Редагувати

Поділитися через


AIShield connector for Microsoft Sentinel

AIShield connector allows users to connect with AIShield custom defense mechanism logs with Microsoft Sentinel, allowing the creation of dynamic Dashboards, Workbooks, Notebooks and tailored Alerts to improve investigation and thwart attacks on AI systems. It gives users more insight into their organization's AI assets security posturing and improves their AI systems security operation capabilities.

This is autogenerated content. For changes, contact the solution provider.

Connector attributes

Connector attribute Description
Log Analytics table(s) AIShield_CL
Data collection rules support Not currently supported
Supported by AIShield

Query samples

Get all incidents order by time

AIShield
         
| order by TimeGenerated desc 

Get high risk incidents

AIShield
         
|  where Severity =~ 'High'

Prerequisites

To integrate with AIShield make sure you have:

  • Note: Users should have utilized AIShield SaaS offering to conduct vulnerability analysis and deployed custom defense mechanisms generated along with their AI asset. Click here to know more or get in touch.

Vendor installation instructions

Note

This data connector depends on a parser based on a Kusto Function to work as expected AIShield which is deployed with the Microsoft Sentinel Solution.

IMPORTANT: Before deploying the AIShield Connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).

Next steps

For more information, go to the related solution in the Azure Marketplace.