Azure-Sentinel/Parsers/ASimProcessEvent
Varun Kohli 79c43b62e7
Vmware Carbon Black Parser Changes (#9589)
* NetworkParserChange

* [ASIM Parsers] Generate deployable ARM templates from KQL function YAML files.

* Process Parser Changes

* [ASIM Parsers] Generate deployable ARM templates from KQL function YAML files.

* minor changes

* [ASIM Parsers] Generate deployable ARM templates from KQL function YAML files.

* minor fixes

* [ASIM Parsers] Generate deployable ARM templates from KQL function YAML files.

---------

Co-authored-by: github-actions[bot] <>
2023-12-12 18:46:19 +05:30
..
ARM Vmware Carbon Black Parser Changes (#9589) 2023-12-12 18:46:19 +05:30
Parsers Vmware Carbon Black Parser Changes (#9589) 2023-12-12 18:46:19 +05:30
test Fixed the suggeated review2 changes. 2023-11-03 15:52:33 +05:30
README.md Update README.md to reflect namechange 2023-10-30 15:55:51 +01:00

README.md

Advanced Security Information Model (ASIM) ProcessEvent parsers

This folder includes the the Advanced Security Information Model (ASIM) ProcessEvent parsers. The parsers are provided in YAML and in ARM template formats. The latter can be used to deploy the parsers, while the former is provided for educational purposes.

The Advanced Security Information Model (ASIM) enables you to use and create source-agnostic content, simplifying your analysis of the data in your Microsoft Sentinel workspace.

For more information, see:


Deploy to Azure


Parsers

This template deploys the following parsers:

  • Source agnostic parsers:

    • imProcessEvent - Process events from all normalized process events sources
    • imProcessCreate - Process creation events from all normalized process events sources
    • imProcessTerminate - Process termination events from all normalized process events sources
    • vimProcessEmpty - Empty ASim Process table
  • Source specific parsers:

    • Microsoft 365 Defender for Endpoints - vimProcessEventMicrosoft365D
    • Sysmon for Windows (Events 1 and 5) - vimProcessCreateMicrosoftSysmon, vimProcessTerminateMicrosoftSysmon
    • Sysmon for Linux - vimProcessCreateLinuxSysmon, vimProcessTerminateLinuxSysmon
    • Windows Security Events, collecting using the Log Analytics Agent or Azure Monitor Agent - vimProcessCreateMicrosoftSecurityEvents, vimProcessTerminateMicrosoftSecurityEvents
    • Windows Events collecting using the Azure Monitor Agent - vimProcessCreateMicrosoftWindowsEvents, vimProcessCreationMicrosoftWindowsEvents. Note that those are the same original events as Windows Security events, but collected to the WindowsEvent table, for example when collecting using Windows Event Forwarding.
    • Microsoft Defender for IoT - Endpoint (MD4IoT) - vimProcessEventMD4IoT

Analytics rules

By deploying these parsers, you enable the following out of the box Analytic Rules to work with ASIM:

Hunting queries

By deploying these parsers, you enable the following out of the box Hunting Queries to work with ASIM: