You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -631,7 +631,7 @@ The Azure DevOps Audit Logs data connector allows you to ingest audit events fro
631
631
632
632
**Prerequisites:**
633
633
634
-
-**Azure DevOps Prerequisite**: Please ensure the following:<br> 1. Register an Entra App in Microsoft Entra Admin Center under App Registrations.<br> 2. In 'API permissions' - add Permissions to 'Azure DevOps - vso.auditlog'.<br> 3. In 'Certificates & secrets' - generate 'Client secret'.<br> 4. In 'Authentication' - add the Redirect URI found below in the corresponding field.<br> 5. In the Azure DevOps settings - enable audit log and set **View audit log** for the user. [Azure DevOps Auditing](/azure/devops/organizations/audit/azure-devops-auditing?view=azure-devops&tabs=preview-page&preserve-view=true).<br> 6. Ensure the user assigned to connect the data connector has the View audit logs permission explicitly set to Allow at all times. This permission is essential for successful log ingestion. If the permission is revoked or not granted, data ingestion will fail or be interrupted.<br><br>
634
+
-**Azure DevOps Prerequisite**: Please ensure the following:<br> 1. Register an Entra App in Microsoft Entra Admin Center under App Registrations.<br> 2. In 'API permissions' - add Permissions to 'Azure DevOps - vso.auditlog'.<br> 3. In 'Certificates & secrets' - generate 'Client secret'.<br> 4. In 'Authentication' - add the Redirect URI found below in the corresponding field.<br> 5. In the Azure DevOps settings - enable audit log and set **View audit log** for the user. [Azure DevOps Auditing](/azure/devops/organizations/audit/azure-devops-auditing?view=azure-devops&tabs=preview-page).<br> 6. Ensure the user assigned to connect the data connector has the View audit logs permission explicitly set to Allow at all times. This permission is essential for successful log ingestion. If the permission is revoked or not granted, data ingestion will fail or be interrupted.<br><br>
635
635
</details>
636
636
637
637
---
@@ -1117,8 +1117,8 @@ The Cisco Cloud Security solution for Microsoft Sentinel enables you to ingest [
1117
1117
|`Cisco_Umbrella_dns_CL`|Yes|Yes|
1118
1118
|`Cisco_Umbrella_proxy_CL`|Yes|Yes|
1119
1119
|`Cisco_Umbrella_ip_CL`|Yes|Yes|
1120
-
|`Cisco_Umbrella_cloudfirewall_CL`|No|No|
1121
-
|`Cisco_Umbrella_firewall_CL`|No|No|
1120
+
|`Cisco_Umbrella_cloudfirewall_CL`|Yes|Yes|
1121
+
|`Cisco_Umbrella_firewall_CL`|Yes|Yes|
1122
1122
|`Cisco_Umbrella_dlp_CL`|No|No|
1123
1123
|`Cisco_Umbrella_ravpnlogs_CL`|No|No|
1124
1124
|`Cisco_Umbrella_audit_CL`|No|No|
@@ -1152,8 +1152,8 @@ The Cisco Umbrella data connector provides the capability to ingest [Cisco Umbre
1152
1152
|`Cisco_Umbrella_dns_CL`|Yes|Yes|
1153
1153
|`Cisco_Umbrella_proxy_CL`|Yes|Yes|
1154
1154
|`Cisco_Umbrella_ip_CL`|Yes|Yes|
1155
-
|`Cisco_Umbrella_cloudfirewall_CL`|No|No|
1156
-
|`Cisco_Umbrella_firewall_CL`|No|No|
1155
+
|`Cisco_Umbrella_cloudfirewall_CL`|Yes|Yes|
1156
+
|`Cisco_Umbrella_firewall_CL`|Yes|Yes|
1157
1157
|`Cisco_Umbrella_dlp_CL`|No|No|
1158
1158
|`Cisco_Umbrella_ravpnlogs_CL`|No|No|
1159
1159
|`Cisco_Umbrella_audit_CL`|No|No|
@@ -1173,6 +1173,28 @@ The Cisco Umbrella data connector provides the capability to ingest [Cisco Umbre
1173
1173
1174
1174
---
1175
1175
1176
+
<aname="cisco-duo-security-using-azure-functions"></a><details><summary>**Cisco Duo Security (using Azure Functions)**</summary>
The Cisco Duo Security data connector provides the capability to ingest [authentication logs](https://duo.com/docs/adminapi#authentication-logs), [administrator logs](https://duo.com/docs/adminapi#administrator-logs), [telephony logs](https://duo.com/docs/adminapi#telephony-logs), [offline enrollment logs](https://duo.com/docs/adminapi#offline-enrollment-logs) and [Trust Monitor events](https://duo.com/docs/adminapi#trust-monitor) into Microsoft Sentinel using the Cisco Duo Admin API. Refer to [API documentation](https://duo.com/docs/adminapi) for more information.
1181
+
1182
+
**Log Analytics table(s):**
1183
+
1184
+
|Table|DCR support|Lake-only ingestion|
1185
+
|---|---|---|
1186
+
|`CiscoDuo_CL`|No|No|
1187
+
1188
+
**Data collection rule support:** Not currently supported
1189
+
1190
+
**Prerequisites:**
1191
+
1192
+
-**Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. For more information, see [Azure Functions](/azure/azure-functions/).
1193
+
-**Cisco Duo API credentials**: Cisco Duo API credentials with permission *Grant read log* is required for Cisco Duo API. See the [documentation](https://duo.com/docs/adminapi#first-steps) to learn more about creating Cisco Duo API credentials.<br><br>
The Digital Shadows data connector provides ingestion of the incidents and alerts from Digital Shadows Searchlight into the Microsoft Sentinel using the REST API. The connector will provide the incidents and alerts information such that it helps to examine, diagnose and analyse the potential security risks and threats.
1978
2000
@@ -4073,9 +4095,9 @@ The data connector for [Mimecast Cloud Integrated](https://integrations.mimecast
4073
4095
4074
4096
|Table|DCR support|Lake-only ingestion|
4075
4097
|---|---|---|
4076
-
|`Cloud_Integrated_CL`|No|No|
4098
+
|`Cloud_Integrated_CL`|Yes|Yes|
4077
4099
4078
-
**Data collection rule support:**Not currently supported
0 commit comments