Skip to content

Commit a553ecc

Browse files
chore: Update Solutions Analyzer CSV files and documentation (#1)
Co-authored-by: jamos-bt <79214602+jamos-bt@users.noreply.github.com>
1 parent 35a06e5 commit a553ecc

File tree

61 files changed

+790
-2702
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+790
-2702
lines changed

Tools/Solutions Analyzer/connector-docs/connectors-index.md

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Browse all data connectors available in Microsoft Sentinel Solutions.
1212

1313
## Overview
1414

15-
This page lists **462 unique connectors** across all solutions.
15+
This page lists **463 unique connectors** across all solutions.
1616

1717
**Jump to:** [#](##) | [A](#a) | [B](#b) | [C](#c) | [D](#d) | [E](#e) | [F](#f) | [G](#g) | [H](#h) | [I](#i) | [J](#j) | [K](#k) | [L](#l) | [M](#m) | [N](#n) | [O](#o) | [P](#p) | [Q](#q) | [R](#r) | [S](#s) | [T](#t) | [V](#v) | [W](#w) | [Z](#z)
1818

@@ -1321,29 +1321,29 @@ Follow the steps to gain access to Cyborg Security's Community and setup the 'Op
13211321

13221322
---
13231323

1324-
### [Cyera DSPM Azure Functions Sentinel Data Connector](connectors/cyerafunctionsconnector.md)
1324+
### [Cyera DSPM Azure Functions Microsoft Sentinel Data Connector](connectors/cyerafunctionsconnector.md)
13251325

13261326
**Publisher:** Cyera Inc
13271327

13281328
**Solution:** [CyeraDSPM](solutions/cyeradspm.md)
13291329

13301330
**Tables (5):** `CyeraAssets_CL`, `CyeraAssets_MS_CL`, `CyeraClassifications_CL`, `CyeraIdentities_CL`, `CyeraIssues_CL`
13311331

1332-
The **Cyera DSPM Azure Function Connector** enables seamless ingestion of Cyera’s **Data Security Posture Management (DSPM)** telemetry — *Assets*, *Identities*, *Issues*, and *Classifications* — into **Microsoft Sentinel**.\n\nThis connector uses an **Azure Function App** to call Cyera’s REST API on a schedule, fetch the latest DSPM telemetry, and send it to Sentinel through the **Azure Monitor Logs Ingestion API** via a **Data Collection Endpoint (DCE)** and **Data Collection Rule (DCR, kind: Direct)** — no agents required.\n\n**Tables created/used**\n\n| Entity | Table | Purpose |\n|---|---|---|\n| Assets | `CyeraAssets_CL` | Raw asset metadata and data-store context |\n| Identities | `CyeraIdentities_CL` | Identity definitions and sensitivity context |\n| Issues | `CyeraIssues_CL` | Findings and remediation details |\n| Classifications | `CyeraClassifications_CL` | Data class & sensitivity definitions |\n| MS View | `CyeraAssets_MS_CL` | Normalized asset view for dashboards |\n\n> **Note:** This v7 connector supersedes the earlier CCF-based approach and aligns with Microsoft’s recommended Direct ingestion path for Sentinel.
1332+
The **Cyera DSPM Azure Function Connector** enables seamless ingestion of Cyera’s **Data Security Posture Management (DSPM)** telemetry — *Assets*, *Identities*, *Issues*, and *Classifications* — into **Microsoft Sentinel**.\n\nThis connector uses an **Azure Function App** to call Cyera’s REST API on a schedule, fetch the latest DSPM telemetry, and send it to Microsoft Sentinel through the **Azure Monitor Logs Ingestion API** via a **Data Collection Endpoint (DCE)** and **Data Collection Rule (DCR, kind: Direct)** — no agents required.\n\n**Tables created/used**\n\n| Entity | Table | Purpose |\n|---|---|---|\n| Assets | `CyeraAssets_CL` | Raw asset metadata and data-store context |\n| Identities | `CyeraIdentities_CL` | Identity definitions and sensitivity context |\n| Issues | `CyeraIssues_CL` | Findings and remediation details |\n| Classifications | `CyeraClassifications_CL` | Data class & sensitivity definitions |\n| MS View | `CyeraAssets_MS_CL` | Normalized asset view for dashboards |\n\n> **Note:** This v7 connector supersedes the earlier CCF-based approach and aligns with Microsoft’s recommended Direct ingestion path for Microsoft Sentinel.
13331333

13341334
[→ View full connector details](connectors/cyerafunctionsconnector.md)
13351335

13361336
---
13371337

1338-
### [Cyera DSPM Azure Sentinel Data Connector](connectors/cyeradspmccf.md)
1338+
### [Cyera DSPM Microsoft Sentinel Data Connector](connectors/cyeradspmccf.md)
13391339

13401340
**Publisher:** Cyera Inc
13411341

13421342
**Solution:** [CyeraDSPM](solutions/cyeradspm.md)
13431343

13441344
**Tables (5):** `CyeraAssets_CL`, `CyeraAssets_MS_CL`, `CyeraClassifications_CL`, `CyeraIdentities_CL`, `CyeraIssues_CL`
13451345

1346-
The [Cyera DSPM](https://api.cyera.io/) data connector allows you to connect to your Cyera's DSPM tenant and ingesting Classifications, Assets, Issues, and Identity Resources/Definitions into Microsoft Sentinel. The data connector is built on Microsoft Sentinel's Codeless Connector Framework and uses the Cyera's API to fetch Cyera's [DSPM Telemetry](https://www.cyera.com/) once recieced can be correlated with security events creating custom columns so that queries don't need to parse it again, thus resulting in better performance.
1346+
The [Cyera DSPM](https://api.cyera.io/) data connector allows you to connect to your Cyera's DSPM tenant and ingesting Classifications, Assets, Issues, and Identity Resources/Definitions into Microsoft Sentinel. The data connector is built on Microsoft Sentinel's Codeless Connector Framework and uses the Cyera's API to fetch Cyera's [DSPM Telemetry](https://www.cyera.com/) once received can be correlated with security events creating custom columns so that queries don't need to parse it again, thus resulting in better performance.
13471347

13481348
[→ View full connector details](connectors/cyeradspmccf.md)
13491349

@@ -3841,6 +3841,20 @@ The SINEC Security Guard solution for Microsoft Sentinel allows you to ingest se
38413841

38423842
---
38433843

3844+
### [SOC Prime Platform Audit Logs Data Connector](connectors/socprimeauditlogsdataconnector.md)
3845+
3846+
**Publisher:** Microsoft
3847+
3848+
**Solution:** [SOC Prime CCF](solutions/soc-prime-ccf.md)
3849+
3850+
**Tables (1):** `SOCPrimeAuditLogs_CL`
3851+
3852+
The [SOC Prime Audit Logs](https://help.socprime.com/en/articles/6265791-api) data connector allows ingesting logs from the SOC Prime Platform API into Microsoft Sentinel. The data connector is built on Microsoft Sentinel Codeless Connector Platform. It uses the SOC Prime Platform API to fetch SOC Prime platform audit logs and it supports DCR-based [ingestion time transformations](https://docs.microsoft.com/azure/azure-monitor/logs/custom-logs-overview) that parses the received security data into a custom table, thus resulting in better performance.
3853+
3854+
[→ View full connector details](connectors/socprimeauditlogsdataconnector.md)
3855+
3856+
---
3857+
38443858
### [SaaS Security](connectors/valencesecurity.md)
38453859

38463860
**Publisher:** Valence Security

Tools/Solutions Analyzer/connector-docs/connectors/beyondtrustpmcloud.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,49 @@ The BeyondTrust Privilege Management Cloud data connector provides the capabilit
1414

1515
This connector uses Azure Functions to pull data from the BeyondTrust PM Cloud API and ingest it into custom Log Analytics tables.
1616

