

The SonicWall data connector enables you to ingest SonicWall Firewall logs from your virtual or on-prem firewalls. Use the parser to build rich monitoring workbooks and alerting in Azure Sentinel. Juniper SRX data connector enables ingestion of network traffic logs in Azure Sentinel. Use the parser to correlate ESXi data with other data in Azure Sentinel. This gives you more insight into your organization's ESXi servers and improves your security operation capabilities. The VMWare ESXi data connector enables you to ingest VMWare vSphere system logs in Azure Sentinel. This gives you more insight into your organization's cloud security and compliance posture and improves your cloud security operation capabilities. The Sophos Cloud Optix data connector allows you to easily connect Sophos Cloud Optix logs of your choice with Azure Sentinel, to view dashboards, create custom alerts, and improve investigation. Use the parser to correlate this data with other logs to examine potential security risks, diagnose configuration problems, track who signs in and when, analyze administrator activity, understand how users create and share content, and more. This includes logs for admin activity, Google drive usage, login, mobile, authorization tokens, user workspace accounts and calendar usage reports. The Google Workspace data connector enables ingestion of Google Workspace Activity events into Azure Sentinel. Furthermore, the parser enables you to easily correlate email logs with other security logs for enhanced incident tracking and automated response scenarios.

Both mail and message logs are ingested by this data connector. This data enables you to check message traceability, monitor email activity, threats, and data exfiltration by attackers and malicious insiders. Proofpoint On Demand (POD) data connector provides the capability to get Proofpoint On Demand email protection data. The XDR connector also includes two analytic rule templates to create incidents for XDR alerts depending on severity. The XDR connector comes with a workbook to help with insights into alert trends and impacted hosts. Two new data connectors for Trend Micro enable you to ingest Trend Micro TippingPoint SMS IPS events and Trend Micro XDR workbench alerts, respectively. Use the parser for Akamai to build and correlate Akamai logs with other logs to enable rich alerting and investigation experiences. The Akamai data connector provides the capability to ingest security events generated by Akamai platform into Azure Sentinel. This data connector has a parser that enables you to correlate Salesforce logs with other logs easily in Azure Sentinel to build integrated experiences. These events are from 38 logs that includes audit, files, search, and more. The Salesforce Cloud data connector enables operational events to be ingested in Azure Sentinel. These connectors enable the delivery of audit and analytical DNS server events Linux security events to Azure Sentinel in real-time.
Azure sentinel netflow windows#
NXLog brings Azure Sentinel support for both the NXLog Linux Audit System and Windows Event Tracing modules with two new data connectors that deliver Linux audit and Windows DNS Server events, respectively. Both Cisco Umbrella and Cisco Meraki, now in Public Preview, have been among the top requested data connectors in the Azure Sentinel User Voice forum. You can directly ingest Cisco Umbrella logs from AWS S3 buckets using the new Cisco Umbrella data connector. Use the new workbooks for these data sources to monitor your DNS, IP, Proxy, and Cloud Firewall logs from these products, as illustrated below. Refer to the documentation for a complete list of data connectors that you can leverage in Azure Sentinel.įour new data connectors for Cisco enable you to ingest Cisco Umbrella, Cisco Meraki, Cisco Firepower and Cisco UCS logs respectively. New workbooks and analytic rule templates, leveraging these parsers, are also available to help you monitor these new data sources and detect threats immediately. The normalized format enables better correlation of different types of data from different data sources to drive end-to-end outcomes seamlessly in security monitoring, hunting, incident investigation and response scenarios in Azure Sentinel. These data connectors include a parser that transforms the ingested data into Azure Sentinel normalized format. With these new connectors, we are continuing the momentum to enable customers to easily bring data from different products into Azure Sentinel and analyze data at cloud scale. Today, we are announcing over 30 new out-of-the-box data connectors for Azure Sentinel to enable data collection for leading security products and other clouds.
