Skip to content

Commit e8631ee

Browse files
committed
Added 5 new Sumo Logic Help doc for Azure Security Products
1 parent 268fc4f commit e8631ee

10 files changed

+276
-0
lines changed
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
id: microsoft-defender-for-endpoint
3+
title: Microsoft Defender for Endpoint
4+
sidebar_label: Microsoft Defender for Endpoint
5+
description: The Sumo Logic App for Microsoft Defender for Endpoint outlines the steps required to collect and analyze the alert data from the Azure security platform to the Sumo Logic platform.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-identity.png')} alt="Thumbnail icon" width="60"/>
11+
12+
Microsoft Defender for Endpoint is an enterprise-grade endpoint security platform designed to help you prevent, detect, investigate, and respond to advanced cyber threats on devices (endpoints) like laptops, desktops, mobile phones, and servers.
13+
14+
This document outlines the steps required to collect and analyse the [Microsoft Defender for Endpoint](https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-endpoint) alerts in the Sumo Logic platform.
15+
16+
## Set up collection
17+
18+
:::note
19+
Skip this step if you have already configured the Microsoft Graph Security API Source.
20+
:::
21+
22+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Defender for Endpoint to the Sumo Logic platform.
23+
24+
## Search alerts
25+
26+
Use the following query to retrieve alerts generated by the Microsoft Defender for Endpoint.
27+
28+
```sql
29+
_sourcecategory=Labs/MicrosoftGraphSecurity
30+
| json field=_raw "serviceSource" as service_source
31+
| where service_source = "microsoftDefenderForEndpoint"
32+
```
33+
34+
## Analyse alerts
35+
36+
Use the following query to extract detailed insights from the alert data:
37+
38+
```sql
39+
_sourceCategory=Labs/MicrosoftGraphSecurity
40+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
41+
| where service_source = "microsoftDefenderForEndpoint"
42+
| where severity matches "*" and status matches "*" and classification matches "*"
43+
| if(isNull(category),"-",category) as category
44+
| if(isNull(classification),"-",classification) as classification
45+
| if(isNull(determination),"-",determination) as determination
46+
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
47+
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
48+
| tourl (alert_url,alert_id) as alert_id
49+
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
50+
| fields -_messageTime
51+
| sort by time
52+
```
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
id: microsoft-defender-for-identity
3+
title: Microsoft Defender for Identity
4+
sidebar_label: Microsoft Defender for Identity
5+
description: The Sumo Logic App for Microsoft Defender for Identity outlines the steps required to collect and analyze the alert data from the Azure security platform to the Sumo Logic platform.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-identity.png')} alt="Thumbnail icon" width="60"/>
11+
12+
Microsoft Defender for Identity is a cloud-based security solution that help you secure your identity monitoring across your organization. It helps deliver a modern identity threat detection (ITDR) solution across hybrid environments, including:
13+
- Prevent breaches, using proactive identity security posture assessments.
14+
- Detect threats, using real-time analytics and data intelligence.
15+
- Investigate suspicious activities, using clear, actionable incident information.
16+
- Respond to attacks, using automatic response to compromised identities.
17+
18+
This document outlines the steps required to collect and analyse the [Microsoft Defender for Identity](https://learn.microsoft.com/en-us/defender-for-identity/what-is) alerts in the Sumo Logic platform.
19+
20+
## Set up collection
21+
22+
:::note
23+
Skip this step if you have already configured the Microsoft Graph Security API Source.
24+
:::
25+
26+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Defender for Identity to the Sumo Logic platform.
27+
28+
## Search alerts
29+
30+
Use the following query to retrieve alerts generated by the Microsoft Defender for Identity.
31+
32+
```sql
33+
_sourcecategory=Labs/MicrosoftGraphSecurity
34+
| json field=_raw "serviceSource" as service_source
35+
| where service_source = "microsoftDefenderForIdentity"
36+
```
37+
38+
## Analyse alerts
39+
40+
Use the following query to extract detailed insights from the alert data:
41+
42+
```sql
43+
_sourceCategory=Labs/MicrosoftGraphSecurity
44+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
45+
| where service_source = "microsoftDefenderForIdentity"
46+
| where severity matches "*" and status matches "*" and classification matches "*"
