संपादित करें

इसके माध्यम से साझा किया गया


Infoblox SOC Insight Data Connector via REST API connector for Microsoft Sentinel

The Infoblox SOC Insight Data Connector allows you to easily connect your Infoblox BloxOne SOC Insight data with Microsoft Sentinel. By connecting your logs to Microsoft Sentinel, you can take advantage of search & correlation, alerting, and threat intelligence enrichment for each log.

This is autogenerated content. For changes, contact the solution provider.

Connector attributes

Connector attribute Description
Log Analytics table(s) InfobloxInsight_CL
Data collection rules support Not currently supported
Supported by Infoblox

Query samples

Return all logs involving DNS Tunneling

InfobloxInsight_CL

| where threatType_s == "DNS Tunneling"

Return all logs involving a configuration issue

InfobloxInsight_CL

| where tClass_s == "TI-CONFIGURATIONISSUE"

Return count of critical priority insights

InfobloxInsight_CL

| where priorityText_s == "CRITICAL"

| summarize dcount(insightId_g) by priorityText_s

Return each spreading insight by ThreatClass

InfobloxInsight_CL

| where isnotempty(spreadingDate_t)

| summarize dcount(insightId_g) by tClass_s

Return each Insight by ThreatFamily

InfobloxInsight_CL

| 
| summarize dcount(insightId_g) by tFamily_s

Vendor installation instructions

Workspace Keys

In order to use the playbooks as part of this solution, find your Workspace ID and Workspace Primary Key below for your convenience.

Workspace Key

Parsers

This data connector depends on a parser based on a Kusto Function to work as expected called InfobloxInsight which is deployed with the Microsoft Sentinel Solution.

SOC Insights

This data connector assumes you have access to Infoblox BloxOne Threat Defense SOC Insights. You can find more information about SOC Insights here.

Follow the steps below to configure this data connector

Next steps

For more information, go to the related solution in the Azure Marketplace.