Skip to content

Commit 8216156

Browse files
committed
revert changes for DCs w/ broken links
1 parent 3ed5112 commit 8216156

5 files changed

Lines changed: 41 additions & 64 deletions

articles/sentinel/data-connectors/blackberry-cylanceprotect.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Blackberry CylancePROTECT connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Blackberry CylancePROTECT to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 01/06/2024
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -76,7 +76,7 @@ Configure the facilities you want to collect and their severities.
7676

7777
3. Configure and connect the CylancePROTECT
7878

79-
[Follow these instructions](https://docs.blackberry.com/content/dam/docs-blackberry-com/release-pdfs/en/cylance-products/syslog-guides/Cylance%20Syslog%20Guide%20v2.0%20rev12.pdf) to configure the CylancePROTECT to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
79+
Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
8080

8181

8282

articles/sentinel/data-connectors/cisco-stealthwatch.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,21 @@ title: "Cisco Stealthwatch connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Cisco Stealthwatch to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 01/06/2024
6+
ms.date: 02/23/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# Cisco Stealthwatch connector for Microsoft Sentinel
1212

13-
The [Cisco Stealthwatch](https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html) data connector provides the capability to ingest [Cisco Stealthwatch events](https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/securit_events_alarm_categories/SW_7_2_1_Security_Events_and_Alarm_Categories_DV_1_0.pdf) into Microsoft Sentinel. Refer to [Cisco Stealthwatch documentation](https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/system_installation_configuration/SW_7_3_2_System_Configuration_Guide_DV_1_0.pdf) for more information.
13+
The [Cisco Stealthwatch](https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html) data connector provides the capability to ingest [Cisco Stealthwatch events](https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/securit_events_alarm_categories/SW_7_2_1_Security_Events_and_Alarm_Categories_DV_1_0.pdf) into Microsoft Sentinel.
1414

1515
## Connector attributes
1616

1717
| Connector attribute | Description |
1818
| --- | --- |
1919
| **Log Analytics table(s)** | Syslog (StealthwatchEvent)<br/> |
20-
| **Data collection rules support** | [Workspace transform DCR](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal) |
20+
| **Data collection rules support** | [Workspace transform DCR](../../azure-monitor/logs/tutorial-workspace-transformations-portal.md) |
2121
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
2222

2323
## Query samples

articles/sentinel/data-connectors/crowdstrike-falcon-data-replicator-using-azure-functions.md

Lines changed: 15 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Crowdstrike Falcon Data Replicator (using Azure Functions) connector for
33
description: "Learn how to install the connector Crowdstrike Falcon Data Replicator (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 01/06/2024
6+
ms.date: 07/26/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
@@ -19,7 +19,6 @@ The [Crowdstrike](https://www.crowdstrike.com/) Falcon Data Replicator connector
1919
| **Application settings** | AWS_KEY<br/>AWS_SECRET<br/>AWS_REGION_NAME<br/>QUEUE_URL<br/>WorkspaceID<br/>WorkspaceKey<br/>logAnalyticsUri (optional) |
2020
| **Azure function app code** | https://aka.ms/sentinel-CrowdstrikeReplicator-functionapp |
2121
| **Kusto function alias** | CrowdstrikeReplicator |
22-
| **Kusto function url** | https://aka.ms/sentinel-crowdstrikereplicator-parser |
2322
| **Log Analytics table(s)** | CrowdstrikeReplicatorLogs_CL<br/> |
2423
| **Data collection rules support** | Not currently supported |
2524
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -50,11 +49,11 @@ To integrate with Crowdstrike Falcon Data Replicator (using Azure Functions) mak
5049
> This connector uses Azure Functions to connect to the S3 bucket to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
5150
5251

53-
**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
52+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
5453
5554

5655
> [!NOTE]
57-
> This data connector depends on a parser based on a Kusto Function to work as expected. [Follow these steps](https://aka.ms/sentinel-crowdstrikereplicator-parser) to create the Kusto functions alias, **CrowdstrikeReplicator**.
56+
> This data connector depends on a parser based on a Kusto Function to work as expected.
5857
5958

6059
**STEP 1 - Contact CrowdStrike support to obtain the credentials and Queue URL.**
@@ -63,8 +62,7 @@ To integrate with Crowdstrike Falcon Data Replicator (using Azure Functions) mak
6362

