Skip to content

Commit f15c18c

Browse files
Merge pull request #99835 from rkarlin/sentinel-updates-connectors
updated CEF for new breakdown, offboarding update, links to workbooks
2 parents 8a54f92 + 6378ba8 commit f15c18c

27 files changed

+305
-624
lines changed

articles/sentinel/TOC.yml

Lines changed: 50 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -32,70 +32,78 @@
3232
- name: Connect data sources
3333
href: connect-data-sources.md
3434
items:
35-
- name: Connect Microsoft services
35+
- name: Connect service-to-service
3636
items:
37-
- name: Connect Azure AD
37+
- name: AWS
38+
href: connect-aws.md
39+
- name: Azure AD
3840
href: connect-azure-active-directory.md
39-
- name: Connect Office 365
41+
- name: Office 365
4042
href: connect-office-365.md
41-
- name: Connect Cloud App Security
43+
- name: Cloud App Security
4244
href: connect-cloud-app-security.md
43-
- name: Connect Azure Activity Log
45+
- name: Azure Activity Log
4446
href: connect-azure-activity.md
45-
- name: Connect Azure AD Identity Protection
47+
- name: Azure AD Identity Protection
4648
href: connect-azure-ad-identity-protection.md
47-
- name: Connect Azure Information Protection
49+
- name: Azure Information Protection
4850
href: connect-azure-information-protection.md
49-
- name: Connect Microsoft Defender ATP
51+
- name: Microsoft Defender ATP
5052
href: connect-microsoft-defender-advanced-threat-protection.md
51-
- name: Connect Azure ATP
53+
- name: Azure ATP
5254
href: connect-azure-atp.md
53-
- name: Connect Azure Security Center
55+
- name: Azure Security Center
5456
href: connect-azure-security-center.md
55-
- name: Connect domain name server
57+
- name: Domain name server
5658
href: connect-dns.md
57-
- name: Connect Microsoft web application firewall
59+
- name: Microsoft web application firewall
5860
href: connect-microsoft-waf.md
59-
- name: Connect Windows firewall
61+
- name: Windows firewall
6062
href: connect-windows-firewall.md
61-
- name: Connect Windows security events
63+
- name: Windows security events
6264
href: connect-windows-security-events.md
6365
- name: Connect external solutions
6466
items:
65-
- name: Connect generic CEF
66-
href: connect-common-event-format.md
67-
- name: Connect AWS
68-
href: connect-aws.md
69-
- name: Connect Barracuda
67+
- name: Barracuda
7068
href: connect-barracuda.md
71-
- name: Connect Check Point
72-
href: connect-checkpoint.md
73-
- name: Connect Palo Alto Networks
74-
href: connect-paloalto.md
75-
- name: Connect Fortinet
76-
href: connect-fortinet.md
77-
- name: Connect F5
78-
href: connect-f5.md
79-
- name: Connect F5 BIG-IP
69+
- name: F5 BIG-IP
8070
href: connect-f5-big-ip.md
81-
- name: Connect Syslog
71+
- name: Syslog
8272
href: connect-syslog.md
83-
- name: Connect Symantec ICDX
73+
- name: Symantec ICDX
8474
href: connect-symantec.md
85-
- name: Connect Cisco
86-
href: connect-cisco.md
87-
- name: Connect Barracuda CloudGen Firewall
75+
- name: Barracuda CloudGen Firewall
8876
href: connect-barracuda-cloudgen-firewall.md
89-
- name: Connect Citrix Analytics (Security)
77+
- name: Citrix Analytics (Security)
9078
href: connect-citrix-analytics.md
91-
- name: Connect ExtraHop Reveal(x)
92-
href: connect-extrahop.md
93-
- name: One Identity Safeguard
94-
href: connect-one-identity.md
95-
- name: Trend Micro Deep Security
96-
href: connect-trend-micro.md
97-
- name: Connect Zscaler
98-
href: connect-zscaler.md
79+
- name: CEF-based solutions
80+
href: connect-common-event-format.md
81+
items:
82+
- name: STEP 1 Deploy the agent
83+
href: connect-cef-agent.md
84+
- name: STEP 2 Configure your security solution
85+
href: connect-cef-solution-config.md
86+
items:
87+
- name: Check Point
88+
href: connect-checkpoint.md
89+
- name: Cisco
90+
href: connect-cisco.md
91+
- name: ExtraHop Reveal(x)
92+
href: connect-extrahop.md
93+
- name: F5
94+
href: connect-f5.md
95+
- name: Fortinet
96+
href: connect-fortinet.md
97+
- name: One Identity Safeguard
98+
href: connect-one-identity.md
99+
- name: Palo Alto Networks
100+
href: connect-paloalto.md
101+
- name: Trend Micro Deep Security
102+
href: connect-trend-micro.md
103+
- name: Zscaler
104+
href: connect-zscaler.md
105+
- name: STEP 3 Validate connectivity
106+
href: connect-cef-verify.md
99107
- name: Connect threat intelligence
100108
href: connect-threat-intelligence.md
101109
- name: Connect Azure Stack VMs

