Azure-Sentinel/DataConnectors
v-rucdu ba0ca4a6f0
Merge pull request #2859 from Azure/v-maudan/SalesforceTokenUriIssue
SalesforceSentinelConnector : Token Request Url Should be Configurable
2021-08-26 12:21:54 +05:30
..
AADUserInfo Added note to note section 2021-08-13 11:39:40 -04:00
AWS-CloudTrail-AzureFunction Updated Graphic 2021-07-20 18:07:00 -07:00
AWS-CloudTrail-Ingestion-Lambda Updated AWS Lamba images 2021-07-20 15:34:17 -07:00
AWS-S3-AzureFunction Updated Image in AWS S3 Function 2021-07-20 15:30:55 -07:00
AWS-SecurityHubFindings Fixed DeployToAzure ARM Template 2021-06-18 13:55:47 -07:00
Agari SEN-1: Fix missing BP data 2021-07-06 13:16:34 -07:00
AkamaiSecurityEvents Cosmetic Changes for CEF connector 2021-01-21 22:04:12 +05:30
ApacheHTTPServer Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Aruba ClearPass Update Connector_Syslog_ArubaClearPass.json 2021-01-29 18:47:23 +05:30
AtlassianConfluenceAudit Zip file update 2021-04-05 14:49:56 +05:30
AtlassianJiraAudit Changed Preview status to 1 2021-03-31 11:44:51 +05:30
AzureStorage Moved location 2020-04-17 09:57:46 +01:00
CEF add ubuntu 20 to supported OS list 2021-05-20 16:35:59 +03:00
CEF-VMSS Add loop to wait for extension installs 2021-07-28 16:40:44 +00:00
CIsco Meraki Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Cisco UCS Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
CiscoFirepower Change in connector file 2021-04-30 13:38:07 +05:30
CiscoUmbrella Cisco Umbrella - fix US Gov changes (#1855) 2021-03-03 09:40:42 -08:00
CyclancePROTECT Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
DocuSign-SecurityEvents Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
Duo Security Move New Community Content to Proper Location 2021-06-10 10:41:18 -07:00
ESET Enterprise Inspector remove import 2021-03-05 11:29:05 +05:30
Exabeam Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Fluentd-VMSS Add loop to wait for extension installs 2021-07-28 16:40:44 +00:00
GitHub Fixed the Deploy to Azure Button 2021-07-26 17:58:58 +01:00
GithubFunction Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
GoogleWorkspaceReports Update GWorkspaceReports_API_FunctionApp.json 2021-07-29 11:09:25 +05:30
Images image updated 2020-06-08 12:06:13 -07:00
Imperva WAF Gateway Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Infoblox NIOS Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
JSON-Import/dotnet_loganalytics_json_import Added an MIT header 2020-04-02 13:11:54 +01:00
JumpCloud Single Sign On Update azuredeploy_JumpCloud_API_FunctionApp.json 2021-08-13 18:22:54 -07:00
Juniper SRX Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Logstash-VMSS Add loop to wait for extension installs 2021-07-28 16:40:44 +00:00
MCASActivityFunction Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
MCASActivityPlaybook Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
NGINX Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Netskope Update Netskope_API_FunctionApp.json 2021-02-26 19:00:00 +05:30
O365 Data Merge pull request #2475 from Azure/dicolanl-57 2021-06-23 23:23:29 -07:00
O365 DataCSharp Removed Comments from JSON File. 2020-04-23 10:04:59 +05:30
OSSEC Changed Preview status to 1 2021-03-31 11:44:51 +05:30
Okta Single Sign-On updating package with fix 2021-07-08 14:41:26 -07:00
OneLogin Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
OracleWebLogicServer Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Palo Alto Networks Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Proofpoint TAP Update ProofpointTAP_API_FunctionApp.json 2021-03-02 16:57:43 +05:30
ProofpointPOD updated zip 2021-03-04 13:25:40 -08:00
Pulse Secure Connect Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Purview Updating the sample query 2021-06-28 10:34:05 -07:00
Qualys KB Fix QualysKB Parameter Naming 2021-05-12 11:33:21 -07:00
Qualys VM Updated Qualys VM fix 2021-08-18 09:32:41 +05:30
S3-Lambda Updates per customer feedback 2020-09-10 16:21:31 -07:00
SalesforceServiceCloud updated deploy package short link 2021-08-26 11:56:33 +05:30
SentinelOne SentinelOne: change auth and fix 2021-05-20 10:14:48 +03:00
SonicWall Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Sophos Cloud Optix Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Sophos XG Firewall Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Squid Proxy Fix failing validation 2021-06-04 18:42:12 +05:30
Symantec DLP Cosmetic Changes for CEF connector 2021-01-21 22:04:12 +05:30
Symantec VIP Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
SymantecProxySG Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Templates Merge pull request #2415 from Azure/v-rucdu/EventConnectorTemplate 2021-07-25 14:32:59 -07:00
Tomcat Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
Trend Micro Merge branch 'Azure:master' into Trend-Micro-Rebrand 2021-06-08 21:02:29 -05:00
UniFiSG Unifi Security Gateway Connector (#1096) 2021-06-01 11:19:21 -07:00
VMware Carbon Black Added pagination to VmwareCarbonBlack connector 2021-05-21 14:57:11 +05:30
VMware ESXi Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
WorkplaceFacebook Removed unwanted encoded character from Additional Requirement banner 2021-04-06 19:30:09 +05:30
ZPA zpa - update connector and parser 2021-06-08 17:17:21 +03:00
Zoom Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
ZoomReports Changed Preview status to 1 2021-03-31 11:44:51 +05:30
microsoft-logstash-output-azure-loganalytics update logstsh docs with support details 2021-05-03 10:15:06 +03:00
pfsense workbook, connector, parsers 2021-03-02 22:23:45 +00:00
AIA-Darktrace.json Update AIA-Darktrace.json 2021-03-15 10:18:29 -07:00
AIVectraDetect.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
AlsidForAD.json Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
BETTERMTD.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Beyond Security beSECURE.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Citrix_WAF.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
CognniSentinelConnector.json Changed Preview status to 1 2021-03-31 11:44:51 +05:30
Connector_syslog_WatchGuardFirebox.json Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30
CyberArk Data Connector.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
CyberpionSecurityLogs.json Changed Preview status to 1 2021-03-31 11:44:51 +05:30
FORCEPOINT_NGFW.json Update workbook metadata 2021-03-20 00:14:11 -07:00
Forcepoint CASB.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Forcepoint DLP.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
ForcepointCloudSecurityGateway.json Changed Preview status to 1 2021-03-31 11:44:51 +05:30
ForgeRock_CEF.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Morphisec.json Update Morphisec.json 2021-01-15 14:22:26 +05:30
NXLogBSMmacOS.json Replaced encoded special character with ' 2021-03-31 15:18:25 +05:30
NXLogDnsLogs.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
NXLogLinuxAudit.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
OnapsisPlatform.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
OrcaSecurityAlerts.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Perimeter81ActivityLogs.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
ReadMe.md Update ReadMe.md 2021-01-05 13:46:08 -08:00
SquadraTechnologies.SecRMM.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
SquadraTechnologiesLogo.svg add logo file 2020-02-12 17:27:06 -08:00
ThycoticSecretServer_CEF.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
TrendMicroDeepSecurity.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
TrendMicroTippingPoint.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
WireXsystemsNFP(1b).json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
Zimperium MTD Alerts.json Update workbook metadata 2021-03-20 00:14:11 -07:00
alcide_kaudit.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
esetSmc.json cosmetic changes for REST API Connectors 2021-01-29 14:25:11 +05:30
illusive Attack Management System.json Metadata changes for Template & existing connectors (#1842) 2021-03-12 13:36:48 -08:00
template_BarracudaCloudFirewall.JSON Removed all references of Advanced settins blade 2021-06-04 18:33:22 +05:30

