Rediģēt

Kopīgot, izmantojot


Forescout connector for Microsoft Sentinel

The Forescout data connector provides the capability to ingest Forescout events into Microsoft Sentinel. Refer to Forescout documentation for more information.

This is autogenerated content. For changes, contact the solution provider.

Connector attributes

Connector attribute Description
Log Analytics table(s) Syslog(ForescoutEvent)
Data collection rules support Workspace transform DCR
Supported by Microsoft Corporation

Query samples

Top 10 Sources

ForescoutEvent

| summarize count() by tostring(SrcIpAddr)

| top 10 by count_

Vendor installation instructions

Note

This data connector depends on a parser based on a Kusto Function to work as expected ForescoutEvent which is deployed with the Microsoft Sentinel Solution.

Note

This data connector has been developed using Forescout Syslog Plugin version: v3.6

  1. Install and onboard the agent for Linux or Windows

Install the agent on the Server where the Forescout logs are forwarded.

Logs from Forescout Server deployed on Linux or Windows servers are collected by Linux or Windows agents.

  1. Configure the logs to be collected

Configure the facilities you want to collect and their severities.

  1. Under workspace advanced settings Configuration, select Data and then Syslog.

  2. Select Apply below configuration to my machines and select the facilities and severities.

  3. Click Save.

  4. Configure Forescout event forwarding

Follow the configuration steps below to get Forescout logs into Microsoft Sentinel.

  1. Select an Appliance to Configure.
  2. Follow these instructions to forward alerts from the Forescout platform to a syslog server.
  3. Configure the settings in the Syslog Triggers tab.

Next steps

For more information, go to the related solution in the Azure Marketplace.