Мигриране към среща на върха за иновации:
Научете как мигрирането и модернизирането към Azure може да повиши производителността, устойчивостта и защитата на вашия бизнес, което ви позволява да прегърнете напълно ИИ.Регистрирайте се сега
Този браузър вече не се поддържа.
Надстройте до Microsoft Edge, за да се възползвате от най-новите функции, актуализации на защитата и техническа поддръжка.
High severity findings summarized by activity type
Kusto
AWSGuardDuty
| where Severity > 7
| summarizecount() by ActivityType
Top 10 rejected actions of type IPv4
Kusto
AWSVPCFlow
| where Action == "REJECT"
| where Type == "IPv4"
| take10
User creation events summarized by region
Kusto
AWSCloudTrail
| where EventName == "CreateUser"
| summarizecount() by AWSRegion
Prerequisites
To integrate with Amazon Web Services S3 make sure you have:
Environment: you must have the following AWS resources defined and configured: S3, Simple Queue Service (SQS), IAM roles and permissions policies, and the AWS services whose logs you want to collect.
Vendor installation instructions
Set up your AWS environment
There are two options for setting up your AWS environment to send logs from an S3 bucket to your Log Analytics Workspace:
Add connection
Next steps
For more information, go to the related solution in the Azure Marketplace.
Use the AWS connector to delegate Microsoft Sentinel access to AWS resource logs, creating a trust relationship between Amazon Web Services and Microsoft Sentinel.
Use the Amazon Web Services (AWS) S3-based Web Application Firewall (WAF) connector to ingest AWS WAF logs, collected in AWS S3 buckets, to Microsoft Sentinel.