6463
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
6564

66-
> [!IMPORTANT]
67-
> Before deploying the Crowdstrike Falcon Data Replicator connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
65+
>**IMPORTANT:** Before deploying the Crowdstrike Falcon Data Replicator connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
6866
6967

7068

@@ -76,8 +74,7 @@ Use this method for automated deployment of the Crowdstrike Falcon Data Replicat
7674

7775
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-CrowdstrikeReplicator-azuredeploy)
7876
2. Select the preferred **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL**.
79-
80-
Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
77+
> **NOTE:** Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
8178
3. Enter the **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL** and deploy.
8279
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
8380
5. Click **Purchase** to deploy.
@@ -89,7 +86,7 @@ Use the following step-by-step instructions to deploy the Crowdstrike Falcon Dat
8986

9087
**1. Deploy a Function App**
9188

92-
You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
89+
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
9390
9491
1. Download the [Azure Function App](https://aka.ms/sentinel-CrowdstrikeReplicator-functionapp) file. Extract archive to your local development computer.
9592
2. Start VS Code. Choose File in the main menu and select Open Folder.
@@ -119,17 +116,15 @@ If you're already signed in, go to the next step.
119116

120117
1. In the Function App, select the Function App Name and select **Configuration**.
121118
2. In the **Application settings** tab, select ** New application setting**.
122-
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
123-
124-
- AWS_KEY
125-
- AWS_SECRET
126-
- AWS_REGION_NAME
127-
- QUEUE_URL
128-
- WorkspaceID
129-
- WorkspaceKey
130-
- logAnalyticsUri (optional)
131-
132-
Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
119+
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
120+
AWS_KEY
121+
AWS_SECRET
122+
AWS_REGION_NAME
123+
QUEUE_URL
124+
WorkspaceID
125+
WorkspaceKey
126+
logAnalyticsUri (optional)
127+
> - Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
133128
4. Once all application settings have been entered, click **Save**.
134129

135130

articles/sentinel/data-connectors/mcafee-epolicy-orchestrator-epo.md

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: "McAfee ePolicy Orchestrator (ePO) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector McAfee ePolicy Orchestrator (ePO) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 01/06/2024
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# McAfee ePolicy Orchestrator (ePO) connector for Microsoft Sentinel
1212

13-
The McAfee ePolicy Orchestrator data connector provides the capability to ingest [McAfee ePO](https://www.mcafee.com/enterprise/en-us/products/epolicy-orchestrator.html) events into Microsoft Sentinel through the syslog. Refer to [documentation](https://docs.mcafee.com/bundle/epolicy-orchestrator-landing/page/GUID-0C40020F-5B7F-4549-B9CC-0E017BC8797F.html) for more information.
13+
The McAfee ePolicy Orchestrator data connector provides the capability to ingest [McAfee ePO](https://www.mcafee.com/enterprise/en-us/products/epolicy-orchestrator.html) events into Microsoft Sentinel through the syslog.
1414

1515
## Connector attributes
1616

@@ -55,13 +55,6 @@ Configure the facilities you want to collect and their severities.
5555
2. Select **Apply below configuration to my machines** and select the facilities and severities.
5656
3. Click **Save**.
5757

58-
59-
3. Configure McAfee ePolicy Orchestrator event forwarding to Syslog server
60-
61-
[Follow these instructions](https://docs.mcafee.com/bundle/epolicy-orchestrator-5.10.0-product-guide/page/GUID-5C5332B3-837A-4DDA-BE5C-1513A230D90A.html) to add register syslog server.
62-
63-
64-
6558
## Next steps
6659

6760
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-mcafeeepo?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/mcafee-network-security-platform.md

Lines changed: 19 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: "McAfee Network Security Platform connector for Microsoft Sentinel"
33
description: "Learn how to install the connector McAfee Network Security Platform to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 01/06/2024
6+
ms.date: 03/25/2023
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
---
1010

1111
# McAfee Network Security Platform connector for Microsoft Sentinel
1212

13-
The [McAfee® Network Security Platform](https://www.mcafee.com/enterprise/en-us/products/network-security-platform.html) data connector provides the capability to ingest [McAfee® Network Security Platform events](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-integration-guide-unmanaged/page/GUID-8C706BE9-6AC9-4641-8A53-8910B51207D8.html) into Microsoft Sentinel. Refer to [McAfee® Network Security Platform](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-integration-guide-unmanaged/page/GUID-F7D281EC-1CC9-4962-A7A3-5A9D9584670E.html) for more information.
13+
The [McAfee® Network Security Platform](https://www.mcafee.com/enterprise/en-us/products/network-security-platform.html) data connector provides the capability to ingest McAfee® Network Security Platform events into Microsoft Sentinel.
1414

