Connect Data to Azure Sentinel Using Data Connectors
Ingest Log Data with Data Connectors
The information about the connector, the connector's status, and the last time a log was received if connected is provided by the left blade. Whereas the right tab has two tabs- Instructions and Next Steps. The instructions tab can be different based on the connector having Prerequisites and Configuration which can be followed to connect to the data source. The Next Steps tab offers a quick reference to workbooks, query samples, and analytical templates. Data connectors can only be disconnected/deactivated, not deleted.
Note- The connector does not install Workbooks and Analytical Templates as they are already available in the Sentinel environment for out of the box connectors.
Understand Data Connectors Providers
Microsoft 365 Defender
The alerts and data that has already been normalized as well as used in the Microsoft 365 Defender portal, are provided by the Microsoft 365 Defender and related data connectors which includes products like:
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Office 365
- Microsoft Cloud App Security
Microsoft/Azure Services
- Azure Active Directory- audit logs and sign-in logs
- Azure Activity
- Azure AD Identity Protection
- Azure DDOS Protection
- Azure Defender to IoT
- Azure Information Protection
- Azure Firewall
- Azure Security Center- alerts from Azure Defender solutions
- Azure Web Application Firewall (WAF)
- Cloud App Security
- Domain name server
- Office 365
- Windows firewall
- Security events
Vendor Connectors
Custom Connectors Using the Log Analytics API
You can use the Log Analytics Data Collector API to send log data to the Azure Sentinel Log Analytics workspace.
Logstash plugin
You are able to send any log you want through Logstash directly to your Log Analytics workspace in Azure Sentinel with the help of Azure Sentinel's output plugin for the Logstash data collection engine. The logs are written to a custom table that can be defined using the output plugin.
CEF & Syslog Connector
The generic Common Event Format (CEF) or Syslog connector can be used if there is no vendor-provided connector which is known as an open event logging protocol that is common to Linux. Messages will be send by the Applications that may be stored on the local machine or delivered to a Syslog connector. Whereas CEF is an industry-standard format on top of Syslog messages, extensively used by many security vendors to allow event interoperability among different platforms.
Syslog vs. Common Event Format
CEF is always considered as a superior choice because the log data is parsed into predefined fields in the CommonSecurityLog table while Syslog always provides header fields, but its raw log message is stored in a field named Syslog Message in the Syslog table. You have to write a parser to extract the specific fields for the Syslog data to be queried.
Connector architecture options
View Connected Hosts
The Data Connector page clearly shows the connectors that are connected and the amount of Windows as well as Linux hosts connected with the Log Analytics agent is available in the Log Analytics worksapce. To see your connected hosts you can do the following steps:
- Select Settings
- Workspace Setting (this will transfer you to Log Analytics)
- In Log Analytics Settings area select Agents Management
- There are two tabs to view- one for Windows other for Linux
Comments
Post a Comment