47+
| if(isNull(category),"-",category) as category
48+
| if(isNull(classification),"-",classification) as classification
49+
| if(isNull(determination),"-",determination) as determination
50+
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
51+
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
52+
| tourl (alert_url,alert_id) as alert_id
53+
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
54+
| fields -_messageTime
55+
| sort by time
56+
```
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
id: microsoft-defender-for-office-365
3+
title: Microsoft Defender for Office 365
4+
sidebar_label: Microsoft Defender for Office 365
5+
description: The Sumo Logic App for Microsoft Defender for Office 365 outlines the steps required to collect and analyze the alert data from the Azure security platform to the Sumo Logic platform.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-office-365.png')} alt="Thumbnail icon" width="40"/>
11+
12+
Microsoft Defender for Office 365 is a cloud-based email security service designed to protect your organization using Microsoft 365 (formerly Office 365) against threats such as:
13+
- Phishing
14+
- Malware
15+
- Ransomware
16+
- Business Email Compromise (BEC)
17+
- Zero-day threats
18+
19+
This document outlines the steps required to collect and analyse the [Microsoft Defender for Office 365](https://learn.microsoft.com/en-us/defender-office-365/mdo-about) alerts in the Sumo Logic platform.
20+
21+
## Set up collection
22+
23+
:::note
24+
Skip this step if you have already configured the Microsoft Graph Security API Source.
25+
:::
26+
27+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Defender for Office 365 to the Sumo Logic platform.
28+
29+
## Search alerts
30+
31+
Use the following query to retrieve alerts generated by the Microsoft Defender for Office 365.
32+
33+
```sql
34+
_sourcecategory=Labs/MicrosoftGraphSecurity
35+
| json field=_raw "serviceSource" as service_source
36+
| where service_source = "microsoftDefenderForOffice365"
37+
```
38+
39+
## Analyse alerts
40+
41+
Use the following query to extract detailed insights from the alert data:
42+
43+
```sql
44+
_sourceCategory=Labs/MicrosoftGraphSecurity
45+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
46+
| where service_source = "microsoftDefenderForOffice365"
47+
| where severity matches "*" and status matches "*" and classification matches "*"
48+
| if(isNull(category),"-",category) as category
49+
| if(isNull(classification),"-",classification) as classification
50+
| if(isNull(determination),"-",determination) as determination
51+
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
52+
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
53+
| tourl (alert_url,alert_id) as alert_id
54+
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
55+
| fields -_messageTime
56+
| sort by time
57+
```
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
id: microsoft-entra-id-protection
3+
title: Microsoft Entra ID Protection
4+
sidebar_label: Microsoft Entra ID Protection
5+
description: The Sumo Logic App for Microsoft Entra ID Protection outlines the steps required to collect and analyze the alert data from the Azure security platform to the Sumo Logic platform.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-entra-id-protection.png')} alt="Thumbnail icon" width="50"/>
11+
12+
Microsoft Entra ID Protection is a cloud-based identity security solution that helps you detect, investigate, and remediate identity-based risks in real time. It is a key component of the Microsoft Entra suite, which focuses on securing access to applications and data across cloud and on-premises environments.
13+
14+
This document outlines the steps required to collect and analyse the [Microsoft Entra ID Protection](https://learn.microsoft.com/en-us/entra/id-protection/overview-identity-protection) alerts in the Sumo Logic platform.
15+
16+
## Set up collection
17+
18+
:::note
19+
Skip this step if you have already configured the Microsoft Graph Security API Source.
20+
:::
21+
22+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Entra ID Protection to the Sumo Logic platform.
23+
24+
## Search alerts
25+
26+
Use the following query to retrieve alerts generated by the Microsoft Entra ID Protection.
27+
28+
```sql
29+
_sourcecategory=Labs/MicrosoftGraphSecurity
30+
| json field=_raw "serviceSource" as service_source
31+
| where service_source = "azureAdIdentityProtection"
32+
```
33+
34+
## Analyse alerts
35+
36+
Use the following query to extract detailed insights from the alert data:
37+
38+
```sql
39+
_sourceCategory=Labs/MicrosoftGraphSecurity
40+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
