⚠️ Unpublished: This item is from a solution that is not yet published on Azure Marketplace or not installed in Content Hub.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | Agari |
| Publisher | Agari |
| Used in Solutions | Agari |
| Collection Method | Azure Function |
| Connector Definition Files | Agari_API_FunctionApp.json |
| Ingestion API | HTTP Data Collector API — Connector definition requires workspace key (SharedKey pattern) |
| Custom Log V1 Tables | Yes 🔶 — ingests into tables with type-suffixed columns |
This connector uses a Agari REST API connection to push data into Azure Sentinel Log Analytics.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
agari_apdpolicy_log_CL 🔶 |
? | ✓ | ? |
agari_apdtc_log_CL 🔶 |
? | ✓ | ? |
agari_bpalerts_log_CL |
? | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): read and write permissions on the workspace are required. - Keys (Workspace): read permissions to shared keys for the workspace are required. See the documentation to learn more about workspace keys.
Custom Permissions: - Microsoft.Web/sites permissions: Read and write permissions to Azure Functions to create a Function App is required. See the documentation to learn more about Azure Functions. - Agari Phishing Defense, Phishing Response or Brand Protection API Client ID and Secret: Ensure you have your Client ID and Secret keys. Instructions can be found on the Agari Developers Site. - (Optional) Microsoft Security Graph API: The Agari Function App has the ability to share threat intelleigence with Sentinel via the Security Graph API. To use this feature, you will need to enable the Sentinel Threat Intelligence Platforms connector as well as register an application in Azure Active Directory.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
NOTE: This connector uses Azure Functions to connect to the Agari APIs to pull its logs into Azure Sentinel. This might result in additional data ingestion costs. Check the Azure Functions pricing page for details.
(Optional Step) Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. Follow these instructions to use Azure Key Vault with an Azure Function App.
1. STEP 1 - Get your Agari API credentials
2. STEP 2 - (Optional) Enable the Security Graph API
Follow the instrcutions found on article Connect Azure Sentinel to your threat intelligence platform. Once the application is created you will need to record the Tenant ID, Client ID and Client Secret.
3. STEP 3 - Deploy the connector and the associated Azure Function
IMPORTANT: Before deploying the Agari Connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the Agari API credentials from the previous step. - Workspace ID:
WorkspaceIdNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel. - Primary Key:PrimaryKeyNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
4. Choose a deployement option
5. Option 1: Deploy using the Azure Resource Manager (ARM) Template
Click the Deploy to Azure button below.
2. Select the preferred Subscription, Resource Group and Location.
3. Enter the Workspace ID, Workspace Key, Agari Client ID, Agari Client Secret, select
True or False for the products you subscribe to, and if you wish to share IoCs with Sentinel, select True For Enable Security Graph Sharing, and enter the required IDs from the Azure Application.
- The Function App will request data from the Agari APIs every 5 minutes, corresponding to the Funciton App Timer.
- Note: If using Azure Key Vault secrets for any of the values above, use the
@Microsoft.KeyVault(SecretUri={Security Identifier})schema in place of the string values. Refer to Key Vault references documentation for further details. 4. Mark the checkbox labeled I agree to the terms and conditions stated above. 5. Click Purchase to deploy. 6. NOTE: Due to the use of Environment Variables to store log access times, the App requires 1 additonal manual step. In the Function App, select the Function App Name and select Click on Identity and for System assigned Identity, click on Azure role assignments and Add Role assignment. Select Subscription as the scope, select your subscription and set the Role to Contributor. Click on Save.
6. Option 2: Manual Deployment of Azure Functions
1. Create a Function App
2. Import Function App Code
run.ps1 editor.3. Configure the Function App
- Enter your Agari ClientID and Secret in 'clientId' and 'clientSecret'
- Enter 'true' or 'false' for 'enablePhishingDefense', 'enableBrandProtection', 'enablePhishingResponse' as per your product subscriptions.
- Enter your Resource Group name in resGroup, the name of the Function (from previous step) in functionName and your Subscription ID in subId.
- Enter 'true' or 'false' for 'enableSecurtyGraphAPI'. If you are enabling the Security Graph, the 'GraphTenantId','GraphClientId', and 'GraphClientSecret' is required.
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format:
https://<CustomerId>.ods.opinsights.azure.us.
4. Set Permissions for the App
In the Function App, select the Function App Name and select Click on Identity and for System assigned Identity, set the status to On.
Next, click on Azure role assignments and Add Role assignment. Select Subscription as the scope, select your subscription and set the Role to Contributor. Click on Save.
5. Complete Setup.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