ReadMe.md

Guide to Building Azure Sentinel Data Experiences

This guide provides an overview of the different data connectivity options providers can enable in Azure Sentinel for customers with specific focus on build, validation steps and publishing process. Furthermore, the document covers technical details on opportunities to enable richer Azure Sentinel experiences.

Bring your data in Azure Sentinel

Bring your data to Azure Sentinel

  1. Choose the data connector type – Provider decides on the connector type planned to be built, depending on the planned customer experience and the existing ingestion mechanism(s) supported by the provider data source
  2. Send data to Azure Sentinel – Provider follows the specific steps for the applicable data connector to establish the pipeline setup as POC, validate and see the data flow in Azure Sentinel
  3. Build the connector – Provider builds the connector using templates and guidance, validates and submits the data connector with query samples and documentation
  4. Validate and sign off in production – Microsoft will deploy the connector after which provider validates the connector from an E2E customer standpoint in production under limited view before customers can discover the connector
  5. Connector ships in public preview – After provider signs off, Microsoft switches the connector to public preview - customers can discover the data connector in the gallery and try it

Evolve your data experience

Provider can build workbooks, analytic data templates, hunting queries, investigation graph queries, logic app connectors, playbooks and more for an enhanced customer experience while using provider's data connector in Azure Sentinel as illustrated below. Refer to details in evolve the data experience.

