Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | AwsNetworkFirewallCcpDefinition |
| Publisher | Microsoft |
| Used in Solutions | Amazon Web Services NetworkFirewall |
| Collection Method | CCF |
| Connector Definition Files | AWSNetworkFirewallLog_ConnectorDefinition.json |
| CCF Configuration | AWSNetworkFirewallLog_PollingConfig.json |
| CCF Capabilities | AmazonWebServicesS3 |
This data connector allows you to ingest AWS Network Firewall logs into Microsoft Sentinel for advanced threat detection and security monitoring. By leveraging Amazon S3 and Amazon SQS, the connector forwards network traffic logs, intrusion detection alerts, and firewall events to Microsoft Sentinel, enabling real-time analysis and correlation with other security data
📖 Setup Guide: Connect Microsoft Sentinel to AWS - Configure your AWS environment for Microsoft Sentinel integration
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
AWSNetworkFirewallAlert |
✓ | ✓ | ? |
AWSNetworkFirewallFlow |
✓ | ✓ | ? |
AWSNetworkFirewallTls |
✓ | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): Read and Write permissions are required.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Ingesting AWS NetworkFirewall logs in Microsoft Sentinel
To configure access on AWS, two templates has been generated to set up the AWS environment to send logs from an S3 bucket to your Log Analytics Workspace.
#### For each template, create Stack in AWS:
1. Go to AWS CloudFormation Stacks.
2. Choose the ‘Specify template’ option, then ‘Upload a template file’ by clicking on ‘Choose file’ and selecting the appropriate CloudFormation template file provided below. click ‘Choose file’ and select the downloaded template.
3. Click 'Next' and 'Create stack'.
- Template 1: OpenID connect authentication deployment: Oidc
Note: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel. - Template 2: AWSNetworkFirewall resources deployment:
AWSNetworkFirewallNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
To enable AWS S3 for Microsoft Sentinel, click the Add new collector button, fill the required information in the context pane and click on Connect. Connector Management Interface
This section is an interactive interface in the Microsoft Sentinel portal that allows you to manage your data collectors.
📊 View Existing Collectors: A management table displays all currently configured data collectors with the following information: - Role ARN - Queue URL - Stream name
➕ Add New Collector: Click the "Add new collector" button to configure a new data collector (see configuration form below).
🔧 Manage Collectors: Use the actions menu to delete or modify existing collectors.
💡 Portal-Only Feature: This configuration interface is only available when viewing the connector in the Microsoft Sentinel portal. You cannot configure data collectors through this static documentation.
Add new controller
AWS S3 connector
When you click the "Add new collector" button in the portal, a configuration form will open. You'll need to provide:
Account details
💡 Portal-Only Feature: This configuration form is only available in the Microsoft Sentinel portal.
📄 Source: Amazon Web Services NetworkFirewall\Data Connectors\readme.md
This guide explains how to integrate AWS Network Firewall logs with Microsoft Sentinel using an AWS CloudFormation template. The template automates the deployment of necessary resources to collect, process, and forward logs to Sentinel.
Before deploying, ensure you have: - An AWS account with permissions to deploy CloudFormation stacks. - An existing AWS Network Firewall setup. - An active Microsoft Sentinel Log Analytics Workspace ID. - Required IAM permissions to configure AWS services.
Download Both the CloudFormation templates(Template 1: OpenID connect authentication deployment,Template 2: AWS Network Firewall Configuration) from connector UI page and deploy in your AWS environment.
The OIDC (OpenID Connect) Web Identity Provider allows AWS services to securely authenticate using an external identity provider without managing long-term credentials. The CloudFormation template configures OIDC as a trusted identity provider in AWS, enabling secure role-based access for forwarding AWS Network Firewall logs to Microsoft Sentinel.
AWS Network Firewall Configuration
The AWS Network Firewall Configuration template sets up logging for AWS Network Firewall by creating an S3 bucket, SQS queues, and event notifications. This ensures logs are captured and forwarded to Microsoft Sentinel for monitoring and threat detection.
The CloudFormation template will create:
AWSNetworkFirewallFlow
| where TimeGenerated > ago(1h)AWSNetworkFirewallAlert
| where TimeGenerated > ago(1h)AWSNetworkFirewallTls
| where TimeGenerated > ago(1h)Event Notification Path
AWS S3 Bucket -> Properties -> Event Notifications -> Select Event Notification -> Edit -> General configuration Make sure S3 bucket path and prefix path should be the same
IAM permission errors? Ensure CloudFormation created the correct policies.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