User Profile
Ofer_Shezaf
Joined 7 years ago
User Widgets
Recent Discussions
Re: Searching by more than one field when using a watch list
ChristopherKerry This is what I really find challenging with Splunk. Queries are absolutely unreadable. The SPL example you brought is fast to write to the initiated but does make any sense logically, making it impossible to understand if you are not a Splunk Guru. In KQL you have to be explicit, and readable, but I don't think makes the optimization different.4.8KViews0likes3CommentsRe: Sending logs from one tenant to a different tenant Sentinel instance
pavankemi: First, it would be a large effort to just not use Lighthouse. However, any future support for cross tenant collection will also use Lighthouse (though reverse Lighthouse). So the contractual issues will have to be resolved.16KViews0likes2CommentsRe: Need Help With Azure Onboarding
msef280 : the challenge is that there is no such thing as a Sentinel license. The cost is based on actual use. As a result, we obviously need someone with the right permissions to onboard Sentinel and essentially approve the charges. Same as for example creating a VM on Azure: it costs, so someone with the right permissions is needed to create it.1.5KViews0likes0CommentsRe: Sending logs from one tenant to a different tenant Sentinel instance
pavankemi : - I would use Azure functions and not Logic Apps, as Logic Apps cost may become prohibitive. - It is not a simple project. We have customers doing that, but there is an inherent effort both in the custom connectors and modifying queries to work with it. Also, with custom connectors free sources are no longer free. To try to best help: why do you need to move all data to a central tenant?16KViews0likes4CommentsRe: Exclude IN Azure Sentinel
How about this? SecurityIncident | extend product = tostring(AdditionalData.alertProductNames[0]) | where product !in ("Microsoft Cloud App Security") | extend summarizeby = iff(product == "Azure Sentinel", Title, product) | summarize count() by summarizeby | sort by count_4.3KViews0likes1CommentRe: Azure Sentinel with ASC and exsiting workspace
avirat20 To the specific question about ASC and Azure Sentinl: you should use the same workspace. ASC itself does not use the workspace, and the value stems from Sentinel features. What you may want to do, is split none security data to a seperate workspace for cost reasons. This would imply dual homing.1.4KViews0likes0CommentsRe: Azure Sentinel for On premises without MMA agent
kausiktsi : as CliveWatson stated, remove collection is currently possible only for Linux and other systems supporting Syslog (which would exclude Windows). See here for details. Remote collection for Windows is planned in the near future.3KViews0likes0CommentsRe: Sentinel Connectors - Flat files, ODBC, IBMi
AzureHacki : For databases, in case your database is on-prem rather than a cloud service, I think that the best option would be Logstash. It might also be a good alternative for files. For IBM, it seems that iSeries supports CEF (see here). Also, zSecure supports CEF as outlined in what's new for zSecure V2.3.03.1KViews1like1CommentRe: Playbook (Logic App) - trigger - When Azure Sentinel incident creation rule was triggered
PrashTechTalk : I am not aware that the private preview does not work. That said, the feature will be supported as part of a larger motion to enhance Sentinel automation, called automatoin rules, which is entering private preview as we speak.11KViews0likes13CommentsRe: Multiple Log analytic workspace and rules
cklonger : GaryBushey's answer is the best practice. However: - It is recommended, by Sentinel and by Log Analytics, to keep all logs in a centralized worksapce. - You can run a rule across worksapces using cross-workspace queries, however you will have to modify the built in rules and some features such as investigation are limited with such rules.6KViews1like1Comment