Microsoft Defender for Identity
This pack includes Cortex XSIAM content.
Configuration on Server Side
You need to configure Microsoft for Identity to forward Syslog messages in CEF format.
To configure, follow these instructions:
- In Microsoft 365 Defender, go to Settings > Identities.
- Click Syslog notifications.
- To enable syslog notification, set the Syslog service toggle to the on position.
- Click Configure service. A pane will open where you can enter the details for the syslog service.
- Enter the following details:
- Sensor - From the drop-down list, choose the sensor that will send the alerts.
- Service endpoint and Port - Enter the IP address or fully qualified domain name (FQDN) for the syslog server and specify the port number. You can configure only one Syslog endpoint.
- Transport - Select the Transport protocol (TCP or UDP).
- Format - Select the format (RFC 3164).
- Click Send test SIEM notification and then verify the message is received in your Syslog infrastructure solution.
- Click Save.
- Once you've configured the Syslog service, you can choose which types of notifications (alerts or health issues) to send to your Syslog server.
- Additional documentation for syslog notifications is available here.
Collect Events from Vendor
In order to use the collector, use the Broker VM option.
Broker VM
To create or configure the Broker VM, use the information described here.
You can configure the specific vendor and product for this instance.
- Navigate to Settings > Configuration > Data Broker > Broker VMs.
- Right-click, and select Syslog Collector > Configure.
- When configuring the Syslog Collector, set the following values:
- vendor as vendor - microsoft
- product as product - azure_atp