Тёмный

Microsoft Sentinel Deep Dive SEPT. 2023 Update 

Microsoft Academy Hub
Подписаться 4,7 тыс.
Просмотров 9 тыс.
50% 1

The odds are against us. Bad actors and nation-states threaten our secure industries, businesses, and livelihoods. Attacks are growing in complexity, as seen with STORM-0558’s recent hack. If you’re a Microsoft partner or MSSP (Managed Security Service Provider) wanting to protect against threats, learn how to fight back with our comprehensive deep dive into Microsoft Sentinel. In three hours, learn everything you need to harness the full capabilities of Microsoft Sentinel.
Deep Dive Pt. II: (1:04:00)
Deep Dive Pt. III: (3:03:10)
Deep Dive Pt. IV: (3:17:22)

Опубликовано:

 

1 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 10   
@RalphieRoper
@RalphieRoper Год назад
Thanks for the video.
@rosellagold309
@rosellagold309 4 месяца назад
2 mins in and I LOVE this Video!!!!
@rob8540
@rob8540 10 месяцев назад
Great video with all the aspects of Sentinal , thanks
@VincentBenzoni-f4g
@VincentBenzoni-f4g 10 месяцев назад
Thank you awesome video very useful! And also incredible blog! I have a technical question regarding the ingestion of CEF logs in a standard table using logstash and DCR for which I can't find any answer but I don't want to kidnap the comment section. Let me know if I can ask it to you here or somewhere else?
@theacademyhub
@theacademyhub 10 месяцев назад
Please ask your question here.
@VincentBenzoni-f4g
@VincentBenzoni-f4g 10 месяцев назад
@@theacademyhub Thank you for your message. My question is as follows: TLDR: Is it possible to utilize Logstash along with the "microsoft-sentinel-log-analytics-logstash-output-plugin" output plugin to send CEF logs to a standard table like CommonSecurityLog, without the necessity to craft a specific transformation for each log source? Similar to the way CEF-formatted logs are directed to the Azure Monitor Agent (AMA), which seamlessly ingests the logs into the appropriate location. Some context: We are a reasonably sized company with around 10,000 users, heavily relying on Microsoft/Azure products. Currently transitioning from Splunk to Sentinel for our SIEM needs, we encountered an issue with the limited buffer size (10 GB) of an AMA agent, which is insufficient for our daily data volume of 1 TB. Concerned about potential data loss during network hiccups due to the quickly filling buffer, we restructured our on-premises data collection architecture. We opted for Logstash using the "microsoft-sentinel-log-analytics-logstash-output-plugin," drawing inspiration from this article (learn.microsoft.com/en-us/azure/sentinel/connect-logstash-data-connection-rules). While successfully sending syslogs to custom tables, we are facing challenges when attempting to send CEF-formatted logs to a standard table. The result is empty entries in the table with no parsing. The data we send conforms to the format outlined in the sample file at the bottom of this page: github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/microsoft-sentinel-log-analytics-logstash-output-plugin. Although we could potentially resolve this by creating a transformation to precisely match each field, we believe this is not future-proof and not the ideal approach. Are we overlooking something? Despite consulting documentation and blogs, I have not found a resource addressing this specific problem. I appreciate your assistance and your valuable content. Thank you!
@theacademyhub
@theacademyhub 10 месяцев назад
Thank you for your question. I do believe it’s possible. I would start here: 1. Verify that your CEF logs are compliant with the CEF standard and that they include the required fields. Use learn.microsoft.com/en-us/azure/sentinel/cef-name-mapping to validate your CEF logs. 2. Ensure Logstash has the right configuration. a. The input plugin should use the codec cef to parse the CEF logs. input { tcp { port => XYZ codec => cef } } b. Rename the CEF fields to match the CommonSecurityLog field names if you haven’t done so already. Use learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/commonsecuritylog as a reference. rename => { "deviceVendor" => "DeviceVendor" "deviceProduct" => "DeviceProduct" "deviceVersion" => "DeviceVersion" "deviceEventClassId" => "DeviceEventClassID" "name" => "Name" "severity" => "Severity" …so on for other fields } c. The output plugin should use “microsoft-sentinel-log-analytics-logstash-output-plugin” to send the CEF logs to the CommonSecurityLog table. You need to specify the log_type as CommonSecurityLog and the time_generated_field as end. log_type => "CommonSecurityLog" time_generated_field => "end" d. Restart the Logstash service and check the CommonSecurityLog table, let me know if this worked.
@jari299
@jari299 11 месяцев назад
@ninocrudele
@ninocrudele 11 месяцев назад
Great video and course, is it possible to have the slide deck?
@theacademyhub
@theacademyhub 11 месяцев назад
The PPT is linked directly above the video.
Далее
Understanding Azure Arc
57:49
Просмотров 1 тыс.
Microsoft Sentinel in just 30 minutes
36:20
Просмотров 27 тыс.
# Rural Funny Life Wang Ge
00:18
Просмотров 774 тыс.
I Took An iPhone 16 From A POSTER! 😱📱 #shorts
00:18
Get Started with Azure Sentinel
18:22
Просмотров 41 тыс.
What’s New and What’s Next in Defender for Servers?
57:04
Microsoft Sentinel and Defender XDR Demo
1:00:17
Просмотров 1,5 тыс.
Goodbye VPN! Hello Microsoft Global Secure Access
19:40
What’s New in Azure Sentinel Automation
58:10
Просмотров 2,3 тыс.
Want to get started with Microsoft Defender for Cloud?
40:20