Forescout connector for Microsoft Sentinel
The Forescout data connector provides the capability to ingest Forescout events into Microsoft Sentinel. Refer to Forescout documentation for more information.
This is autogenerated content. For changes, contact the solution provider.
Connector attributes
Connector attribute | Description |
---|---|
Log Analytics table(s) | Syslog(ForescoutEvent) |
Data collection rules support | Workspace transform DCR |
Supported by | Microsoft Corporation |
Query samples
Top 10 Sources
ForescoutEvent
| summarize count() by tostring(SrcIpAddr)
| top 10 by count_
Vendor installation instructions
Note
This data connector depends on a parser based on a Kusto Function to work as expected ForescoutEvent which is deployed with the Microsoft Sentinel Solution.
Note
This data connector has been developed using Forescout Syslog Plugin version: v3.6
- Install and onboard the agent for Linux or Windows
Install the agent on the Server where the Forescout logs are forwarded.
Logs from Forescout Server deployed on Linux or Windows servers are collected by Linux or Windows agents.
- Configure the logs to be collected
Configure the facilities you want to collect and their severities.
Under workspace advanced settings Configuration, select Data and then Syslog.
Select Apply below configuration to my machines and select the facilities and severities.
Click Save.
Configure Forescout event forwarding
Follow the configuration steps below to get Forescout logs into Microsoft Sentinel.
- Select an Appliance to Configure.
- Follow these instructions to forward alerts from the Forescout platform to a syslog server.
- Configure the settings in the Syslog Triggers tab.
Next steps
For more information, go to the related solution in the Azure Marketplace.