[Recommended] Netwrix Auditor via AMA connector for Microsoft Sentinel
Netwrix Auditor data connector provides the capability to ingest Netwrix Auditor (formerly Stealthbits Privileged Activity Manager) events into Microsoft Sentinel. Refer to Netwrix documentation for more information.
Connector attributes
Connector attribute | Description |
---|---|
Kusto function alias | NetwrixAuditor |
Kusto function url | https://aka.ms/sentinel-netwrixauditor-parser |
Log Analytics table(s) | CommonSecurityLog |
Data collection rules support | Azure Monitor Agent DCR |
Supported by | Microsoft Corporation |
Query samples
Netwrix Auditor Events - All Activities.
NetwrixAuditor
| sort by TimeGenerated desc
Prerequisites
To integrate with [Recommended] Netwrix Auditor via AMA make sure you have:
- ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. Learn more
- ****: Common Event Format (CEF) via AMA and Syslog via AMA data connectors must be installed Learn more
Vendor installation instructions
Note
This data connector depends on NetwrixAuditor parser based on a Kusto Function to work as expected. This parser is installed along with solution installation.
- Secure your machine
Make sure to configure the machine's security according to your organization's security policy
Next steps
For more information, go to the related solution in the Azure Marketplace.
Feedback
https://aka.ms/ContentUserFeedback.
Kommer snart: I hele 2024 udfaser vi GitHub-problemer som feedbackmekanisme for indhold og erstatter det med et nyt feedbacksystem. Du kan få flere oplysninger under:Indsend og få vist feedback om