Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community
SOLVED

Splunk logs on Azure Sentinel

Copper Contributor

Team please confirm whether Splunk logs can be send on Azure Sentinel if yes how and where we can see the logs.

9 Replies

@Anurag65 

 

Most customers, send the data (in my experience) from the source to one or both SIEM tools, rather than SIEM to SIEM - for which both have APIs you can use.

best response confirmed by Anurag65 (Copper Contributor)
Solution

@Anurag65 , @CliveWatson : we do see customers who prefer to reuse their existing collection infrastructure and hence send logs from a current SIEM to Sentinel. Splunk specifically supports forwarding events in CEF using the Splunk CEF app. You can also forward directly from a forwarder using Syslog.

@Ofer_Shezaf I'm more interested in seeing it go the other way, how can I send the Sentinel Alerts to Splunk?

@David Caddick: Either use the Graph Security API or A logic App playbook. The former is more straight forward, but the letter allows more control. For example you will be able to get the back events with the alert.

@Ofer_Shezaf 
Hi there. I am working my way thru the Sentinel Ninja training in preparation for being involved in a Sentinel PoC where the client wants to use their existing SPLUNK data collection as the source for Sentinel rather than establish new collector agents or even to forward from their existing collector agents.

Can you point me to any detailed explanation of the steps involved at both ends (Splunk & Azure) to get the data transfer established, so as to best showcase the strengths of Sentinel? 

Most frequently the discussions are about getting data from Azure INTO Splunk not the other way round.

Is there any way for Sentinel to access the collected raw data direct from Splunk as it seems that the CEF connector will present a filtered view of the events ... or am I missing the point?

 

Having read thru the following: 

https://docs.microsoft.com/bs-latn-ba/azure/sentinel/connect-common-event-format

and

https://docs.splunk.com/Documentation/CEFapp/2.3.0/DeployCEFapp/AboutSplunkAppforCEF

It would be great to see a worked use case of this Sentinel enrichment implementation.

@AutomationMan : I don't have a detailed guide on the topic, though it is a worthwhile topic to add to our list. As to the solution:

  • Using CEF does imply normalied data, but therefore modified. This has both advantages and disadvantages.
  • The alternative would be to stream Syslog from the forwardersd (here).
  • I am not aware of a method to stream from the indexsers sans writing a script that uses the Splunk API. 

~ Ofer

Thanks for the prompt and helpful reply Ofer :)
- Col. S

@AutomationMan i just finalised an integration to be able to export any data from splunk index to sentinel. I will share it as soon possible. 

@yokhaldi can you please share the details on how did you get logs from Splunk to Sentinel? Did you utilize the CEF to forward to Sentinel log collector or directly to Sentinel using HTTP event API?

1 best response

Accepted Solutions
best response confirmed by Anurag65 (Copper Contributor)
Solution

@Anurag65 , @CliveWatson : we do see customers who prefer to reuse their existing collection infrastructure and hence send logs from a current SIEM to Sentinel. Splunk specifically supports forwarding events in CEF using the Splunk CEF app. You can also forward directly from a forwarder using Syslog.

View solution in original post