AIShield connector for Microsoft Sentinel
AIShield connector allows users to connect with AIShield custom defense mechanism logs with Microsoft Sentinel, allowing the creation of dynamic Dashboards, Workbooks, Notebooks and tailored Alerts to improve investigation and thwart attacks on AI systems. It gives users more insight into their organization's AI assets security posturing and improves their AI systems security operation capabilities.
This is autogenerated content. For changes, contact the solution provider.
Connector attributes
Connector attribute | Description |
---|---|
Log Analytics table(s) | AIShield_CL |
Data collection rules support | Not currently supported |
Supported by | AIShield |
Query samples
Get all incidents order by time
AIShield
| order by TimeGenerated desc
Get high risk incidents
AIShield
| where Severity =~ 'High'
Prerequisites
To integrate with AIShield make sure you have:
- Note: Users should have utilized AIShield SaaS offering to conduct vulnerability analysis and deployed custom defense mechanisms generated along with their AI asset. Click here to know more or get in touch.
Vendor installation instructions
Note
This data connector depends on a parser based on a Kusto Function to work as expected AIShield which is deployed with the Microsoft Sentinel Solution.
IMPORTANT: Before deploying the AIShield Connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
Next steps
For more information, go to the related solution in the Azure Marketplace.