Skip to content

Files

Latest commit

26421e4 · May 15, 2022

History

History
133 lines (97 loc) · 11.2 KB

normalization-parsers-list.md

File metadata and controls

133 lines (97 loc) · 11.2 KB
title description author ms.topic ms.date ms.author
List of Microsoft Sentinel Advanced Security Information Model (ASIM) parsers | Microsoft Docs
This article lists Advanced Security Information Model (ASIM) parsers.
oshezaf
reference
05/02/2022
ofshezaf

List of Microsoft Sentinel Advanced Security Information Model (ASIM) parsers (Public preview)

[!INCLUDE Banner for top of topics]

This document provides a list of Advanced Security Information Model (ASIM) parsers. For an overview of ASIM parsers refer to the parsers overview. To understand how parsers fit within the ASIM architecture, refer to the ASIM architecture diagram.

Important

ASIM is currently in PREVIEW. The Azure Preview Supplemental Terms include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Authentication parsers

  • Windows sign-ins
    • Collected using the Log Analytics Agent or Azure Monitor Agent.
    • Collected using either the Security Events connectors to the SecurityEvent table or using the WEF connector to the WindowsEvent table.
    • Reported as Security Events (4624, 4625, 4634, and 4647).
    • reported by Microsoft 365 Defender for Endpoint, collected using the Microsoft 365 Defender connector.
  • Linux sign-ins
    • reported by Microsoft 365 Defender for Endpoint, collected using the Microsoft 365 Defender connector.
    • reported by Microsoft Defender to IoT Endpoint.
  • Azure Active Directory sign-ins, collected using the Azure Active Directory connector. Separate parsers are provided for regular, Non-Interactive, Managed Identities and Service Principles Sign-ins.
  • AWS sign-ins, collected using the AWS CloudTrail connector.
  • Okta authentication, collected using the Okta connector.

Deploy the parsers from the Microsoft Sentinel GitHub repository.

DNS parsers

Microsoft Sentinel provides the following out-of-the-box, product-specific DNS parsers:

Source Built-in parsers Workspace deployed parsers
Microsoft DNS Server
Collected by the DNS connector
and the Log Analytics Agent
_ASim_Dns_MicrosoftOMS (regular)
_Im_Dns_MicrosoftOMS (filtering)

ASimDnsMicrosoftOMS (regular)
vimDnsMicrosoftOMS (filtering)

Microsoft DNS Server
Collected by NXlog
_ASim_Dns_MicrosoftNXlog (regular)
_Im_Dns_MicrosoftNXlog (filtering)
ASimDnsMicrosoftNXlog (regular)
vimDnsMicrosoftNXlog (filtering)
Azure Firewall _ASim_Dns_AzureFirewall (regular)
_Im_Dns_AzureFirewall (filtering)
ASimDnsAzureFirewall (regular)
vimDnsAzureFirewall (filtering)
Sysmon for Windows (event 22)
Collected by the Log Analytics Agent
or the Azure Monitor Agent,
supporting both the
Event and WindowsEvent tables
_ASim_Dns_MicrosoftSysmon (regular)
_Im_Dns_MicrosoftSysmon (filtering)
ASimDnsMicrosoftSysmon (regular)
vimDnsMicrosoftSysmon (filtering)
Cisco Umbrella _ASim_Dns_CiscoUmbrella (regular)
_Im_Dns_CiscoUmbrella (filtering)
ASimDnsCiscoUmbrella (regular)
vimDnsCiscoUmbrella (filtering)
Infoblox NIOS

The InfoBlox parsers
require configuring the relevant sources.
Use InfobloxNIOS as the source type.
_ASim_Dns_InfobloxNIOS (regular)
_Im_Dns_InfobloxNIOS (filtering)
ASimDnsInfobloxNIOS (regular)
vimDnsInfobloxNIOS (filtering)
GCP DNS _ASim_Dns_Gcp (regular)
_Im_Dns_Gcp (filtering)
ASimDnsGcp (regular)
vimDnsGcp (filtering)
Corelight Zeek DNS events _ASim_Dns_CorelightZeek (regular)
_Im_Dns_CorelightZeek (filtering)
ASimDnsCorelightZeek (regular)
vimDnsCorelightZeek (filtering)
Vectra AI _ASim_Dns_VectraIA (regular)
_Im_Dns_VectraIA (filtering)
AsimDnsVectraAI (regular)
vimDnsVectraAI (filtering)
Zscaler ZIA _ASim_Dns_ZscalerZIA (regular)
_Im_Dns_ZscalerZIA (filtering)
AsimDnsZscalerZIA (regular)
vimDnsSzcalerZIA (filtering)

Deploy the workspace deployed parsers from the Microsoft Sentinel GitHub repository.

File Activity parsers

Microsoft Sentinel provides the following out-of-the-box, product-specific File Activity parsers:

  • Sysmon file activity events (Events 11, 23, and 26), collected using the Log Analytics Agent or Azure Monitor Agent.
  • Microsoft Office 365 SharePoint and OneDrive events, collected using the Office Activity connector.
  • Microsoft 365 Defender for Endpoint file events
  • Azure Storage, including Blob, File, Queue, and Table Storage.

Deploy the parsers from the Microsoft Sentinel GitHub repository.

