- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 244字
- 2021-06-30 15:08:15
Security solution integrations
Azure Sentinel is designed to work with multiple security solutions, not just those that are developed by Microsoft.
At the most basic level, log collection and analysis are possible from any system that can transmit their logs via the Syslog collectors. More detailed logs are available from those that connect via the CEF standard and servers that share Window Event logs. The preferred method, however, is to have direct integration via APIs to enable a two-way communication and help to manage the integrated solutions. More details relating to these options are included in Chapter 3, Data Collection and Management.
Common Event Format (CEF)
CEF is an industry standard format applied to Syslog messages, used by most security vendors to ensure commonality between platforms. Azure Sentinel provides integrations to easily run analytics and queries across CEF data. For a full list of Azure Sentinel CEF source configurations, review the following article at https://techcommunity.microsoft.com/t5/Azure-Sentinel/Azure-Sentinel-Syslog-CEF-and-other-3rd-party-connectors-grand/ba-p/803891.
Microsoft is continually developing integration options. At the time of writing, the list of integrated third-party solution providers includes the following:
- AWS
- Barracuda
- Checkpoint
- Cisco
- Citrix Systems Inc.
- CyberArk
- ExtraHop Networks
- F5 Networks
- Fortinet
- One Identity LLC.
- Palo Alto Networks
- Symantec
- TrendMicro
- Zscaler
As you can see from this list, many of the top security vendors are already available directly in the portal. Azure Sentinel provides the ability to connect to a range of security data sources with built-in connectors, ingest the log data, and display using pre-defined dashboards.
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- RESTful Java Web Services Security
- 黑客大曝光:無(wú)線網(wǎng)絡(luò)安全(原書第3版)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- API攻防:Web API安全指南
- CTF競(jìng)賽權(quán)威指南(Pwn篇)
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- CTF那些事兒
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- Bug Bounty Hunting Essentials
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 云計(jì)算安全防護(hù)技術(shù)
- Mastering Metasploit
- Web安全攻防從入門到精通
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)