Microsoft Sentinel
Microsoft Sentinel is a powerful SIEM that is used by many companies. Multicloud Defense supports Log Forwarding to Microsoft Sentinel to send Security Events and Traffic Log information for processing, storage, access and correlation. The information sent is in a semi-structured JSON format where the attribute-value pairs can be accessed and processed.
Requirements
In order to forward logs to Microsoft Sentinel, the following information is required:
-
Create an Azure Log Analytics Workspace.
-
Define an Azure Log Table.
Profile Parameters
Parameter |
Requirement |
Default |
Description |
---|---|---|---|
Profile Name |
Required |
A unique name to use to reference the Profile. |
|
Description |
Optional |
A description for the Profile. |
|
Destination |
Required |
Microsoft Sentinel |
The SIEM used for the Profile. |
Azure Log Analytics Workspace ID |
Required |
The ID of the Azure Log Analytics Workspace. |
|
Shared Key |
Required |
The Shared Key used to authenticate the communication. |
|
Azure Log Table Name |
Required |
Name of the Azure Log Table where the logs/events will be stored. |