17+
## Permissions
18+
19+
**Resource Provider Permissions:**
20+
- **Workspace** (Workspace): read and write permissions on the workspace are required.
21+
- **Keys** (Workspace): read permissions to shared keys for the workspace are required. [See the documentation to learn more about workspace keys](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#obtain-workspace-id-and-key).
22+
23+
**Custom Permissions:**
24+
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](https://docs.microsoft.com/azure/azure-functions/).
25+
- **BeyondTrust PM Cloud API credentials**: BeyondTrust PM Cloud OAuth Client ID and Client Secret are required. Contact BeyondTrust support for API access.
26+
27+
## Setup Instructions
28+
29+
> ⚠️ **Note**: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
30+
31+
>**NOTE:** This connector uses Azure Functions to connect to the BeyondTrust PM Cloud API to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
32+
33+
>**NOTE:** This connector uses the OAuth 2.0 client credentials flow to authenticate with the BeyondTrust PM Cloud API.
34+
35+
**1. STEP 1 - Obtain BeyondTrust PM Cloud API credentials**
36+
37+
Contact BeyondTrust support to obtain OAuth API credentials (Client ID and Client Secret) for accessing the BeyondTrust PM Cloud API.
38+
39+
**2. STEP 2 - Deploy the connector and the associated Azure Function**
40+
41+
Use this method for automated deployment of the BeyondTrust PM Cloud data connector using an ARM Template.
42+
43+
1. Click the **Deploy to Azure** button below.
44+
45+
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FSolutions%2FBeyondTrustPMCloud%2FData%2520Connectors%2Fazuredeploy_BeyondTrustPMCloud_API_FunctionApp.json)
46+
2. Select the preferred **Subscription**, **Resource Group** (must contain your Log Analytics workspace), and **Location**.
47+
3. Enter the required parameters:
48+
- **Workspace Name**: Name of your Log Analytics workspace (e.g., `beyondtrust-pmcloud`)
49+
- **BeyondTrust PM Cloud Base URL**: Your tenant URL (e.g., `https://yourcompany.beyondtrustcloud.com`)
50+
- **BeyondTrust Client ID**: OAuth Client ID from Step 1
51+
- **BeyondTrust Client Secret**: OAuth Client Secret from Step 1
52+
- **Activity Audits Polling Interval**: How often to collect Activity Audits (default: 15 minutes)
53+
- **Client Events Polling Interval**: How often to collect Client Events (default: 5 minutes)
54+
- **Log Level**: Logging level for troubleshooting (default: Information)
55+
- **Historical Data Timeframe**: How far back to collect data on first run (default: 1 day)
56+
4. Review advanced settings (Hosting Plan SKU, Storage Account Type) and adjust if needed.
57+
5. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
58+
6. Click **Purchase** to deploy.
59+
7. The deployment creates all required resources: Function App, Storage Account, Data Collection Endpoint, Data Collection Rules, and custom Log Analytics tables.
60+
8. Data should begin flowing within 15-30 minutes of deployment.
61+
1762
[← Back to Connectors Index](../connectors-index.md)

Tools/Solutions Analyzer/connector-docs/connectors/cyeradspmccf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Cyera DSPM Azure Sentinel Data Connector
1+
# Cyera DSPM Microsoft Sentinel Data Connector
22

33
| | |
44
|----------|-------|
@@ -8,7 +8,7 @@
88
| **Used in Solutions** | [CyeraDSPM](../solutions/cyeradspm.md) |
99
| **Connector Definition Files** | [CyeraDSPMLogs_ConnectorDefinitionCCF.json](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyeraDSPM/Data%20Connectors/CyeraDSPM_CCF/CyeraDSPMLogs_ConnectorDefinitionCCF.json) |
1010

11-
The [Cyera DSPM](https://api.cyera.io/) data connector allows you to connect to your Cyera's DSPM tenant and ingesting Classifications, Assets, Issues, and Identity Resources/Definitions into Microsoft Sentinel. The data connector is built on Microsoft Sentinel's Codeless Connector Framework and uses the Cyera's API to fetch Cyera's [DSPM Telemetry](https://www.cyera.com/) once recieced can be correlated with security events creating custom columns so that queries don't need to parse it again, thus resulting in better performance.
11+
The [Cyera DSPM](https://api.cyera.io/) data connector allows you to connect to your Cyera's DSPM tenant and ingesting Classifications, Assets, Issues, and Identity Resources/Definitions into Microsoft Sentinel. The data connector is built on Microsoft Sentinel's Codeless Connector Framework and uses the Cyera's API to fetch Cyera's [DSPM Telemetry](https://www.cyera.com/) once received can be correlated with security events creating custom columns so that queries don't need to parse it again, thus resulting in better performance.
1212

