You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The connector fetches data from ETD api for threat analysis
1159
+
The connector fetches data from ETD API for threat analysis
1161
1160
1162
1161
**Log Analytics table(s):**
1163
1162
@@ -2253,7 +2252,7 @@ Connector used to push Exchange On-Premises Security configuration for Microsoft
2253
2252
**Prerequisites:**
2254
2253
2255
2254
-**Service Account with Organization Management role**: The service Account that launch the script as scheduled task needs to be Organization Management to be able to retrieve all the needed security Information.
2256
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
2255
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
2257
2256
</details>
2258
2257
2259
2258
---
@@ -2939,7 +2938,7 @@ The connector provides the capability to poll data from Holm Security Center int
2939
2938
**Prerequisites:**
2940
2939
2941
2940
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
2942
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
2941
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
2943
2942
</details>
2944
2943
2945
2944
---
@@ -3001,7 +3000,7 @@ The Illumio Insights Summary data connector provides the capability to ingest [I
3001
3000
3002
3001
-**Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. For more information, see [Azure Functions](/azure/azure-functions/).
3003
3002
-**SQS and AWS S3 account credentials/permissions**: **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL** is required. If you are using s3 bucket provided by Illumio, contact Illumio support. At your request they will provide you with the AWS S3 bucket name, AWS SQS url and AWS credentials to access them.
3004
-
-**Illumio API key and secret**: **ILLUMIO_API_KEY**, **ILLUMIO_API_SECRET** is required for a workbook to make connection to SaaS PCE and fetch api responses.<br><br>
3003
+
-**Illumio API key and secret**: **ILLUMIO_API_KEY**, **ILLUMIO_API_SECRET** is required for a workbook to make connection to SaaS PCE and fetch API responses.<br><br>
3005
3004
</details>
3006
3005
3007
3006
---
@@ -3413,7 +3412,7 @@ These alerts can be imported into Microsoft Sentinel with this connector, allowi
3413
3412
**Prerequisites:**
3414
3413
3415
3414
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3416
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3415
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3417
3416
</details>
3418
3417
3419
3418
---
@@ -3713,7 +3712,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
3713
3712
**Prerequisites:**
3714
3713
3715
3714
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3716
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3715
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3717
3716
</details>
3718
3717
3719
3718
---
@@ -3735,7 +3734,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
3735
3734
**Prerequisites:**
3736
3735
3737
3736
-**Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3738
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3737
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3739
3738
</details>
3740
3739
3741
3740
---
@@ -3757,7 +3756,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
3757
3756
**Prerequisites:**
3758
3757
3759
3758
-**Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3760
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3759
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3761
3760
</details>
3762
3761
3763
3762
---
@@ -3779,7 +3778,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
3779
3778
**Prerequisites:**
3780
3779
3781
3780
-**Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3782
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3781
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
@@ -104,7 +101,7 @@ Deprecated, use the 'ESI-Opt' dataconnectors. You can stream all Exchange Audit
104
101
**Prerequisites:**
105
102
106
103
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
107
-
-**Detailled documentation**: >**NOTE:**Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
104
+
-**Detailed documentation**: >**NOTE:**Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
0 commit comments