Orca Security Alerts connector for Microsoft Sentinel
The Orca Security Alerts connector allows you to easily export Alerts logs to Microsoft Sentinel.
This is autogenerated content. For changes, contact the solution provider.
Connector attributes
Connector attribute | Description |
---|---|
Log Analytics table(s) | OrcaAlerts_CL |
Data collection rules support | Not currently supported |
Supported by | Orca Security |
Query samples
Fetch all service vulnerabilities on running asset
OrcaAlerts_CL
| where alert_type_s == "service_vulnerability"
| where asset_state_s == "running"
| sort by TimeGenerated
Fetch all alerts with "remote_code_execution" label
OrcaAlerts_CL
| where split(alert_labels_s, ",") contains("remote_code_execution")
| sort by TimeGenerated
Vendor installation instructions
Follow guidance for integrating Orca Security Alerts logs with Microsoft Sentinel.
Next steps
For more information, go to the related solution in the Azure Marketplace.