articles/sentinel/connect-aws.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 09/23/2019
15+
ms.date: 12/30/2019
1616
ms.author: rkarlin
1717

1818
---
@@ -80,4 +80,5 @@ You must have write permission on the Azure Sentinel workspace.
8080
In this document, you learned how to connect AWS CloudTrail to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
8181
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
8282
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
83+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
8384

articles/sentinel/connect-azure-atp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 11/17/2019
16+
ms.date: 12/30/2019
1717
ms.author: rkarlin
1818

1919
---

articles/sentinel/connect-barracuda-cloudgen-firewall.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 11/04/2019
16+
ms.date: 12/30/2019
1717
ms.author: cabailey
1818

1919
---
@@ -43,4 +43,6 @@ The Barracuda CloudGen Firewall (CGFW) connector lets you easily connect your Ba
4343
In this document, you learned how to connect Barracuda CloudGen Firewall to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
4444
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
4545
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
46+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
47+
4648

articles/sentinel/connect-barracuda.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 10/13/2019
17+
ms.date: 12/30/2019
1818
ms.author: rkarlin
1919

2020
---
@@ -46,4 +46,6 @@ It may take upwards of 20 minutes until your logs start to appear in Log Analyti
4646
In this document, you learned how to connect Barracuda appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
4747
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
4848
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats-built-in.md).
49+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
50+
4951

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
---
2+
title: Deploy the agent to connect CEF data to Azure Sentinel Preview| Microsoft Docs
3+
description: Learn how to deploy the agent to connect CEF data to Azure Sentinel.
4+
services: sentinel
5+
documentationcenter: na
6+
author: rkarlin
7+
manager: rkarlin
8+
editor: ''
9+
10+
ms.service: azure-sentinel
11+
ms.subservice: azure-sentinel
12+
ms.devlang: na
13+
ms.topic: conceptual
14+
ms.tgt_pltfrm: na
15+
ms.workload: na
16+
ms.date: 11/26/2019
17+
ms.author: rkarlin
18+
19+
---
20+
# Step 1: Deploy the agent
21+
22+
23+
In this step, you need to select the Linux machine that will act as a proxy between Azure Sentinel and your security solution. You will have to run a script on the proxy machine that:
24+
- Installs the Log Analytics agent and configures it as needed to listen for Syslog messages.
25+
- Configures the Syslog daemon to listen to Syslog messages using TCP port 514 and then forwards only the CEF messages to the Log Analytics agent using TCP port 25226.
26+
- Sets the Syslog agent to collect the data and send it securely to Azure Sentinel, where it is parsed and enriched.
27+
28+
## Deploy the agent
29+
30+
1. In the Azure Sentinel portal, click **Data connectors** and select **Common Event Format (CEF)** and then **Open connector page**.
31+
32+
1. Under **Install and configure the Syslog agent**, select your machine type, either Azure, other cloud, or on-premises.
33+
> [!NOTE]
34+
> Because the script in the next step installs the Log Analytics agent and connects the machine to your Azure Sentinel workspace, make sure this machine is not connected to any other workspace.
35+
1. You must have elevated permissions (sudo) on your machine. Make sure that you have Python on your machine using the following command: `python –version`
36+
37+
1. Run the following script on your proxy machine.
38+
`sudo wget https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py [WorkspaceID] [Workspace Primary Key]`
39+
1. While the script is running, check to make sure you don't get any error or warning messages.
40+
41+
Continue to [STEP 2: Configure your security solution to forward CEF messages](connect-cef-solution-config.md) .
42+
43+
44+
## Next steps
45+
In this document, you learned how to connect CEF appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
46+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
47+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
48+
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: Configure your security solution to connect CEF data to Azure Sentinel Preview| Microsoft Docs
3+
description: Learn how to configure your security solution to connect CEF data to Azure Sentinel.
4+
services: sentinel
5+
documentationcenter: na
6+
author: rkarlin
7+
manager: rkarlin
8+
editor: ''
9+
10+
ms.service: azure-sentinel
11+
ms.subservice: azure-sentinel
12+
ms.devlang: na
13+
ms.topic: conceptual
14+
ms.tgt_pltfrm: na
15+
ms.workload: na
16+
ms.date: 12/30/2019
17+
ms.author: rkarlin
18+
19+
---
20+
# STEP 2: Configure your security solution to send CEF messages
21+
22+
In this step you will perform the necessary configuration changes on your security solution itself to send logs to the CEF agent.
23+
24+
## Configure a solution with a connector
25+
26+
If your security solution already has an existing connector, use the connector-specific instructions as follows:
27+
28+
- [Check Point](connect-checkpoint.md)
29+
- [Cisco](connect-cisco.md)
30+
- [ExtraHop Reveal(x)](connect-extrahop.md)
31+
- [F5 ](connect-f5.md)
32+
- [Fortinet](connect-fortinet.md)
33+
- [One Identity Safeguard](connect-one-identity.md)
34+
- [Palo Alto Networks](connect-paloalto.md)
35+
- [Trend Micro Deep Security](connect-trend-micro.md)
36+
- [Zscaler](connect-zscaler.md)
37+
38+
## Configure any other solution
39+
If a connector does not exist for your specific security solution, use the following generic instructions for forwarding logs to the CEF agent.
40+
41+
1. Go to the specific configuration article for steps on how to configure your solution to send CEF messages. If your solution is not listed, on the appliance you need to set these values so that the appliance sends the necessary logs in the necessary format to the Azure Sentinel Syslog agent, based on the Log Analytics agent. You can modify these parameters in your appliance, as long as you also modify them in the Syslog daemon on the Azure Sentinel agent.
42+
- Protocol = TCP
43+
- Port = 514
44+
- Format = CEF
45+
- IP address - make sure to send the CEF messages to the IP address of the virtual machine you dedicated for this purpose.
46+
47+
> [!NOTE]
48+
> This solution supports Syslog RFC 3164 or RFC 5424.
49+
50+
51+
1. To use the relevant schema in Log Analytics for the CEF events, search for `CommonSecurityLog`.
52+
53+
1. Continue to STEP 3: [validate connectivity](connect-cef-verify.md).
54+
55+
## Next steps
56+
In this document, you learned how to connect CEF appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
57+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
58+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
59+
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: Validate connectivity to Azure Sentinel| Microsoft Docs
3+
description: Validate connectivity of your security solution to make sure CEF messages are being forwarded to Azure Sentinel.
4+
services: sentinel
5+
documentationcenter: na
6+
author: rkarlin
7+
manager: rkarlin
8+
editor: ''
9+
10+
ms.service: azure-sentinel
11+
ms.subservice: azure-sentinel
12+
ms.devlang: na
13+
ms.topic: conceptual
14+
ms.tgt_pltfrm: na
15+
ms.workload: na
16+
ms.date: 12/30/2019
17+
ms.author: rkarlin
18+
19+
---
20+
# STEP 3: Validate connectivity
21+
22+
23+
24+
After you deployed the agent and configured your security solution to forward CEF messages, use this article to understand how to verify connectivity between Azure Sentinel and your security solution.
25+
26+
## How to validate connectivity
27+
28+
1. Open Log Analytics to make sure that logs are received using the CommonSecurityLog schema.<br> It may take upwards of 20 minutes until your logs start to appear in Log Analytics.
29+
30+
1. Before you run the script, we recommend that you send messages from your security solution to make sure they are being forwarded to the Syslog proxy machine you configured.
31+
1. You must have elevated permissions (sudo) on your machine. Make sure that you have Python on your machine using the following command: `python –version`
32+
1. Run the following script to check connectivity between the agent, Azure Sentinel, and your security solution. It checks that the daemon forwarding is properly configured, listens on the correct ports, and that nothing is blocking communication between the daemon and the Log Analytics agent. The script also sends mock messages 'TestCommonEventFormat' to check end-to-end connectivity. <br>
33+
`sudo wget https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py [WorkspaceID]`
34+
35+
36+
## Next steps
37+
In this document, you learned how to connect CEF appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
38+
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
39+
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
40+
- [Use workbooks](tutorial-monitor-your-data.md) to monitor your data.
41+

0 commit comments

Comments
 (0)