name your KQL functions using the following syntax: `imNetworkSession<vendor><Product>`. This function should map all fields relevant for the source.
108120

articles/sentinel/normalization-content.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,8 @@ The following built-in DNS query content is supported for ASIM normalization.
5353

5454
### Analytics rules
5555

56-
- (Preview) TI map Domain entity to Dns Event (Normalized DNS)
57-
- (Preview) TI map IP entity to DnsEvents (Normalized DNS)
56+
- (Preview) TI map Domain entity to DNS Events (Normalized DNS)
57+
- (Preview) TI map IP entity to DNS Events (Normalized DNS)
5858
- [Potential DGA detected (ASimDNS)](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/ASimDNS/imDns_HighNXDomainCount_detection.yaml)
5959
- [Excessive NXDOMAIN DNS Queries (Normalized DNS)](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/ASimDNS/imDns_ExcessiveNXDOMAINDNSQueries.yaml)
6060
- [DNS events related to mining pools (Normalized DNS)](https://github.com/Azure/Azure-Sentinel/blob/master/Detections/ASimDNS/imDNS_Miners.yaml)

0 commit comments

Comments
 (0)