You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
API integrations built by third-party vendors pull data from their products' data sources and connect to Azure Sentinel's [Azure Monitor Data Collector API](../azure-monitor/logs/data-collector-api.md) to push the data into custom log tables in your Azure Sentinel workspace.
25
+
26
+
For the most part, you can find all the information you need to configure these data sources to connect to Azure Sentinel in each vendor's documentation.
27
+
28
+
Check your product's section in the [data connectors reference](data-connectors-reference) page for any extra instructions that may appear there, and for the links to your vendor's instructions.
29
+
30
+
> [!NOTE]
31
+
> Data will be stored in the geographic location of the workspace on which you are running Azure Sentinel.
32
+
33
+
## Prerequisites
34
+
35
+
- You must have read and write permissions on the Azure Sentinel workspace.
36
+
37
+
- You must have read permissions to shared keys for the workspace.
38
+
39
+
## Configure and connect your data source
40
+
41
+
1. In the Azure Sentinel portal, click **Data connectors** on the navigation menu.
42
+
43
+
1. Select your product's entry from the data connectors gallery, and then click the **Open connector page** button.
44
+
45
+
1. Follow any steps that appear on the connector page, or any links to vendor instructions that appear there.
46
+
47
+
1. When asked for the Workspace ID and the Primary Key, copy them from the data connector page and paste them into the configuration as directed by your vendor's instructions. See the example below.
48
+
49
+
:::image type="content" source="media/connect-rest-api-template/workspace-id-primary-key.png" alt-text="Workspace ID and Primary Key":::
50
+
51
+
## Find your data
52
+
53
+
After a successful connection is established, the data appears in **Logs** under the **CustomLogs** section. See your product's section in the [data connectors reference](data-connectors-reference) page for the table names.
54
+
55
+
To query the data from your product, use those table names in your query.
56
+
57
+
It may take up to 20 minutes before your logs start to appear in Log Analytics.
58
+
59
+
## Next steps
60
+
61
+
In this document, you learned how to connect external data sources to Azure Sentinel's Data Collector API. To take full advantage of the capabilities built in to these data connectors, click on the **Next steps** tab on the data connector page. There you'll find some ready-made sample queries, workbooks, and analytics rule templates so you can get started finding useful information.
62
+
63
+
To learn more about Azure Sentinel, see the following articles:
64
+
65
+
- Learn how to [get visibility into your data and potential threats](get-visibility.md).
66
+
- Get started [detecting threats with Azure Sentinel](detect-threats-built-in.md).
67
+
-[Use workbooks](monitor-your-data.md) to monitor your data.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors-reference.md
+51-81Lines changed: 51 additions & 81 deletions
Original file line number
Diff line number
Diff line change
@@ -485,8 +485,6 @@ Configure eNcore to stream data via TCP to the Log Analytics Agent. This should
485
485
486
486
## Cognni (Preview)
487
487
488
-
The Cognni data connector offers a quick and simple integration to Azure Sentinel. You can use Cognni to autonomously map previously unclassified important information and detect related incidents. Cognni helps you recognize risks to your important information, understand the severity of the incidents, and investigate the details you need to remediate, fast enough to make a difference.
489
-
490
488
| Data ingestion method: |[REST-API](connect-rest-api-template.md)|
491
489
| --- | --- |
492
490
|**Log Analytics table(s)**||
@@ -506,12 +504,10 @@ The Cognni data connector offers a quick and simple integration to Azure Sentine
506
504
507
505
## Cyberpion Security Logs (Preview)
508
506
509
-
The Cyberpion Security Logs data connector ingests logs from the Cyberpion system directly into Azure Sentinel. For more information, see [Azure Sentinel](https://www.cyberpion.com/resource-center/integrations/azure-sentinel/) in the Cyberpion documentation.
510
-
511
507
| Data ingestion method: |[REST-API](connect-rest-api-template.md)|
@@ -554,8 +550,6 @@ The Cyberpion Security Logs data connector ingests logs from the Cyberpion syste
554
550
555
551
## ESET Security Management Center (SMC) (Preview)
556
552
557
-
The ESET SMC data connector ingests ESET SMC threat events, audit logs, firewall events, and website filters into Azure Sentinel. For more information, see [Syslog server](https://help.eset.com/esmc_admin/70/en-US/admin_server_settings_syslog.html) in the ESET SMC documentation.
