How to Parse/Extract data that is in 'SyslogMessage' field in MS Sentinel ?

AzureSent-0127 41 Reputation points
2022-01-10T20:23:16.43+00:00
  • I have recently integrated and ingested Syslog data to MS Sentinel. Unfortunately there is a field named "SyslogMessage" that appears to be NOT parsed.
  • How do I parse the data that is in "SyslogMessage" field and turn them into their own fields/columns?
  • Would this be better to fix from the Azure side or from the server itself ?
    • Example:

163722-screen-shot-2022-01-10-at-31034-pm.png

Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
982 questions
{count} votes

Accepted answer
  1. Andrew Blumhardt 9,496 Reputation points Microsoft Employee
    2022-01-10T21:11:13.417+00:00

    The format of the Syslog message will vary by device vendor. The built-in alert rules and workbooks will parse this data as needed.

    For your own hunting a Syslog parser usually begins by filtering out messages from a specific vendor. Then a series or parse() or split() operations are used to break the message down into more useful columns. These queries are typically saved as a user KQL function for easier reuse.

    You might try checking the Sentinel GitHub repo for parser examples. There are also several analytic rules that have good Syslog parser examples.

    I also recommend looking into the Sentinel ASIM project. This is an effort to improve Sentinel data normalization. Initially the project has produced several functions than can be used in the place of a table to render parsed tables. https://learn.microsoft.com/en-us/azure/sentinel/normalization

    2 people found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful