Microsoft Sentinel data connectors (2024)

  • Article
  • Applies to:
    Microsoft Sentinel in the Azure portal, Microsoft Sentinel in the Microsoft Defender portal

After you onboard Microsoft Sentinel into your workspace, use data connectors to start ingesting your data into Microsoft Sentinel. Microsoft Sentinel comes with many out of the box connectors for Microsoft services, which integrate in real time. For example, the Microsoft Defender XDR connector is a service-to-service connector that integrates data from Office 365, Microsoft Entra ID, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps.

Built-in connectors enable connection to the broader security ecosystem for non-Microsoft products. For example, use Syslog, Common Event Format (CEF), or REST APIs to connect your data sources with Microsoft Sentinel.

Note

For information about feature availability in US Government clouds, see the Microsoft Sentinel tables in Cloud feature availability for US Government customers.

Important

Microsoft Sentinel is now generally available within the Microsoft unified security operations platform in the Microsoft Defender portal. For more information, see Microsoft Sentinel in the Microsoft Defender portal.

Data connectors provided with solutions

Microsoft Sentinel solutions provide packaged security content, including data connectors, workbooks, analytics rules, playbooks, and more. When you deploy a solution with a data connector, you get the data connector together with related content in the same deployment.

The Microsoft Sentinel Data connectors page lists the installed or in-use data connectors.

  • Azure portal
  • Defender portal

To add more data connectors, install the solution associated with the data connector from the Content Hub. For more information, see the following articles:

  • Find your Microsoft Sentinel data connector
  • About Microsoft Sentinel content and solutions
  • Discover and manage Microsoft Sentinel out-of-the-box content
  • Microsoft Sentinel content hub catalog
  • Advanced Security Information Model (ASIM) based domain solutions for Microsoft Sentinel

REST API integration for data connectors

Many security technologies provide a set of APIs for retrieving log files. Some data sources can use those APIs to connect to Microsoft Sentinel.

Data connectors that use APIs either integrate from the provider side or integrate using Azure Functions, as described in the following sections.

Integration on the provider side

An API integration built by the provider connects with the provider data sources and pushes data into Microsoft Sentinel custom log tables by using the Azure Monitor Data Collector API. For more information, see Send log data to Azure Monitor by using the HTTP Data Collector API.

To learn about REST API integration, read your provider documentation and Connect your data source to Microsoft Sentinel's REST-API to ingest data.

Integration using Azure Functions

Integrations that use Azure Functions to connect with a provider API first format the data, and then send it to Microsoft Sentinel custom log tables using the Azure Monitor Data Collector API.

For more information, see:

  • Send log data to Azure Monitor by using the HTTP Data Collector API
  • Use Azure Functions to connect your data source to Microsoft Sentinel
  • Azure Functions documentation

Integrations that use Azure Functions might have extra data ingestion costs, because you host Azure Functions in your Azure organization. Learn more about Azure Functions pricing.

Agent-based integration for data connectors

Microsoft Sentinel can use agents provided by the Azure Monitor service (on which Microsoft Sentinel is based) to collect data from any data source that can perform real-time log streaming. For example, most on-premises data sources connect by using agent-based integration.

The following sections describe the different types of Microsoft Sentinel agent-based data connectors. To configure connections using agent-based mechanisms, follow the steps in each Microsoft Sentinel data connector page.

Important

The Log Analytics agent will be retired on 31 August, 2024 and succeeded by the Azure Monitor Agent (AMA). If you are using the Log Analytics agent in your Microsoft Sentinel deployment, we recommend that you start planning your migration to the AMA. For more information, see AMA migration for Microsoft Sentinel.

Syslog and Common Event Format (CEF)

You can stream events from Linux-based, Syslog-supporting devices into Microsoft Sentinel by using the Azure Monitor Agent (AMA). Log formats vary, but many sources support CEF-based formatting. Depending on the device type, the agent is installed either directly on the device, or on a dedicated Linux-based log forwarder. The AMA receives plain Syslog or CEF event messages from the Syslog daemon over UDP. The Syslog daemon forwards events to the agent internally, communicating over TCP or UDS (Unix Domain Sockets), depending on the version. The AMA then transmits these events to the Microsoft Sentinel workspace.

Here's a simple flow that shows how Microsoft Sentinel streams Syslog data.

  1. The device's built-in Syslog daemon collects local events of the specified types, and forwards the events locally to the agent.
  2. The agent streams the events to your Log Analytics workspace.
  3. After successful configuration, Syslog messages appear in the Log Analytics Syslog table, and CEF messages in the CommonSecurityLog table.

For more information, see Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel.

Custom logs

For some data sources, you can collect logs as files on Windows or Linux computers using the Log Analytics custom log collection agent.

To connect using the Log Analytics custom log collection agent, follow the steps in each Microsoft Sentinel data connector page. After successful configuration, the data appears in custom tables.

For more information, see Collect data in custom log formats to Microsoft Sentinel with the Log Analytics agent.

Service-to-service integration for data connectors

Microsoft Sentinel uses the Azure foundation to provide out-of-the-box service-to-service support for Microsoft services and Amazon Web Services.

For more information, see the following articles:

  • Connect Microsoft Sentinel to Azure, Windows, Microsoft, and Amazon services
  • Find your Microsoft Sentinel data connector

Data connector support

Both Microsoft and other organizations author Microsoft Sentinel data connectors. Each data connector has one of the following support types listed on the data connector page in Microsoft Sentinel.

Support typeDescription
Microsoft-supportedApplies to:
  • Data connectors for data sources where Microsoft is the data provider and author.
  • Some Microsoft-authored data connectors for non-Microsoft data sources.
Microsoft supports and maintains data connectors in this category according to the Microsoft Azure Support Plans.

Partners or the Community support data connectors authored by any party other than Microsoft.

Partner-supportedApplies to data connectors authored by parties other than Microsoft.

The partner company provides support or maintenance for these data connectors. The partner company can be an Independent Software Vendor, a Managed Service Provider (MSP/MSSP), a Systems Integrator (SI), or any organization whose contact information is provided on the Microsoft Sentinel page for that data connector.

For any issues with a partner-supported data connector, contact the specified data connector support contact.

Community-supportedApplies to data connectors authored by Microsoft or partner developers that don't have listed contacts for data connector support and maintenance on the data connector page in Microsoft Sentinel.

For questions or issues with these data connectors, you can file an issue in the Microsoft Sentinel GitHub community.

For more information, see Find support for a data connector.

Next steps

For more information about data connectors, see the following articles.

  • Connect your data sources to Microsoft Sentinel by using data connectors
  • Find your Microsoft Sentinel data connector
  • Resources for creating Microsoft Sentinel custom connectors

For a basic Infrastructure as Code (IaC) reference of Bicep, Azure Resource Manager, and Terraform to deploy data connectors in Microsoft Sentinel, see Microsoft Sentinel data connector IaC reference.

Microsoft Sentinel data connectors (2024)

FAQs

How many data connectors are in Sentinel? ›

In addition to its ability to optimize security operations with a cloud-native SIEM, Sentinel offers pre-built connectors for a variety of Defender products, Azure Sign-In logs, Identity Protection, and more. From this webinar, you'll gain: Insights into the five always-free data connectors for Microsoft Sentinel.

How to connect data connector in Sentinel? ›

Enable a data connector

For Microsoft Sentinel in the Defender portal, select Microsoft Sentinel > Configurations > Data connectors. Search for and select the connector. If you don't see the data connector you want, install the solution associated with it from the Content Hub. Select Open connector page.

What is the salary of Microsoft Sentinel? ›

Employees who know Azure Sentinel earn an average of ₹22.6lakhs, mostly ranging from ₹12.9lakhs per year to ₹42.4lakhs per year based on 3 profiles.

Does Microsoft Sentinel data Connectors support only Microsoft services? ›

Microsoft Sentinel uses the Azure foundation to provide out-of-the-box service-to-service support for Microsoft services and Amazon Web Services. For more information, see the following articles: Connect Microsoft Sentinel to Azure, Windows, Microsoft, and Amazon services. Find your Microsoft Sentinel data connector.

What are the 4 primary capabilities of Microsoft Sentinel? ›

It provides threat intelligence and intelligent security analytic capabilities that facilitate threat visibility, alert detection, threat response, and proactive hunting.

What is the maximum number of repository connections allowed for each Microsoft Sentinel workspace? ›

Each Microsoft Sentinel workspace is currently limited to five repository connections. Each Azure resource group is limited to 800 deployments in its deployment history.

What is the minimum number of Microsoft Sentinel workspaces that you should create? ›

A single Log Analytics workspace might be sufficient for many environments that use Azure Monitor and Microsoft Sentinel.

How do I remove a data connector in Sentinel? ›

To delete the connector, please follow the below steps.
  1. Open sentinel portal >
  2. Click on Data connectors blade at the left > Search for "Microsoft Entra ID" data connector.
  3. Click on the three dots at the right and delete it.
Jun 28, 2024

Which Microsoft Sentinel task should you use to query the collected data? ›

The task you should use when you plan to query the collected data in Microsoft Sentinel is Log Analytics queries. Microsoft Sentinel assimilates data from a plethora of sources, and these data sources can be explored through Log Analytics queries.

Is Microsoft Sentinel worth it? ›

My experience with Microsoft Sentinel has been positive. It offers excellent integration with various Microsoft services, providing robust threat detection and response capabilities. Cloud-native design ensures scalability and flexibility, while built-in AI and automation streamline incident response.

Why is Microsoft Sentinel better than Splunk? ›

Microsoft Sentinel is generally rated as being easier to use, set up, and administrate. Splunk generally gets better ratings for quality of support and ease of doing business. Most people trust Microsoft's products more, including its Network Management, Incident Management, and Security Intelligence.

What is the highest paying job at Microsoft? ›

Some of the highest wages a worker can make at Microsoft are in the job titles Principal Security Architect ($227,700), and title Principal Software Engineer ($214,192) which are the highest paying jobs at Microsoft.

What is the new name of Microsoft Sentinel? ›

Product Name Changes
Previous nameNew nameDate
Azure Security CenterMicrosoft Defender for CloudNovember 2021
Azure SentinelMicrosoft SentinelNovember 2021
Microsoft Cloud App SecurityMicrosoft Defender for Cloud AppsNovember 2021
Windows Virtual DesktopAzure Virtual DesktopJune 2021
56 more rows

Is Microsoft Sentinel a SIEM or SOAR? ›

This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed. Microsoft Sentinel, in addition to being a SIEM system, is also a platform for security orchestration, automation, and response (SOAR).

What is the difference between Microsoft Sentinel and SentinelOne? ›

The most obvious difference is their approach: Microsoft Sentinel takes a more comprehensive, holistic approach to security, while SentinelOne focuses more on your endpoints. Microsoft Sentinel specialises in threat intelligence, monitoring, and incident analysis.

How many connectors are there in Azure data Factory? ›

More than 90 built-in connectors for ingesting all your on-premises and software as a service (SaaS) data to orchestrate and monitor at scale.

Which of the following connectors are supported by the Sentinel Health data Table? ›

The SentinelHealth data table is currently supported only for the following data connectors:
  • Amazon Web Services (CloudTrail and S3)
  • Dynamics 365.
  • Office 365.
  • Microsoft Defender for Endpoint.
  • Threat Intelligence - TAXII.
  • Threat Intelligence Platforms.
Feb 11, 2024

How many native data connectors are there for Spotfire? ›

Spotfire has a native connector for Azure SQL and Azure Synapse. For using Azure AD Token Authentication or an Azure AD Personal Access Token, it is recommended to use the Custom Connector for Spotfire® to Connect to Azure SQL and Azure Synapse.

What is the sentinel data format? ›

The Sentinel-SAFE format wraps a folder containing image data in a binary data format and product metadata in XML. This flexibility allows the format to be scalable enough to represent all levels of Sentinel products. A Sentinel product refers to a directory folder that contains a collection of information.

Top Articles
Difference Between Virus, Worm and Trojan Horse - GeeksforGeeks
If a job offer is withdrawn
Top 11 Best Bloxburg House Ideas in Roblox - NeuralGamer
Matgyn
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Tlc Africa Deaths 2021
Health Benefits of Guava
Txtvrfy Sheridan Wy
2022 Apple Trade P36
Umn Biology
finaint.com
Buff Cookie Only Fans
Condogames Xyz Discord
Aberration Surface Entrances
Straight Talk Phones With 7 Inch Screen
Craigslist Mt Pleasant Sc
Persona 5 Royal Fusion Calculator (Fusion list with guide)
Dallas Mavericks 110-120 Golden State Warriors: Thompson leads Warriors to Finals, summary score, stats, highlights | Game 5 Western Conference Finals
Play It Again Sports Norman Photos
Yugen Manga Jinx Cap 19
eugene bicycles - craigslist
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
Skymovieshd.ib
O'reilly's In Mathis Texas
Healthy Kaiserpermanente Org Sign On
Google Flights To Orlando
Revelry Room Seattle
Mastering Serpentine Belt Replacement: A Step-by-Step Guide | The Motor Guy
Elanco Rebates.com 2022
Blush Bootcamp Olathe
Clearvue Eye Care Nyc
Att U Verse Outage Map
The Boogeyman Showtimes Near Surf Cinemas
Dr. John Mathews Jr., MD – Fairfax, VA | Internal Medicine on Doximity
Msnl Seeds
Woodman's Carpentersville Gas Price
Chatropolis Call Me
Stanley Steemer Johnson City Tn
Craigslist Florida Trucks
How To Upgrade Stamina In Blox Fruits
Jack In The Box Menu 2022
Achieving and Maintaining 10% Body Fat
Truck Works Dothan Alabama
From Grindr to Scruff: The best dating apps for gay, bi, and queer men in 2024
Congruent Triangles Coloring Activity Dinosaur Answer Key
Dietary Extras Given Crossword Clue
Shannon Sharpe Pointing Gif
Prologistix Ein Number
Morgan State University Receives $20.9 Million NIH/NIMHD Grant to Expand Groundbreaking Research on Urban Health Disparities
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Elizabethtown Mesothelioma Legal Question
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 6620

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.