1515
## Connector attributes
1616

@@ -23,46 +23,35 @@ The [McAfee® Network Security Platform](https://www.mcafee.com/enterprise/en-us
2323
## Query samples
2424

2525
**Top 10 Sources**
26+
2627
```kusto
27-
McAfeeNSPEvent
28-
28+
McAfeeNSPEvent
2929
| summarize count() by tostring(DvcHostname)
30-
3130
| top 10 by count_
3231
```
33-
34-
35-
3632
## Vendor installation instructions
3733

38-
3934
> [!NOTE]
40-
> This data connector depends on a parser based on a Kusto Function to work as expected [**McAfeeNSPEvent**](https://aka.ms/sentinel-mcafeensp-parser) which is deployed with the Microsoft Sentinel Solution.
41-
42-
43-
> [!NOTE]
44-
> This data connector has been developed using McAfee® Network Security Platform version: 10.1.x
45-
46-
1. Install and onboard the agent for Linux or Windows
47-
48-
Install the agent on the Server where the McAfee® Network Security Platform logs are forwarded.
49-
50-
> Logs from McAfee® Network Security Platform Server deployed on Linux or Windows servers are collected by **Linux** or **Windows** agents.
51-
52-
35+
> This data connector depends on a parser based on a Kusto Function to work as expected [**McAfeeNSPEvent**](https://aka.ms/sentinel-mcafeensp-parser) which is deployed with the Microsoft Sentinel Solution. This data connector has been developed using McAfee® Network Security Platform version: 10.1.x
5336
37+
1. Install and onboard the agent for Linux or Windows.
5438

55-
2. Configure McAfee® Network Security Platform event forwarding
39+
Install the agent on the Server where the McAfee® Network Security Platform logs are forwarded.
5640

57-
Follow the configuration steps below to get McAfee® Network Security Platform logs into Microsoft Sentinel.
58-
1. [Follow these instructions](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-product-guide/page/GUID-E4A687B0-FAFB-4170-AC94-1D968A10380F.html) to forward alerts from the Manager to a syslog server.
59-
2. Add a syslog notification profile, [more details here](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-product-guide/page/GUID-5BADD5D7-21AE-4E3B-AEE2-A079F3FD6A38.html). This is mandatory. While creating profile, to make sure that events are formatted correctly, enter the following text in the Message text box:
60-
<SyslogAlertForwarderNSP>:|SENSOR_ALERT_UUID|ALERT_TYPE|ATTACK_TIME|ATTACK_NAME|ATTACK_ID
61-
|ATTACK_SEVERITY|ATTACK_SIGNATURE|ATTACK_CONFIDENCE|ADMIN_DOMAIN|SENSOR_NAME|INTERFACE
62-
|SOURCE_IP|SOURCE_PORT|DESTINATION_IP|DESTINATION_PORT|CATEGORY|SUB_CATEGORY
63-
|DIRECTION|RESULT_STATUS|DETECTION_MECHANISM|APPLICATION_PROTOCOL|NETWORK_PROTOCOL|
41+
Logs from McAfee® Network Security Platform Server deployed on Linux or Windows servers are collected by **Linux** or **Windows** agents.
6442

43+
2. Configure McAfee® Network Security Platform event forwarding.
6544

45+
Follow the configuration steps below to get McAfee® Network Security Platform logs into Microsoft Sentinel.
46+
47+
1. While creating a profile, to make sure that events are formatted correctly, enter the following text in the Message text box:
48+
49+
```text
50+
<SyslogAlertForwarderNSP>:|SENSOR_ALERT_UUID|ALERT_TYPE|ATTACK_TIME|ATTACK_NAME|ATTACK_ID
51+
|ATTACK_SEVERITY|ATTACK_SIGNATURE|ATTACK_CONFIDENCE|ADMIN_DOMAIN|SENSOR_NAME|INTERFACE
52+
|SOURCE_IP|SOURCE_PORT|DESTINATION_IP|DESTINATION_PORT|CATEGORY|SUB_CATEGORY
53+
|DIRECTION|RESULT_STATUS|DETECTION_MECHANISM|APPLICATION_PROTOCOL|NETWORK_PROTOCOL|
54+
```
6655
6756
## Next steps
6857

0 commit comments

Comments
 (0)