@@ -677,10 +671,6 @@ Configure Eset Logs using BSD style and JSON format.
677
671
678
672
## ExtraHop Reveal(x)
679
673
680
-
The ExtraHop Reveal(x) data connector connects your Reveal(x) system to Azure Sentinel. Azure Sentinel integration requires the ExtraHop Detection SIEM Connector. To install the SIEM Connector on your Reveal(x) system, follow the instructions at .
681
-
682
-
For more information about connecting to Azure Sentinel, see [Connect ExtraHop Reveal(x) to Azure Sentinel](connect-extrahop.md).
683
-
684
674
| Data ingestion method: | [Common Event Format (CEF)](connect-common-event-format.md) over Syslog |
685
675
| --- | --- |
686
676
|**Log Analytics table(s)**| CommonSecurityLog |
@@ -730,14 +720,10 @@ For more information about connecting to Azure Sentinel, see [Connect ExtraHop R
730
720
731
721
## Forcepoint Data Loss Prevention (DLP) (Preview)
732
722
733
-
The Forcepoint DLP data connector automatically exports DLP incident data from Forcepoint DLP into Azure Sentinel in real time. For more information, see [Forcepoint Data Loss Prevention and Azure Sentinel](https://forcepoint.github.io/docs/dlp_and_azure_sentinel/).
734
-
735
-
For more information about connecting to Azure Sentinel, see [Connect Forcepoint DLP to Azure Sentinel](connect-forcepoint-dlp.md).
736
-
737
723
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
|**Vendor documentation/<br>installation instructions**|[Forcepoint Data Loss Prevention and Azure Sentinel](https://forcepoint.github.io/docs/dlp_and_azure_sentinel/)|
The NXLog BSM macOS data connector uses the Sun BSM Auditing API to capture audit events directly from the kernel on the macOS platform. This data connector can efficiently export macOS audit events to Azure Sentinel in real time. For more information, see the [NXLog Azure Sentinel User Guide](https://nxlog.co/documentation/nxlog-user-guide/sentinel.html).
937
-
938
939
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
The NXLog DNS Logs data connector uses Event Tracing forWindows (ETW) to collect both audit and analytical DNS server events. For maximum efficiency, the NXLog im_etw module reads event tracing data directly, without having to capture the event trace into an *.etl* file. This REST API connector can forward DNS server events to Azure Sentinelin real time. For more information, see the [NXLog Azure Sentinel User Guide](https://nxlog.co/documentation/nxlog-user-guide/sentinel.html).
950
-
951
-
For more information about connecting to Azure Sentinel, see [Connect NXLog (Windows) DNS Logs to Azure Sentinel](connect-nxlog-dns.md).
952
-
953
949
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
The NXLog LinuxAudit data connector supports custom audit rules and collects logs without using AuditD or other user software. The connector resolves IP addresses and group/user IDs to their respective names, making Linux audit logs more intelligible. This REST API connector can export Linux security events to Azure Sentinel in real time. For more information, see the [NXLog Azure Sentinel User Guide](https://nxlog.co/documentation/nxlog-user-guide/sentinel.html).
965
-
966
-
For more information about connecting to Azure Sentinel, see [Connect NXLog LinuxAudit to Azure Sentinel](connect-nxlog-linuxaudit.md).
967
-
968
959
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
@@ -1024,18 +1014,13 @@ For more information about connecting to Azure Sentinel, see [Connect NXLog Linu
1024
1014
1025
1015
## Orca Security (Preview)
1026
1016
1027
-
The Orca Security Alerts connector automatically exports Alerts logs to Azure Sentinel. For more information, see [Azure Sentinel integration](https://orcasecurity.zendesk.com/hc/en-us/articles/360043941992-Azure-Sentinel-configuration).
1028
-
1029
-
For more information about connecting to Azure Sentinel, see [Connect Orca Security to Azure Sentinel](connect-orca-security-alerts.md).
