Apr 05 2019 03:04 AM - edited Apr 05 2019 03:06 AM
Dear Sentinel community,
I'm wondering if anyone already explored the possibilities of integrating sentinel Alerts with other SIEM solutions.
An Example could be for customers which want to leverage Sentinel for their Azure cloud environments but still need their on Premies SIEM solutions to receive logs also from other logs sources.
One option could be to stream Sentinel Alerts to Azure EventHub and then use the EventHub as log source in the on prem SIEM. Is this something supported on Sentinel?
regards,
Manuel
Apr 05 2019 02:13 PM
Apr 07 2019 02:03 PM
SolutionHi @Manuel_DEste, great meeting you again!
Yes and no.
Forwarding alerts to an event hub is supported. You can use one of several ways:
Why no? because what you really want to send are cases and not alerts, which are automatically aggregated and reduced alerts. We are working to make sure those can be sent to a SIEM as well.
Apr 08 2019 12:54 AM
Hi @Ofer_Shezaf, great meeting you again too!
Thank you for your reply, I'll try the Security Graph API for now, I didn't know about this feature!
Feb 11 2020 11:20 AM
@Manuel_DEste / @Ofer_Shezaf , is there any update on the ability to integrate outputs from Sentinel with other SIEMs?
Thanks.
Feb 12 2020 12:09 AM
@isfleming : no updated here. That is apart from the fact that automated triggering of playbooks was released of course. What are you find lacking in the solutions above?
~ Ofer
Feb 12 2020 12:34 AM - edited Feb 12 2020 12:49 AM
@isfleming Streaming Security Graph events (Including Sentinel Incidents) to EventHub works. I believe that Pulling events from EventHub into your SIEM is supported by most SIEM vendors.
I hope anyway something like "continuous export" for Azure Security Center will be an option for Sentinel as well for easier integration and troubleshooting https://docs.microsoft.com/en-us/azure/security-center/continuous-export
Feb 12 2020 06:23 AM
@Ofer_Shezafthanks for the quick reply. I have not started working with this integration as yet. I am trying to determine what the requirements are for the data and what options there are to obtain it. Hopefully there will be nothing lacking. 🙂
Feb 12 2020 06:25 AM
@Manuel_DEste thanks!
May 07 2020 10:30 AM
@Ofer_Shezaf hey i have one question: i am new in azure sentinel, and i want to know what is the difference between using MMA agent and Using syslogs in adding 3d party ressource
thank you
May 10 2020 06:04 AM
@BMaro Syslog is used for remote collection for systems that support it (which is most networking and security systems). The MMA (or Log Analytics Agent), is our software for collecting both Syslog as well as local telemetry on the system the MMA is installed on.
May 10 2020 12:14 PM
For sending logs to other SIEMs, Sentinel might not be the best tool as most of the SIEMs have their own ways (though in many cases not very robust) of bringing logigng data from the cloud. There is also a bandwidth cost to take data out of the cloud, might be negligible for small logs but it all adds up.
However, for a subset of alerts, filtered as part of a use case (basically the output of an alert) one can get really creative. You can the available APIs (like Log Analytics REST API) to bring any kind of data from Sentinel and then send it through a logging tool like Logstash to a wide variety of destinations, including syslog, ELK, etc. I've also seen alerts being sent to other SIEMs through a specially crafter SMTP email (there is a native LogicApp connector for it).
Apr 07 2019 02:03 PM
SolutionHi @Manuel_DEste, great meeting you again!
Yes and no.
Forwarding alerts to an event hub is supported. You can use one of several ways:
Why no? because what you really want to send are cases and not alerts, which are automatically aggregated and reduced alerts. We are working to make sure those can be sent to a SIEM as well.