Skip to content

Commit bece2cd

Browse files
authored
Merge pull request #311414 from EdB-MSFT/AUTOGEN-Sentinel-connectors-Thu_Feb_05_2026-0953
[AUTOGEN] PR for Sentinel connectors
2 parents 13935bc + 5098c84 commit bece2cd

3 files changed

Lines changed: 18 additions & 17 deletions

File tree

articles/sentinel/data-connectors-reference.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Find your Microsoft Sentinel data connector | Microsoft Docs
33
description: Learn about specific configuration steps for Microsoft Sentinel data connectors.
44
author: EdB-MSFT
55
ms.topic: reference
6-
ms.date: 11/18/2024
6+
ms.date: 02/05/2026
77
ms.custom: linux-related-content
88
ms.author: edbaynash
99
appliesto:
@@ -69,6 +69,11 @@ Filter and ingest logs in text-file format from network or security applications
6969
[!INCLUDE [connector-details](includes/connector-details.md)]
7070

7171

72+
## Deprecated Sentinel data connectors
73+
74+
> [!NOTE]
75+
> The following table lists the deprecated and legacy data connectors. Deprecated connectors are no longer supported.
76+
7277
[!INCLUDE [deprecated-connectors](includes/deprecated-connectors.md)]
7378

7479

articles/sentinel/includes/connector-details.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,11 @@
22
author: EdB-MSFT
33
ms.author: edbaynash
44
ms.topic: include
5-
ms.date: 02/04/2026
5+
ms.date: 02/05/2026
66

77
# This file is auto-generated . Do not edit manually. Changes will be overwritten.
88
---
99

10-
1110
<a name="1password-serverless"></a><details><summary>**1Password (Serverless)**</summary>
1211

1312
**Supported by:** [1Password](https://support.1password.com/)
@@ -1157,7 +1156,7 @@ The Cisco Umbrella data connector provides the capability to ingest [Cisco Umbre
11571156

11581157
**Supported by:** [N/A](https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8)
11591158

1160-
The connector fetches data from ETD api for threat analysis
1159+
The connector fetches data from ETD API for threat analysis
11611160

11621161
**Log Analytics table(s):**
11631162

@@ -2253,7 +2252,7 @@ Connector used to push Exchange On-Premises Security configuration for Microsoft
22532252
**Prerequisites:**
22542253

22552254
- **Service Account with Organization Management role**: The service Account that launch the script as scheduled task needs to be Organization Management to be able to retrieve all the needed security Information.
2256-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
2255+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
22572256
</details>
22582257

22592258
---
@@ -2939,7 +2938,7 @@ The connector provides the capability to poll data from Holm Security Center int
29392938
**Prerequisites:**
29402939

29412940
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
2942-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
2941+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
29432942
</details>
29442943

29452944
---
@@ -3001,7 +3000,7 @@ The Illumio Insights Summary data connector provides the capability to ingest [I
30013000

30023001
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. For more information, see [Azure Functions](/azure/azure-functions/).
30033002
- **SQS and AWS S3 account credentials/permissions**: **AWS_SECRET**, **AWS_REGION_NAME**, **AWS_KEY**, **QUEUE_URL** is required. If you are using s3 bucket provided by Illumio, contact Illumio support. At your request they will provide you with the AWS S3 bucket name, AWS SQS url and AWS credentials to access them.
3004-
- **Illumio API key and secret**: **ILLUMIO_API_KEY**, **ILLUMIO_API_SECRET** is required for a workbook to make connection to SaaS PCE and fetch api responses.<br><br>
3003+
- **Illumio API key and secret**: **ILLUMIO_API_KEY**, **ILLUMIO_API_SECRET** is required for a workbook to make connection to SaaS PCE and fetch API responses.<br><br>
30053004
</details>
30063005

30073006
---
@@ -3413,7 +3412,7 @@ These alerts can be imported into Microsoft Sentinel with this connector, allowi
34133412
**Prerequisites:**
34143413

34153414
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3416-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3415+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
34173416
</details>
34183417

34193418
---
@@ -3713,7 +3712,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
37133712
**Prerequisites:**
37143713

37153714
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3716-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3715+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
37173716
</details>
37183717

37193718
---
@@ -3735,7 +3734,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
37353734
**Prerequisites:**
37363735

37373736
- **Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3738-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3737+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
37393738
</details>
37403739

37413740
---
@@ -3757,7 +3756,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
37573756
**Prerequisites:**
37583757

37593758
- **Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3760-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3759+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
37613760
</details>
37623761

37633762
---
@@ -3779,7 +3778,7 @@ Microsoft Entra ID Protection provides a consolidated view at risk users, risk e
37793778
**Prerequisites:**
37803779

37813780
- **Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
3782-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
3781+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
37833782
</details>
37843783

37853784
---

articles/sentinel/includes/deprecated-connectors.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,11 @@
22
author: EdB-MSFT
33
ms.author: edbaynash
44
ms.topic: include
5-
ms.date: 02/04/2026
5+
ms.date: 02/05/2026
66

77
# This file is auto-generated . Do not edit manually. Changes will be overwritten.
88
---
99

10-
## Deprecated Sentinel data connectors
11-
12-
1310
<a name="deprecated-github-enterprise-audit-log"></a><details><summary>**[Deprecated] GitHub Enterprise Audit Log**</summary>
1411

1512
**Supported by:** [Microsoft Corporation](https://azure.microsoft.com/support/options/)
@@ -104,7 +101,7 @@ Deprecated, use the 'ESI-Opt' dataconnectors. You can stream all Exchange Audit
104101
**Prerequisites:**
105102

106103
- Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
107-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
104+
- **Detailed documentation**: >**NOTE:** Detailed documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)<br><br>
108105
</details>
109106

110107
---

0 commit comments

Comments
 (0)