41+
| where service_source = "azureAdIdentityProtection"
42+
| where severity matches "*" and status matches "*" and classification matches "*"
43+
| if(isNull(category),"-",category) as category
44+
| if(isNull(classification),"-",classification) as classification
45+
| if(isNull(determination),"-",determination) as determination
46+
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
47+
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
48+
| tourl (alert_url,alert_id) as alert_id
49+
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
50+
| fields -_messageTime
51+
| sort by time
52+
```
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
id: microsoft-purview-data-loss-prevention
3+
title: Microsoft Purview Data Loss Prevention
4+
sidebar_label: Microsoft Purview Data Loss Prevention
5+
description: The Sumo Logic App for Microsoft Purview Data Loss Prevention outlines the steps required to collect and analyze the alert data from the Azure security platform to the Sumo Logic platform.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-purview-data-loss-prevention.png')} alt="Thumbnail icon" width="100"/>
11+
12+
Microsoft Purview Data Loss Prevention (DLP) is a tool that helps you prevent the accidental or intentional sharing of sensitive information, such as credit card numbers, social security numbers, or confidential business data, across Microsoft 365 environments.
13+
14+
It’s part of the Microsoft Purview suite, which focuses on data governance, compliance, and risk management.
15+
16+
This document outlines the steps required to collect and analyse the [Microsoft Purview Data Loss Prevention](https://www.microsoft.com/en-us/security/business/information-protection/microsoft-purview-data-loss-prevention) alerts in the Sumo Logic platform.
17+
18+
## Set up collection
19+
20+
:::note
21+
Skip this step if you have already configured the Microsoft Graph Security API Source.
22+
:::
23+
24+
Use the [Cloud-to-Cloud Integration for Microsoft Graph Security API](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/) to ingest security alerts data from the Microsoft Purview Data Loss Prevention to the Sumo Logic platform.
25+
26+
## Search alerts
27+
28+
Use the following query to retrieve alerts generated by the Microsoft Purview Data Loss Prevention.
29+
30+
```sql
31+
_sourcecategory=Labs/MicrosoftGraphSecurity
32+
| json field=_raw "serviceSource" as service_source
33+
| where service_source = "dataLossPrevention"
34+
```
35+
36+
## Analyse alerts
37+
38+
Use the following query to extract detailed insights from the alert data:
39+
40+
```sql
41+
_sourceCategory=Labs/MicrosoftGraphSecurity
42+
|json"id","status","severity","category","title","description","classification","determination","serviceSource","detectionSource","alertWebUrl" ,"comments[*]","evidence[*]"as alert_id,status,severity,category,title,description,classification,determination,service_source,detection_source,alert_url,comments,evidence_info nodrop
43+
| where service_source = "dataLossPrevention"
44+
| where severity matches "*" and status matches "*" and classification matches "*"
45+
| if(isNull(category),"-",category) as category
46+
| if(isNull(classification),"-",classification) as classification
47+
| if(isNull(determination),"-",determination) as determination
48+
| count by _messageTime,status,severity,category,title,description,classification,determination,alert_url,alert_id
49+
| formatDate(toLong(_messageTime), "dd-MM-yyyy HH:mm:ss") as time
50+
| tourl (alert_url,alert_id) as alert_id
51+
| fields time,alert_id,title,description,alert_url,status,severity,category,classification,determination
52+
| fields -_messageTime
53+
| sort by time
54+
```

sidebars.ts

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2226,7 +2226,12 @@ integrations: [
22262226
'integrations/microsoft-azure/azure-security-advisor',
22272227
'integrations/microsoft-azure/azure-security-defender-for-cloud',
22282228
'integrations/microsoft-azure/microsoft-defender-for-cloud-apps',
2229+
'integrations/microsoft-azure/microsoft-defender-for-endpoint',
2230+
'integrations/microsoft-azure/microsoft-defender-for-identity',
2231+
'integrations/microsoft-azure/microsoft-defender-for-office-365',
22292232
'integrations/microsoft-azure/microsoft-dynamics365-customer-insights',
2233+
'integrations/microsoft-azure/microsoft-entra-id-protection',
2234+
'integrations/microsoft-azure/microsoft-purview-data-loss-prevention',
22302235
'integrations/microsoft-azure/network-watcher',
22312236
'integrations/microsoft-azure/sql',
22322237
'integrations/microsoft-azure/web-apps',
50.8 KB
Loading
34.9 KB
Loading
27.9 KB
Loading
24.5 KB
Loading

0 commit comments

Comments
 (0)