Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register todayThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
This article lists all supported, out-of-the-box data connectors and links to each connector's deployment steps.
Important
Data connectors are available as part of the following offerings:
Solutions: Many data connectors are deployed as part of Microsoft Sentinel solution together with related content like analytics rules, workbooks, and playbooks. For more information, see the Microsoft Sentinel solutions catalog.
Community connectors: More data connectors are provided by the Microsoft Sentinel community and can be found in the Azure Marketplace. Documentation for community data connectors is the responsibility of the organization that created the connector.
Custom connectors: If you have a data source that isn't listed or currently supported, you can also create your own, custom connector. For more information, see Resources for creating Microsoft Sentinel custom connectors.
Note
For information about feature availability in US Government clouds, see the Microsoft Sentinel tables in Cloud feature availability for US Government customers.
Each data connector has its own set of prerequisites. Prerequisites might include that you must have specific permissions on your Azure workspace, subscription, or policy. Or, you must meet other requirements for the partner data source you're connecting to.
Prerequisites for each data connector are listed on the relevant data connector page in Microsoft Sentinel.
Azure Monitor agent (AMA) based data connectors require an internet connection from the system where the agent is installed. Enable port 443 outbound to allow a connection between the system where the agent is installed and Microsoft Sentinel.
Log collection from many security appliances and devices are supported by the data connectors Syslog via AMA or Common Event Format (CEF) via AMA in Microsoft Sentinel. To forward data to your Log Analytics workspace for Microsoft Sentinel, complete the steps in Ingest syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent. These steps include installing the Microsoft Sentinel solution for a security appliance or device from the Content hub in Microsoft Sentinel. Then, configure the Syslog via AMA or Common Event Format (CEF) via AMA data connector that's appropriate for the Microsoft Sentinel solution you installed. Complete the setup by configuring the security device or appliance. Find instructions to configure your security device or appliance in one of the following articles:
Contact the solution provider for more information or where information is unavailable for the appliance or device.
Filter and ingest logs in text-file format from network or security applications installed on Windows or Linux machines by using the Custom Logs via AMA connector in Microsoft Sentinel. For more information, see the following articles:
The following connectors use the current codeless connector platform but don't have a specific documentation page generated. They're available from the content hub in Microsoft Sentinel as part of a solution. For instructions on how to configure these data connectors, review the instructions available with each data connector within Microsoft Sentinel.
Codeless connector name | Azure Marketplace solution |
---|---|
Atlassian Jira Audit (using REST API) (Preview) | Atlassian Jira Audit |
Auth0 | Auth0 |
Box | Box Solution |
Cisco Meraki (using Rest API) | Cisco Meraki Events via REST API |
Ermes Browser Security Events | Ermes Browser Security for Microsoft Sentinel |
Google Cloud Platform Firewall Logs | Google Cloud Platform Firewall Logs |
Google Cloud Platform Load Balancer (including WAF aka Cloud Armour logs) (Preview) | Google Cloud Platform Load Balancer Logs (Preview) |
Okta Single Sign-On (Preview) | Okta Single Sign-On Solution |
Palo Alto Corex XDR | Palo Alto Cortex XDR CCP |
SentinelOne | SentinelOne |
Sophos Endpoint Protection (using REST API) (Preview) | Sophos Endpoint Protection Solution |
VMWare Carbon Black | VMware Carbon Black Cloud |
Workday User Activity (Preview) | Workday (Preview) |
For more information about the codeless connector platform, see Create a codeless connector for Microsoft Sentinel.
For more information, see:
Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register today