1313
## Permissions
1414

Tools/Solutions Analyzer/connector-docs/connectors/cyerafunctionsconnector.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Cyera DSPM Azure Functions Sentinel Data Connector
1+
# Cyera DSPM Azure Functions Microsoft Sentinel Data Connector
22

33
| | |
44
|----------|-------|
@@ -8,7 +8,7 @@
88
| **Used in Solutions** | [CyeraDSPM](../solutions/cyeradspm.md) |
99
| **Connector Definition Files** | [FunctionAppDC.json](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CyeraDSPM/Data%20Connectors/CyeraDSPM_Functions/FunctionAppDC.json) |
1010

11-
The **Cyera DSPM Azure Function Connector** enables seamless ingestion of Cyera’s **Data Security Posture Management (DSPM)** telemetry — *Assets*, *Identities*, *Issues*, and *Classifications* — into **Microsoft Sentinel**.\n\nThis connector uses an **Azure Function App** to call Cyera’s REST API on a schedule, fetch the latest DSPM telemetry, and send it to Sentinel through the **Azure Monitor Logs Ingestion API** via a **Data Collection Endpoint (DCE)** and **Data Collection Rule (DCR, kind: Direct)** — no agents required.\n\n**Tables created/used**\n\n| Entity | Table | Purpose |\n|---|---|---|\n| Assets | `CyeraAssets_CL` | Raw asset metadata and data-store context |\n| Identities | `CyeraIdentities_CL` | Identity definitions and sensitivity context |\n| Issues | `CyeraIssues_CL` | Findings and remediation details |\n| Classifications | `CyeraClassifications_CL` | Data class & sensitivity definitions |\n| MS View | `CyeraAssets_MS_CL` | Normalized asset view for dashboards |\n\n> **Note:** This v7 connector supersedes the earlier CCF-based approach and aligns with Microsoft’s recommended Direct ingestion path for Sentinel.
11+
The **Cyera DSPM Azure Function Connector** enables seamless ingestion of Cyera’s **Data Security Posture Management (DSPM)** telemetry — *Assets*, *Identities*, *Issues*, and *Classifications* — into **Microsoft Sentinel**.\n\nThis connector uses an **Azure Function App** to call Cyera’s REST API on a schedule, fetch the latest DSPM telemetry, and send it to Microsoft Sentinel through the **Azure Monitor Logs Ingestion API** via a **Data Collection Endpoint (DCE)** and **Data Collection Rule (DCR, kind: Direct)** — no agents required.\n\n**Tables created/used**\n\n| Entity | Table | Purpose |\n|---|---|---|\n| Assets | `CyeraAssets_CL` | Raw asset metadata and data-store context |\n| Identities | `CyeraIdentities_CL` | Identity definitions and sensitivity context |\n| Issues | `CyeraIssues_CL` | Findings and remediation details |\n| Classifications | `CyeraClassifications_CL` | Data class & sensitivity definitions |\n| MS View | `CyeraAssets_MS_CL` | Normalized asset view for dashboards |\n\n> **Note:** This v7 connector supersedes the earlier CCF-based approach and aligns with Microsoft’s recommended Direct ingestion path for Microsoft Sentinel.
1212

1313
## Permissions
1414

@@ -36,7 +36,7 @@ The **Cyera DSPM Azure Function Connector** enables seamless ingestion of Cyera
3636
> Before deploying, have these values handy:
3737
- **Cyera Function Connector Name**: `CyeraDSPMConnector`
3838
> *Note: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.*
39-
- **Workspace Name**: `{{workspace}}`
39+
- **Workspace Name**: `{{workspace-location}}`
4040
> *Note: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.*
4141
- **Workspace Location**: `{{workspace-location}}`
4242
> *Note: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.*

0 commit comments

Comments
 (0)