Network Session parsers

Microsoft Sentinel provides the following out-of-the-box, product-specific Network Session parsers:

Source Built-in parsers Workspace deployed parsers
AWS VPC logs collected using the AWS S3 connector _ASim_NetworkSession_AWSVPC (regular)
_Im_NetworkSession_AWSVPC (filtering)
ASimNetworkSessionAWSVPC (regular)
vimNetworkSessionAWSVPC (filtering)
Azure Firewall logs _ASim_NetworkSession_AzureFirewall (regular)
_Im_NetworkSession_AzureFirewall (filtering)
ASimNetworkSessionAzureFirewall (regular)
vimNetworkSessionAzureFirewall (filtering)
Azure Monitor VMConnection collected as part of the Azure Monitor VM Insights solution _ASim_NetworkSession_VMConnection (regular)
_Im_NetworkSession_VMConnection (filtering)
ASimNetworkSessionVMConnection (regular)
vimNetworkSessionVMConnection (filtering)
Azure Network Security Groups (NSG) logs collected as part of the Azure Monitor VM Insights solution _ASim_NetworkSession_AzureNSG (regular)
_Im_NetworkSession_AzureNSG (filtering)
ASimNetworkSessionAzureNSG (regular)
vimNetworkSessionAzureNSG (filtering)
Microsoft 365 Defender for Endpoint _ASim_NetworkSession_Microsoft365Defender (regular)

_Im_NetworkSession_Microsoft365Defender (filtering)
ASimNetworkSessionMicrosoft365Defender (regular)

vimNetworkSessionMicrosoft365Defender (filtering)
Microsoft Defender for IoT - Endpoint _ASim_NetworkSession_MD4IoT (regular)

_Im_NetworkSession_MD4IoT (filtering)
ASimNetworkSessionMD4IoT (regular)

vimNetworkSessionMD4IoT (filtering)
Palo Alto PanOS traffic logs collected using CEF _ASim_NetworkSession_PaloAltoCEF (regular)
_Im_NetworkSession_PaloAltoCEF (filtering)
ASimNetworkSessionPaloAltoCEF (regular)
vimNetworkSessionPaloAltoCEF (filtering)
Sysmon for Linux (event 3)
Collected using the Log Analytics Agent
or the Azure Monitor Agent
_ASim_NetworkSession_LinuxSysmon (regular)

_Im_NetworkSession_LinuxSysmon (filtering)
ASimNetworkSessionLinuxSysmon (regular)

vimNetworkSessionLinuxSysmon (filtering)
Vectra AI _ASim_NetworkSession_VectraIA (regular)
_Im_NetworkSession_VectraIA (filtering)
AsimNetworkSessionVectraAI (regular)
vimNetworkSessionVectraAI (filtering)
Windows Firewall logs
Collected as Windows events using the Log Analytics Agent (Event table) or Azure Monitor Agent (WindowsEvent table). Supports Windows events 5150 to 5159.
_ASim_NetworkSession_
MicrosoftWindowsEventFirewall (regular)

_Im_NetworkSession_
MicrosoftWindowsEventFirewall (filtering)
ASimNetworkSession
MicrosoftWindowsEventFirewall (regular)

vimNetworkSession
MicrosoftWindowsEventFirewall (filtering)
Zscaler ZIA firewall logs _ASim_NetworkSessionZscalerZIA (regular)
_Im_NetworkSessionZscalerZIA (filtering)
AsimNetworkSessionZscalerZIA (regular)
vimNetowrkSessionSzcalerZIA (filtering)

Deploy the workspace deployed parsers from the Microsoft Sentinel GitHub repository.

Process Event parsers

Microsoft Sentinel provides the following built-in, product-specific Process Event parsers:

  • Security Events process creation (Event 4688), collected using the Log Analytics Agent or Azure Monitor Agent
  • Security Events process termination (Event 4689), collected using the Log Analytics Agent or Azure Monitor Agent
  • Sysmon process creation (Event 1), collected using the Log Analytics Agent or Azure Monitor Agent
  • Sysmon process termination (Event 5), collected using the Log Analytics Agent or Azure Monitor Agent
  • Microsoft 365 Defender for Endpoint process creation

Deploy Process Event parsers from the Microsoft Sentinel GitHub repository.

Registry Event parsers

Microsoft Sentinel provides the following built-in, product-specific Registry Event parsers:

  • Security Events registry update (Event 4657), collected using the Log Analytics Agent or Azure Monitor Agent
  • Sysmon registry monitoring events (Events 12, 13, and 14), collected using the Log Analytics Agent or Azure Monitor Agent
  • Microsoft 365 Defender for Endpoint registry events

Deploy Registry Event parsers from the Microsoft Sentinel GitHub repository.

Web Session parsers

Microsoft Sentinel provides the following out-of-the-box, product-specific Web Session parsers:

Source Built-in parsers Workspace deployed parsers
Squid Proxy _ASim_WebSession_SquidProxy (regular)
_Im_WebSession_SquidProxy (filtering)

ASimWebSessionSquidProxy (regular)
vimWebSessionSquidProxy (filtering)

Zscaler ZIA _ASim_WebSessionZscalerZIA (regular)
_Im_WebSessionZscalerZIA (filtering)
AsimWebSessionZscalerZIA (regular)
vimWebSessionSzcalerZIA (filtering)

These parsers can be deployed from the Microsoft Sentinel GitHub repository.

Next steps

Learn more about ASIM parsers:

Learn more about ASIM: