Microsoft Sentinel Deep Dive SEPT. 2023 Update

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ย. 2023
  • The odds are against us. Bad actors and nation-states threaten our secure industries, businesses, and livelihoods. Attacks are growing in complexity, as seen with STORM-0558’s recent hack. If you’re a Microsoft partner or MSSP (Managed Security Service Provider) wanting to protect against threats, learn how to fight back with our comprehensive deep dive into Microsoft Sentinel. In three hours, learn everything you need to harness the full capabilities of Microsoft Sentinel.
    Deep Dive Pt. II: (1:04:00)
    Deep Dive Pt. III: (3:03:10)
    Deep Dive Pt. IV: (3:17:22)
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 9

  • @RalphieRoper
    @RalphieRoper 8 หลายเดือนก่อน +1

    Thanks for the video.

  • @rob8540
    @rob8540 6 หลายเดือนก่อน

    Great video with all the aspects of Sentinal , thanks

  • @user-do7nt1xm8s
    @user-do7nt1xm8s 6 หลายเดือนก่อน

    Thank you awesome video very useful! And also incredible blog! I have a technical question regarding the ingestion of CEF logs in a standard table using logstash and DCR for which I can't find any answer but I don't want to kidnap the comment section. Let me know if I can ask it to you here or somewhere else?

    • @theacademyhub
      @theacademyhub  6 หลายเดือนก่อน

      Please ask your question here.

    • @user-do7nt1xm8s
      @user-do7nt1xm8s 6 หลายเดือนก่อน

      @@theacademyhub
      Thank you for your message. My question is as follows:
      TLDR: Is it possible to utilize Logstash along with the "microsoft-sentinel-log-analytics-logstash-output-plugin" output plugin to send CEF logs to a standard table like CommonSecurityLog, without the necessity to craft a specific transformation for each log source? Similar to the way CEF-formatted logs are directed to the Azure Monitor Agent (AMA), which seamlessly ingests the logs into the appropriate location.
      Some context: We are a reasonably sized company with around 10,000 users, heavily relying on Microsoft/Azure products. Currently transitioning from Splunk to Sentinel for our SIEM needs, we encountered an issue with the limited buffer size (10 GB) of an AMA agent, which is insufficient for our daily data volume of 1 TB. Concerned about potential data loss during network hiccups due to the quickly filling buffer, we restructured our on-premises data collection architecture. We opted for Logstash using the "microsoft-sentinel-log-analytics-logstash-output-plugin," drawing inspiration from this article (learn.microsoft.com/en-us/azure/sentinel/connect-logstash-data-connection-rules).
      While successfully sending syslogs to custom tables, we are facing challenges when attempting to send CEF-formatted logs to a standard table. The result is empty entries in the table with no parsing. The data we send conforms to the format outlined in the sample file at the bottom of this page: github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/microsoft-sentinel-log-analytics-logstash-output-plugin. Although we could potentially resolve this by creating a transformation to precisely match each field, we believe this is not future-proof and not the ideal approach. Are we overlooking something?
      Despite consulting documentation and blogs, I have not found a resource addressing this specific problem. I appreciate your assistance and your valuable content. Thank you!

    • @theacademyhub
      @theacademyhub  6 หลายเดือนก่อน

      Thank you for your question. I do believe it’s possible. I would start here:
      1. Verify that your CEF logs are compliant with the CEF standard and that they include the required fields. Use learn.microsoft.com/en-us/azure/sentinel/cef-name-mapping to validate your CEF logs.
      2. Ensure Logstash has the right configuration.
      a. The input plugin should use the codec cef to parse the CEF logs.
      input {
      tcp {
      port => XYZ
      codec => cef
      }
      }
      b. Rename the CEF fields to match the CommonSecurityLog field names if you haven’t done so already. Use
      learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/commonsecuritylog as a reference.
      rename => {
      "deviceVendor" => "DeviceVendor"
      "deviceProduct" => "DeviceProduct"
      "deviceVersion" => "DeviceVersion"
      "deviceEventClassId" => "DeviceEventClassID"
      "name" => "Name"
      "severity" => "Severity"
      …so on for other fields
      }
      c. The output plugin should use “microsoft-sentinel-log-analytics-logstash-output-plugin” to send the CEF logs to
      the CommonSecurityLog table. You need to specify the log_type as CommonSecurityLog and the
      time_generated_field as end.
      log_type => "CommonSecurityLog"
      time_generated_field => "end"
      d. Restart the Logstash service and check the CommonSecurityLog table, let me know if this worked.

  • @xeverhack
    @xeverhack 7 หลายเดือนก่อน

    Great video and course, is it possible to have the slide deck?

    • @theacademyhub
      @theacademyhub  7 หลายเดือนก่อน +1

      The PPT is linked directly above the video.

  • @jari299
    @jari299 7 หลายเดือนก่อน