[Deprecated] Netwrix Auditor via AMA connector for Microsoft Sentinel
Important
Log collection from many appliances and devices is now supported by the Common Event Format (CEF) via AMA, Syslog via AMA, or Custom Logs via AMA data connector in Microsoft Sentinel. For more information, see Find your Microsoft Sentinel data connector.
Netwrix Auditor data connector provides the capability to ingest Netwrix Auditor (formerly Stealthbits Privileged Activity Manager) events into Microsoft Sentinel. Refer to Netwrix documentation for more information.
This is autogenerated content. For changes, contact the solution provider.
Connector attributes
Connector attribute | Description |
---|---|
Kusto function alias | NetwrixAuditor |
Kusto function url | https://aka.ms/sentinel-netwrixauditor-parser |
Log Analytics table(s) | CommonSecurityLog |
Data collection rules support | Workspace transform DCR |
Supported by | Microsoft Corporation |
Query samples
Netwrix Auditor Events - All Activities.
NetwrixAuditor
| sort by TimeGenerated desc
Prerequisites
To integrate with [Deprecated] Netwrix Auditor via AMA make sure you have:
- ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. Learn more
- ****: Common Event Format (CEF) via AMA and Syslog via AMA data connectors must be installed Learn more
Vendor installation instructions
Note
This data connector depends on NetwrixAuditor parser based on a Kusto Function to work as expected. This parser is installed along with solution installation.
- Secure your machine
Make sure to configure the machine's security according to your organization's security policy
Next steps
For more information, go to the related solution in the Azure Marketplace.