Evolve the data experience

Bring your data in Azure Sentinel

Choose the data connector type

There are three types of data connectors providers can build to stream their data into Azure Sentinel.

The following table lists these and provides a high-level overview to help providers decide.

Sentinel Log Ingestion Format Customer Experience Why choose?
CEF (Preferred)
  • Log information is automatically ingested into standard CEF schema.
  • KQL Queries use strongly typed and well-known CEF schema.
  • Little or no additional parsing required by your customers
  • Your data will be meaningful to many queries.
  • Multi-step configuration - Customer needs to set up a machine / Azure VM to run an agent to push logs into Sentinel
CEF results in the best query and analytics experience in Sentinel as it will appear as the well know CEF (CommonSecurityLog) schema as columns in the Sentinel Log tables.
REST API
  • Log information is automatically ingested into custom tables with your schema.
  • Custom queries required to use your data.
  • Customer must learn your schema.
  • Simple configuration - Customer does not need to set up a machine / Azure VM to run the agent
When you have data that does not conform to CEF or RAW Syslog formats you can create custom tables.

You want strict control over schema mapping and column names in Sentinel tables on how you present your data.

Syslog (Least preferred)
  • RAW Syslog information is automatically ingested into simple log schema with a simple string.
  • Queries are more complex as customers will need to parse the syslog messages using KQL Functions.
  • Multi-step configuration - Customer needs to set up a machine / Azure VM to run an agent to push logs into Sentinel
You only can emit RAW Syslog at this point.

Send Data to Azure Sentinel

Once you have decided on the type of data connector you plan to support, set the pipeline to send this data to Azure Sentinel as a POC before building the connector. The process is described for each data connector type. Once you have a POC, send an email to AzureSentinelPartner@microsoft.com for the POC demo.

REST API Connectors

  1. Use the Azure Monitor Data Collector API to send data to Azure Log Analytics. This blog covers step by step instructions with screenshots to do so. If on prem, open port 443 (HTTPS/TLS) on your environment to talk to Azure Sentinel.
  2. Ensure the schema used for structuring the data in Log Analytics is locked. Any changes to the schema after the data connector is published will have a compatibility impact, hence need to have a new name for the connector data type.
  3. Design a configuration mechanism in your product experience via product settings or via your product website, where your customers can go and enter the following information to send their logs into Log Analytics for Azure Sentinel.
    1. [Required] Azure Sentinel workspace ID
    2. [Required] Azure Sentinel primary key
    3. [Optional] Custom log name
    4. Any other specific dependency that may be needed to successfully establish connectivity
  4. These logs will appear in a Custom Log Analytics table CustomLogs -> <log name> where the log name is what the customer provides in the above-mentioned step. Identify a default log name to handle the scenario where customer does not enter the custom log name.
  5. Design and validate a few key queries that lands the value of the data stream using Kusto Query Language. Share these as sample queries in the data connector.

Example connectors to refer to : Symantec, Barracuda WAF

Connector Validation Steps

  1. Test the actual customer experience and validate if data flows as expected and appears in the expected Azure Sentinel Log Analytics custom table provided.
  2. If on prem, open port 443 (HTTPS/TLS) on your environment to talk to Azure Sentinel. Ensure this is documented in connector documentation (steps in following section) for your customers.
  3. From a data quality perspective,
    1. Ensure the data you send is complete and contains the same fields available in your product.
    2. Ensure the data is valid and easy to query using Log Analytics.

CEF Connector

To enable the CEF connector deploy a dedicated proxy Linux machine (VM or on premises) to support the communication between your security solution (the product that sends the CEF messages) and Azure Sentinel.

Enable the CEF connector as follows:

  1. Go to Azure Sentinel
  2. Open the Data Connectors page and choose the relevant connector and click Open connector page
  3. Follow the CEF instructions below (also in the CEF connector documentation).

1. Install and configure Linux Syslog agent

Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Azure Sentinel.

1.1 Select a Linux machine

Select or create a Linux machine that Azure Sentinel will use as the proxy between your security solution and Azure Sentinel this machine can be on your on-prem environment, Azure or other clouds.

1.2 Install the CEF collector on the Linux machine

Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Azure Sentinel workspace.

