You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/blackberry-cylanceprotect.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Blackberry CylancePROTECT connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector Blackberry CylancePROTECT to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 01/06/2024
6
+
ms.date: 03/25/2023
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
---
@@ -76,7 +76,7 @@ Configure the facilities you want to collect and their severities.
76
76
77
77
3. Configure and connect the CylancePROTECT
78
78
79
-
[Follow these instructions](https://docs.blackberry.com/content/dam/docs-blackberry-com/release-pdfs/en/cylance-products/syslog-guides/Cylance%20Syslog%20Guide%20v2.0%20rev12.pdf) to configure the CylancePROTECT to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
79
+
Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/cisco-stealthwatch.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,21 +3,21 @@ title: "Cisco Stealthwatch connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector Cisco Stealthwatch to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 01/06/2024
6
+
ms.date: 02/23/2023
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
---
10
10
11
11
# Cisco Stealthwatch connector for Microsoft Sentinel
12
12
13
-
The [Cisco Stealthwatch](https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html) data connector provides the capability to ingest [Cisco Stealthwatch events](https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/securit_events_alarm_categories/SW_7_2_1_Security_Events_and_Alarm_Categories_DV_1_0.pdf) into Microsoft Sentinel. Refer to [Cisco Stealthwatch documentation](https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/system_installation_configuration/SW_7_3_2_System_Configuration_Guide_DV_1_0.pdf) for more information.
13
+
The [Cisco Stealthwatch](https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html) data connector provides the capability to ingest [Cisco Stealthwatch events](https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/management_console/securit_events_alarm_categories/SW_7_2_1_Security_Events_and_Alarm_Categories_DV_1_0.pdf) into Microsoft Sentinel.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/crowdstrike-falcon-data-replicator-using-azure-functions.md
+15-20Lines changed: 15 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: "Crowdstrike Falcon Data Replicator (using Azure Functions) connector for
3
3
description: "Learn how to install the connector Crowdstrike Falcon Data Replicator (using Azure Functions) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 01/06/2024
6
+
ms.date: 07/26/2023
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
---
@@ -19,7 +19,6 @@ The [Crowdstrike](https://www.crowdstrike.com/) Falcon Data Replicator connector
@@ -50,11 +49,11 @@ To integrate with Crowdstrike Falcon Data Replicator (using Azure Functions) mak
50
49
> This connector uses Azure Functions to connect to the S3 bucket to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
51
50
52
51
53
-
**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
52
+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
54
53
55
54
56
55
> [!NOTE]
57
-
> This data connector depends on a parser based on a Kusto Function to work as expected.[Follow these steps](https://aka.ms/sentinel-crowdstrikereplicator-parser) to create the Kusto functions alias, **CrowdstrikeReplicator**.
56
+
> This data connector depends on a parser based on a Kusto Function to work as expected.
58
57
59
58
60
59
**STEP 1 - Contact CrowdStrike support to obtain the credentials and Queue URL.**
@@ -63,8 +62,7 @@ To integrate with Crowdstrike Falcon Data Replicator (using Azure Functions) mak
63
62
64
63
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
65
64
66
-
> [!IMPORTANT]
67
-
> Before deploying the Crowdstrike Falcon Data Replicator connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
65
+
>**IMPORTANT:** Before deploying the Crowdstrike Falcon Data Replicator connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
68
66
69
67
70
68
@@ -76,8 +74,7 @@ Use this method for automated deployment of the Crowdstrike Falcon Data Replicat
76
74
77
75
[](https://aka.ms/sentinel-CrowdstrikeReplicator-azuredeploy)
78
76
2. Select the preferred **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL**.
79
-
80
-
Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
77
+
> **NOTE:** Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
81
78
3. Enter the **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL** and deploy.
82
79
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
83
80
5. Click **Purchase** to deploy.
@@ -89,7 +86,7 @@ Use the following step-by-step instructions to deploy the Crowdstrike Falcon Dat
89
86
90
87
**1. Deploy a Function App**
91
88
92
-
You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
89
+
> **NOTE:**You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
93
90
94
91
1. Download the [Azure Function App](https://aka.ms/sentinel-CrowdstrikeReplicator-functionapp) file. Extract archive to your local development computer.
95
92
2. Start VS Code. Choose File in the main menu and select Open Folder.
@@ -119,17 +116,15 @@ If you're already signed in, go to the next step.
119
116
120
117
1. In the Function App, select the Function App Name and select **Configuration**.
121
118
2. In the **Application settings** tab, select ** New application setting**.
122
-
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
123
-
124
-
- AWS_KEY
125
-
- AWS_SECRET
126
-
- AWS_REGION_NAME
127
-
- QUEUE_URL
128
-
- WorkspaceID
129
-
- WorkspaceKey
130
-
- logAnalyticsUri (optional)
131
-
132
-
Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
119
+
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
120
+
AWS_KEY
121
+
AWS_SECRET
122
+
AWS_REGION_NAME
123
+
QUEUE_URL
124
+
WorkspaceID
125
+
WorkspaceKey
126
+
logAnalyticsUri (optional)
127
+
> - Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.
