Network Security Groups

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index


Attribute Value
Connector ID AzureNSG
Publisher Microsoft
Used in Solutions Azure Network Security Groups
Collection Method Azure Diagnostics
Connector Definition Files AzureNSG.JSON
Custom Log V1 Tables Yes 🔶 — ingests into tables with type-suffixed columns

Azure network security groups (NSG) allow you to filter network traffic to and from Azure resources in an Azure virtual network. A network security group includes rules that allow or deny traffic to a virtual network subnet, network interface, or both.

When you enable logging for an NSG, you can gather the following types of resource log information:

This connector lets you stream your NSG diagnostics logs into Microsoft Sentinel, allowing you to continuously monitor activity in all your instances. For more information, see the Microsoft Sentinel documentation.

Tables Ingested

This connector ingests data into the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AzureDiagnostics 🔶 Category in "NetworkSecurityGroupEvent,NetworkSecurityGroupRuleCounter" ? ?

Permissions

Resource Provider Permissions: - Workspace (Workspace): read and write permissions.

Custom Permissions: - Policy​: owner role assigned for each policy assignment scope.​

Setup Instructions

⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.

1. Stream diagnostics logs from your Connect your Network Security Groups diagnostics logs into Sentinel. at scale

This connector uses Azure Policy to apply a single Azure Network Security Groups log-streaming configuration to a collection of instances, defined as a scope.
Follow the instructions below to create and apply a policy to all current and future instances. Note, you may already have an active policy for this resource type. Launch the Azure Policy Assignment wizard and follow the steps.​

  1. In the Basics tab, click the button with the three dots under Scope to select your resources assignment scope. >2. In the Parameters tab, choose your Microsoft Sentinel workspace from the Log Analytics workspace drop-down list, and leave marked as "True" all the log and metric types you want to ingest. >3. To apply the policy on your existing resources, select the Remediation tab and mark the Create a remediation task checkbox. - Configure policy assignment

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index