Note:

  1. Make sure that you have Python on your machine using the following command:

     python –version
    
  2. You must have elevated permissions (sudo) on your machine

    Run the following command to install and apply the CEF collector:

     sudo wget https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef\_installer.py&&sudo python cef\_installer.py [WorkspaceID]_ [Workspace Primary Key]
    

2. Forward Common Event Format (CEF) logs to Syslog agent

2.1 Set your security solution to send Syslog messages in CEF format to the proxy machine. This varies from product to product and follow the process for your product. There are couple of ways to choose from pushing your logs

  1. The agent can collect logs from multiple sources but must be installed on dedicated machine per the following diagram collect logs
  2. Alternatively, you can deploy the agent manually on an existing Azure VM, on a VM in another cloud, or on an on-premises machine as shown in the diagram below deploy agent 2.2 Make sure to send the logs to port 514 TCP on the machine's IP address.

2.3 Outline specific steps custom for sending your product logs along with link to your (partner) product documentation on how customers should configure their agent to send CEF logs from the respective product into Azure Sentinel.

Example connectors to refer to : ZScaler

Connector Validation Steps

Follow the instructions to validate your connectivity:

  1. Open Log Analytics to check if the logs are received using the CommonSecurityLog schema. Note: It may take about 20 minutes until the connection streams data to your workspace.

  2. If the logs are not received, run the following connectivity validation script:

    1. Note:
      1. Make sure that you have Python on your machine using the following command:

        python –version

      2. You must have elevated permissions (sudo) on your machine
    2. sudo wget https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py [WorkspaceID]
  3. From a data quality perspective,

    1. Ensure the data you send is complete and contains the same fields available in your product.
    2. Ensure the data is valid and easy to query using Log Analytics.
  4. Design and validate a few key queries that lands the value of the data stream using Kusto Query Language. Share these as sample queries in the data connector.

To use TLS communication between the security solution and the Syslog machine, you will need to configure the Syslog daemon (rsyslog or syslog-ng) to communicate in TLS: Encrypting Syslog Traffic with TLS - rsyslog, Encrypting log messages with TLS – syslog-ng.

Syslog Connector

Note: If your product supports CEF, the connection is more complete and you should choose CEF and follow the instructions in Connecting data from CEF and data connector building steps detailed in the CEF connector section.

  1. Follow the steps outlined in the Connecting data from Syslog to use the Azure Sentinel syslog connector to connect your product.
  2. Set your security solution to send Syslog messages to the proxy machine. This varies from product to product and follow the process for your product.
  3. Outline specific steps custom for sending your product logs along with link to your (partner) product documentation on how customers should configure their agent to send Syslog logs from the respective product into Azure Sentinel.
  4. Design and validate a few key queries that lands the value of the data stream using Kusto Query Language. Share these as sample queries in the data connector.
  5. Build a parser based on Kusto function to ensure the query building experience is easy for customers working with the data connector.

Example connectors to refer to : Barracuda CWF

Connector Validation Steps

Follow the instructions to validate your connectivity:

  1. Open Log Analytics to check if the logs are received using the Syslog schema. Note: It may take about 20 minutes until the connection streams data to your workspace.
  2. From a data quality perspective,
    1. Ensure the data you send is complete and contains the same fields available in your product.
    2. Ensure the data is valid and easily to query using Log Analytics.

Build the connector

Once you have a working POC, you are ready to build, validate the data connector user experience and submit your connector and relevant documentation.

  1. Review the data connector template guidance - This is to help get familiarized with the nomenclature used in the templates and to enable filling out the json template easily.
  2. Use the template - Download the right template for your data connector type from the following, rename the json file to ProviderNameApplianceName.json (no spaces in name) and fill out the template per the guidance mentioned above.
  3. Validate the Connector UX – Follow these steps to render and validate the connector UX you just built
    1. The test utility can be accessed by this URL - https://portal.azure.com/?feature.BringYourOwnConnector=true
    2. Go to Azure Sentinel -> Data Connectors
    3. Click the “import” button and select the json file you created as follows. Import button
    4. The json file you just created is loaded (example as follows) - Validate connector UX by ensuring all links resolve appropriately with no errors (including query links) in both the main and next steps page, check for content accuracy, grammar, typos and formatting. Update the json as needed and reload to revalidate. Validate connector

Note: This json is loaded only in your session and not shared out. The logo wont show up since its not part of the json. Connector logo will be included when Microsoft builds and deploys the data connector.

  1. Prepare sample data for validation and submission – Plan to submit some real-world, sanitized sample data for your connectors that covers all types of logs, events, alerts, etc. depending on the data type. This is the test validation set that can be used to build other contribution types on top of this data connector. The format for this file can be json / csv (json preferred) file with the column names / property names adhering to the data type property names. The data file name needs to be the same name as the data type name. Submit the sample data file via a GitHub PR to the 'Sample data' folder in the right subfolder - CEF / Syslog / Custom depending on the type of data connector.

