You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The first option accepts as a parameter the value to lookup and let you choose the output field and therefore useful as a general lookup function. The second option is more geared towards parsers, takes as input the name of the source field, and updates the needed ASIM field, in this case `DnsResponseCodeName`.
265
+
The first option accepts as a parameter the value to look up and let you choose the output field and therefore useful as a general lookup function. The second option is more geared towards parsers, takes as input the name of the source field, and updates the needed ASIM field, in this case `DnsResponseCodeName`.
266
266
267
267
For a full list of ASIM help functions, refer to [ASIM functions](normalization-functions.md)
268
268
@@ -327,7 +327,7 @@ For example, when parsing a custom log table, use the following to remove the re
327
327
>[!IMPORTANT]
328
328
> The different variants represent *different* event types, commonly mapped to different schemas, develop separate parsers
329
329
330
-
In many cases, events in an event stream include variants that require different parsing logic. To parse different variants in a single parser either use conditional statements such as `iff` and `case`, or use a union structure.
330
+
In many cases, events in an eventstream include variants that require different parsing logic. To parse different variants in a single parser either use conditional statements such as `iff` and `case`, or use a union structure.
331
331
332
332
To use `union` to handle multiple variants, create a separate function for each variant and use the union statement to combine the results:
333
333
@@ -430,7 +430,7 @@ To make sure that your parser produces valid values, use the ASIM data tester by
Specifying a schema is optional. If a schema is not specified, the `EventSchema` field is used to identify the schema the event should adhere to. Ig an event does not include an `EventSchema` field, only common fields will be verified. If a schema is specified as a parameter, this schema will be used to test all records. This is useful for older parsers that do not set the `EventSchema` field.
433
+
Specifying a schema is optional. If a schema is not specified, the `EventSchema` field is used to identify the schema the event should adhere to. If an event does not include an `EventSchema` field, only common fields will be verified. If a schema is specified as a parameter, this schema will be used to test all records. This is useful for older parsers that do not set the `EventSchema` field.
434
434
435
435
> [!NOTE]
436
436
> Even when a schema is not specified, empty parentheses are needed after the function name.
Copy file name to clipboardExpand all lines: articles/sentinel/normalization-schema-asset.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.author: derricklee
12
12
13
13
---
14
14
15
-
# The Advanced Security Information Model (ASIM) Asset Entity Schema Reference
15
+
# The Advanced Security Information Model (ASIM) asset entity schema reference
16
16
17
17
The Microsoft Sentinel Asset Entity Schema is designed to normalize assets from various products into a standardized format within Microsoft Advanced Security Information Model (ASIM). This schema focuses exclusively on assets in non-Microsoft data sources, ensuring consistent and efficient analysis.
18
18
@@ -28,20 +28,20 @@ For more information about normalization in Microsoft Sentinel, see [Normalizati
28
28
29
29
For more information about ASIM parsers, see the [ASIM parsers overview](normalization-parsers-overview.md).
30
30
31
-
### Unifying Parsers
31
+
### Unifying parsers
32
32
33
33
To use parsers that unify all ASIM out-of-the-box parsers and ensure that your analysis runs across all the configured sources, use the `_Im_AssetEntity` parser.
34
34
35
35
36
-
### Add Your Own Normalized Parsers
36
+
### Add your own normalized parsers
37
37
38
38
When [developing custom parsers](normalization-develop-parsers.md) for the Asset Entity schema, name your KQL functions using the following syntax:
39
39
-`vimAssetEntity<vendor><Product>` for parameterized parsers
40
40
-`ASimAssetEntity<vendor><Product>` for regular parsers
41
41
42
42
Refer to the article [Managing ASIM parsers](normalization-manage-parsers.md) to learn how to add your custom parsers to the unifying parsers.
43
43
44
-
### Filtering Parser Parameters
44
+
### Filtering parser parameters
45
45
46
46
The Asset Entity parsers support various [filtering parameters](normalization-about-parsers.md#optimizing-parsing-using-parameters) to improve query performance. These parameters are optional but can enhance your query performance. The following filtering parameters are available:
47
47
@@ -56,7 +56,7 @@ The Asset Entity parsers support various [filtering parameters](normalization-ab
56
56
|**assetowner_has_any**| dynamic | Filter only assets for which the **'AssetOwner'** or **'AdditionalAssetOwners'** field is in one of the listed values. |
57
57
|**entitysource_has_any**| dynamic | Filter only assets for which the **'EntitySource'** field is in one of the listed values. |
This section defines information about the asset owner. If your asset has multiple owners, populate both fields `AssetOwnerId` and `AdditionalAssetOwners`. `AdditionalAssetOwners` should be an array of strings and the strings must be in the same format as `AssetOwnerId`.
88
88
@@ -95,7 +95,7 @@ This section defines information about the asset owner. If your asset has multip
95
95
|**AssetOwnerScopeId**| Optional | string | The identifier of the scope to which the asset owner belongs. |
96
96
|**AdditionalAssetOwners**| Optional | dynamic | A dynamic collection of additional owners or co-owners associated with the asset. This must be an **array of strings**. |
@@ -104,7 +104,7 @@ This section defines information about the asset owner. If your asset has multip
104
104
|**IdentityDirectoryId**| Mandatory | string | The identifier of the identity directory associated with the entity. |
105
105
|**AdditionalFields**| Optional | dynamic | Additional information about the entity that is not captured by other fields in the schema. |
106
106
107
-
### <aid="asset-type-fields">Asset Type Fields</a>
107
+
### <aid="asset-type-fields">Asset type fields</a>
108
108
109
109
This section defines information about the asset type. The current types supported are [`File`](#file-fields) and [`Site`](#site-fields). The asset's type's additional properties should be populated.
110
110
@@ -113,7 +113,7 @@ This section defines information about the asset type. The current types support
113
113
|**AssetType**| Mandatory | string | The high-level type of the asset. The allowed and supported values are: `File`, `Site`. |
114
114
|**AssetOriginalType**| Recommended | string | The original name of the high-level type of the asset at the source. |
This section captures the asset's security posture and exposure context, including source permissions, sensitivity and data-classification details, DLP protection status, related threat indicators, and the last classification scan time. It also includes internal and external user access counts to help assess potential exposure.
119
119
@@ -129,7 +129,7 @@ This section captures the asset's security posture and exposure context, includi
129
129
|**InternalUsersCount**| Optional | int | The number of internal users associated with or having access to the asset. |
130
130
|**ExternalUsersCount**| Optional | int | The number of external users associated with or having access to the asset. |
This section captures risk context for the asset, including normalized and source-reported risk names and levels, first and last report timestamps, and provider-specific risk details.
135
135
@@ -142,7 +142,7 @@ This section captures risk context for the asset, including normalized and sourc
142
142
|**AssetRiskLastReportedTime**| Optional | datetime | The timestamp (UTC) of when the risk associated with the asset was most recently reported. |
143
143
|**AssetOriginalRiskDetails**| Optional | dynamic | The full risk details for the asset as provided by the source system. |
0 commit comments