[Recommended] Netwrix Auditor via AMA connector for Microsoft Sentinel
Netwrix Auditor data connector provides the capability to ingest Netwrix Auditor (formerly Stealthbits Privileged Activity Manager) events into Microsoft Sentinel. Refer to Netwrix documentation for more information.
Connector attributes
Connector attribute | Description |
---|---|
Kusto function alias | NetwrixAuditor |
Kusto function url | https://aka.ms/sentinel-netwrixauditor-parser |
Log Analytics table(s) | CommonSecurityLog |
Data collection rules support | Azure Monitor Agent DCR |
Supported by | Microsoft Corporation |
Query samples
Netwrix Auditor Events - All Activities.
NetwrixAuditor
| sort by TimeGenerated desc
Prerequisites
To integrate with [Recommended] Netwrix Auditor via AMA make sure you have:
- ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. Learn more
- ****: Common Event Format (CEF) via AMA and Syslog via AMA data connectors must be installed Learn more
Vendor installation instructions
Note
This data connector depends on NetwrixAuditor parser based on a Kusto Function to work as expected. This parser is installed along with solution installation.
- Secure your machine
Make sure to configure the machine's security according to your organization's security policy
Next steps
For more information, go to the related solution in the Azure Marketplace.
Aiseolas
https://aka.ms/ContentUserFeedback.
Ag teacht go luath: Le linn 2024 beimid ag cur deireadh de réir a chéile le fadhbanna GitHub mar mheicníocht aiseolais d’inneachar agus córas aiseolais nua a chur ina áit. Chun tuilleadh faisnéise a fháil féach ar :Cuir isteach agus féach ar aiseolas le haghaidh