  2. Submit your data connector - Follow the general contribution guidelines for Azure Sentinel to open a Pull Request (PR) to submit the data connector:

    1. The json file in the 'Connectors' folder
    2. The sample data file in the right subfolder of 'Sample data' folder
    3. The company logo adhering to the following requirements in the 'Logo' folder
      1. Logo needs to be in SVG format and under 5 Kb
      2. Ensure raw file of logo does not have any of the following:
        • cls and style formats
        • embedded png formats
        • xmlns:xlink
        • data-name
      3. Do not use xlink:href - use inline instead
      4. Do not use title tag
      5. If some properties in the logo have IDs (for e.g. <g id="layer0"...), then set these IDs as GUIDs so that these are uniquely identifiable across all Azure logo assets
      6. Logo scales well to fit in a 75 px square
      7. SVG code file is formatted well for readability
    4. For Syslog data connector, the Kusto function parser is in the right subfolder (PROVIDERNAME) of 'Parsers' folder
    5. If you are bringing in detections or hunting queries, requiredDataConnectors section of the YAML template must be populated. Details of what to reference in the YAML template from the connector JSON are in the Query Style Guide under requiredDataConnectors
  3. Prepare and submit your data connector documentation – Besides Azure Sentinel gallery discoverability, the connectors can also be discovered out of product in documentation.

    1. Download one of the following templates depending on the type of data connector and PROVIDER NAME APPLIANCE NAME.md and fill out the template per the guidance mentioned in the template. Replace the guidance in the template with relevant steps.
    2. Validate the md file for formatting and ensure all links resolve appropriately. You can use VS Code or any other editor that supports md file editing.
    1. Once validated, email the md file to AzureSentinelPartner@microsoft.com

Validate and sign off in production

Once the connector is deployed in production, we will share a link for you to privately access your data connector. Validate your connector:

  1. Ensure data flows as expected and the data appears in the expected format in the right Log Analytics table
  2. Ensure sample queries shared with the connector execute as expected and all the other queries that appear in the json file like the graphQueries, dataTypes etc.
  3. Validate connector UX by ensuring all links resolve appropriately with no errors (including query links) in both the main and next steps page, check for content accuracy, grammar, typos, formatting and logo rendering aspects.
  4. If you have Kusto functions included / your sample queries and workbooks take a dependency on certain Kusto function, ensure those work as expected and that dependency is called out in the connector UX (in the Configuration at the beginning and in the next steps section of the connector as a banner)

    Once everything looks as expected, send an email to AzureSentinelPartner@microsoft.com of your sign off to get your connector shipped in public preview.

Connector ships in public preview

Promote your connector to get installs and get customer feedback. Support connector issues reported by the customer. These can be in generic data flow aspects which you can handle on provider side. There may be connector UX issues or queries etc. issues that you can update by doing a PR on the respective file and inform AzureSentinelPartner@microsoft.com for deployment.

Exit criteria for connector GA

Once the data connector is in public preview for at least a month, send an email with the following info to AzureSentinelPartner@microsoft.com to get the connector to GA.

  • The data connector has at least sample queries and workbooks to visualize and use the data effectively in Azure Sentinel.
  • The data connector has at least 10 unique customers
  • No major unresolved customer reported incidents with the data connector in a month after release
  • Support for government cloud (.us in addition to .com).

Evolve the data experience

Workbooks

Follow the steps to build your workbook and submit your workbook json file, two screenshots of the workbook view one each in white and black background theme settings, logo and entry in the workbooksMetadata.json file by a PR as mentioned in the instructions.

Analytic Rule Templates

Follow the steps to build and submit your analytic rule template or detection pertaining to this data connector. Ensure to fill in the requiredDataConnectors parameter with the right data connector ID(s) to establish relation of this analytic rule template with the data connector.

Logic Apps Connectors

Build logic apps connectors to enable automation capabilities for customers in the following areas:

  1. Incident management – for e.g. assign a ticket to an analyst, keep ticket status in sync, …
  2. Enrichment and Investigation – for e.g. geo lookup for an IP, sending investigation emails, …
  3. Remediation – for e.g. block an IP address, block user access, isolate machine, …
  4. Any other automation capabilities unique to your appliance.

Follow the steps in the Azure Logic Apps building custom connectors documentation to create, certify and ship an Azure Logic App connector. This not only discoverable for Azure Sentinel customers, but also visible in the Azure Logic Apps gallery for Azure Logic Apps and Microsoft Flow customers too. Inform AzureSentinelPartner@microsoft.com if you are thinking of building a custom connector for your security appliance.

Other data experience options

Check out the Azure Sentinel GitHub repo for more information on these.