1030
-
1031
1017
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
@@ -1061,19 +1046,13 @@ For more information about connecting to Azure Sentinel, see [Connect Orca Secur
1061
1046
1062
1047
## Perimeter 81 Activity Logs (Preview)
1063
1048
1064
-
The Perimeter 81 Activity Logs data connector connects Perimeter 81 activity logs to Azure Sentinel. For more information, see the Perimeter 81 [Azure Sentinel](https://support.perimeter81.com/docs/360012680780) documentation.
1065
-
1066
-
For more information about connecting to Azure Sentinel, see [Connect Perimeter 81 logs to Azure Sentinel](connect-perimeter-81-logs.md).
1067
-
1068
1049
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
## Proofpoint On Demand (POD) Email Security (Preview)
1079
1058
@@ -1249,18 +1228,13 @@ Follow the instructions to obtain the credentials.
1249
1228
1250
1229
## Sophos Cloud Optix (Preview)
1251
1230
1252
-
The Sophos Cloud Optix data connector connects your Sophos Cloud Optix logs to Azure Sentinel. For more information, in your Cloud Optix settings, see the Azure Sentinel [integrations page](https://optix.sophos.com/#/integrations/sentinel).
1253
-
1254
-
For more information about connecting to Azure Sentinel, see [Connect Sophos Cloud Optix to Azure Sentinel](connect-sophos-cloud-optix.md).
1255
-
1256
1231
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
@@ -1275,18 +1249,13 @@ For more information about connecting to Azure Sentinel, see [Connect Sophos Clo
1275
1249
1276
1250
## Squadra Technologies secRMM
1277
1251
1278
-
The Squadra Technologies secRMM data connector pushes USB removable storage security event data into Azure Sentinel. For more information, see the [secRMM Azure Sentinel Administrator Guide](https://www.squadratechnologies.com/StaticContent/ProductDownload/secRMM/9.9.0.0/secRMMAzureSentinelAdministratorGuide.pdf).
1279
-
1280
-
For more information about connecting to Azure Sentinel, see [Connect Squadra Technologies secRMM to Azure Sentinel](connect-squadra-secrmm.md).
1281
-
1282
1252
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
The Symantec ICDx data connector connects Symantec security solutions logs to Azure Sentinel. For more information, see [Connect your Symantec ICDx appliance](connect-symantec.md).
1306
-
1307
-
For more information about connecting to Azure Sentinel, see [Connect Symantec ICDx to Azure Sentinel](connect-symantec.md).
1308
-
1309
1274
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
@@ -1361,10 +1325,6 @@ For more information about connecting to Azure Sentinel, see [Connect Symantec I
1361
1325
1362
1326
## Trend Micro TippingPoint (Preview)
1363
1327
1364
-
The Trend Micro TippingPoint data connector connects TippingPoint SMS IPS events to Azure Sentinel.
1365
-
1366
-
For more information about connecting to Azure Sentinel, see [Connect Trend Micro TippingPoint to Azure Sentinel](connect-trend-micro-tippingpoint.md).
1367
-
1368
1328
| Data ingestion method: | [Common Event Format (CEF)](connect-common-event-format.md) over Syslog, with a Kusto functionparser|
1369
1329
| --- | --- |
1370
1330
|**Log Analytics table(s)**| CommonSecurityLog |
@@ -1486,18 +1446,28 @@ For more information about connecting to Azure Sentinel, see [Connect Trend Micr
1486
1446
1487
1447
## Zimperium Mobile Thread Defense (Preview)
1488
1448
1489
-
Zimperium Mobile Threat Defense data connector connects the Zimperium threat log to Azure Sentinel to view dashboards, create custom alerts, and improve investigation. This connector gives you more insight into your organization's mobile threat landscape and enhances your security operation capabilities. For more instructions, see the [Zimperium customer support portal](https://support.zimperium.com/).
1449
+
Zimperium Mobile Threat Defense data connector connects the Zimperium threat log to Azure Sentinel to view dashboards, create custom alerts, and improve investigation. This connector gives you more insight into your organization's mobile threat landscape and enhances your security operation capabilities. For more instructions, see the .
1490
1450
1491
1451
For more information about connecting to Azure Sentinel, see [Connect Zimperium to Azure Sentinel](connect-zimperium-mtd.md).
1492
1452
1493
1453
| Data ingestion method: | [REST-API](connect-rest-api-template.md) |
0 commit comments