133
128
4. Once all application settings have been entered, click **Save**.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/mcafee-epolicy-orchestrator-epo.md
+2-9Lines changed: 2 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: "McAfee ePolicy Orchestrator (ePO) connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector McAfee ePolicy Orchestrator (ePO) to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 01/06/2024
6
+
ms.date: 03/25/2023
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
---
10
10
11
11
# McAfee ePolicy Orchestrator (ePO) connector for Microsoft Sentinel
12
12
13
-
The McAfee ePolicy Orchestrator data connector provides the capability to ingest [McAfee ePO](https://www.mcafee.com/enterprise/en-us/products/epolicy-orchestrator.html) events into Microsoft Sentinel through the syslog. Refer to [documentation](https://docs.mcafee.com/bundle/epolicy-orchestrator-landing/page/GUID-0C40020F-5B7F-4549-B9CC-0E017BC8797F.html) for more information.
13
+
The McAfee ePolicy Orchestrator data connector provides the capability to ingest [McAfee ePO](https://www.mcafee.com/enterprise/en-us/products/epolicy-orchestrator.html) events into Microsoft Sentinel through the syslog.
14
14
15
15
## Connector attributes
16
16
@@ -55,13 +55,6 @@ Configure the facilities you want to collect and their severities.
55
55
2. Select **Apply below configuration to my machines** and select the facilities and severities.
56
56
3. Click **Save**.
57
57
58
-
59
-
3. Configure McAfee ePolicy Orchestrator event forwarding to Syslog server
60
-
61
-
[Follow these instructions](https://docs.mcafee.com/bundle/epolicy-orchestrator-5.10.0-product-guide/page/GUID-5C5332B3-837A-4DDA-BE5C-1513A230D90A.html) to add register syslog server.
62
-
63
-
64
-
65
58
## Next steps
66
59
67
60
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-mcafeeepo?tab=Overview) in the Azure Marketplace.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/mcafee-network-security-platform.md
+19-30Lines changed: 19 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: "McAfee Network Security Platform connector for Microsoft Sentinel"
3
3
description: "Learn how to install the connector McAfee Network Security Platform to connect your data source to Microsoft Sentinel."
4
4
author: cwatson-cat
5
5
ms.topic: how-to
6
-
ms.date: 01/06/2024
6
+
ms.date: 03/25/2023
7
7
ms.service: microsoft-sentinel
8
8
ms.author: cwatson
9
9
---
10
10
11
11
# McAfee Network Security Platform connector for Microsoft Sentinel
12
12
13
-
The [McAfee® Network Security Platform](https://www.mcafee.com/enterprise/en-us/products/network-security-platform.html) data connector provides the capability to ingest [McAfee® Network Security Platform events](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-integration-guide-unmanaged/page/GUID-8C706BE9-6AC9-4641-8A53-8910B51207D8.html) into Microsoft Sentinel. Refer to [McAfee® Network Security Platform](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-integration-guide-unmanaged/page/GUID-F7D281EC-1CC9-4962-A7A3-5A9D9584670E.html) for more information.
13
+
The [McAfee® Network Security Platform](https://www.mcafee.com/enterprise/en-us/products/network-security-platform.html) data connector provides the capability to ingest McAfee® Network Security Platform events into Microsoft Sentinel.
14
14
15
15
## Connector attributes
16
16
@@ -23,46 +23,35 @@ The [McAfee® Network Security Platform](https://www.mcafee.com/enterprise/en-us
23
23
## Query samples
24
24
25
25
**Top 10 Sources**
26
+
26
27
```kusto
27
-
McAfeeNSPEvent
28
-
28
+
McAfeeNSPEvent
29
29
| summarize count() by tostring(DvcHostname)
30
-
31
30
| top 10 by count_
32
31
```
33
-
34
-
35
-
36
32
## Vendor installation instructions
37
33
38
-
39
34
> [!NOTE]
40
-
> This data connector depends on a parser based on a Kusto Function to work as expected [**McAfeeNSPEvent**](https://aka.ms/sentinel-mcafeensp-parser) which is deployed with the Microsoft Sentinel Solution.
41
-
42
-
43
-
> [!NOTE]
44
-
> This data connector has been developed using McAfee® Network Security Platform version: 10.1.x
45
-
46
-
1. Install and onboard the agent for Linux or Windows
47
-
48
-
Install the agent on the Server where the McAfee® Network Security Platform logs are forwarded.
49
-
50
-
> Logs from McAfee® Network Security Platform Server deployed on Linux or Windows servers are collected by **Linux** or **Windows** agents.
51
-
52
-
35
+
> This data connector depends on a parser based on a Kusto Function to work as expected [**McAfeeNSPEvent**](https://aka.ms/sentinel-mcafeensp-parser) which is deployed with the Microsoft Sentinel Solution. This data connector has been developed using McAfee® Network Security Platform version: 10.1.x
53
36
37
+
1. Install and onboard the agent for Linux or Windows.
Install the agent on the Server where the McAfee® Network Security Platform logs are forwarded.
56
40
57
-
Follow the configuration steps below to get McAfee® Network Security Platform logs into Microsoft Sentinel.
58
-
1.[Follow these instructions](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-product-guide/page/GUID-E4A687B0-FAFB-4170-AC94-1D968A10380F.html) to forward alerts from the Manager to a syslog server.
59
-
2. Add a syslog notification profile, [more details here](https://docs.mcafee.com/bundle/network-security-platform-10.1.x-product-guide/page/GUID-5BADD5D7-21AE-4E3B-AEE2-A079F3FD6A38.html). This is mandatory. While creating profile, to make sure that events are formatted correctly, enter the following text in the Message text box:
0 commit comments