ZeroTrustTIC3

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Attribute Value
Type Workbook
Solution ZeroTrust(TIC3.0)
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AWSCloudTrail ?
AWSVPCFlow ?
AlertEvidence ?
AuditLogs OperationName in "Add member to role,Add user,ApplicationGatewayFirewall,AzureFirewallIDSLog,AzureFirewallThreatIntelLog,NetworkSecurityGroupEvents,Reset user password,Update user"
OperationName contains "PIM"
?
AzureActivity ? ?
AzureDiagnostics 🔶 Category in "ApplicationGatewayFirewallLog,AzureFirewallApplicationRule,AzureFirewallDnsProxy,AzureFirewallNetworkRule,DDoSMitigationReports,FrontdoorWebApplicationFirewallLog,NetworkSecurityGroupEvent,WebApplicationFirewallLogs,kube-audit"
Category contains "SQL"
Resource == "SOC-NS-AG-WAFV2"
ResourceProvider == "MICROSOFT.KEYVAULT"
ResourceType in "APPLICATIONGATEWAYS,AZUREFIREWALLS,CDNWEBAPPLICATIONFIREWALLPOLICIES,FRONTDOORS,PROFILES,PUBLICIPADDRESSES"
? ?
BehaviorAnalytics ?
CarbonBlack_Alerts_CL ? ?
CommonSecurityLog ?
DeviceRegistryEvents ?
DnsEvents ?
Dynamics365Activity ?
EmailAttachmentInfo ActionType in "Add member to role,Add user,InteractiveLogon,RemoteInteractiveLogon,Reset user password,ResourceAccess,Sign-in,Update user" ?
EmailEvents ?
EmailUrlInfo ?
GCP_IAM_CL 🔶 ? ?
IdentityInfo ?
InformationProtectionLogs_CL 🔶 ? ?
OfficeActivity RecordType == "MicrosoftTeams" ?
Operation ? ?
QualysHostDetectionV3_CL ? ?
SecurityAlert ?
SecurityBaseline ?
SecurityEvent ?
SecurityIncident ?
SecurityRecommendation ?
SigninLogs ?
StorageTableLogs ?
Syslog ?
ThreatIntelligenceIndicator ?
Usage ? ?
VMConnection ? ?
WindowsFirewall ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Workbooks · Back to ZeroTrust(TIC3.0)