⚠️ Unpublished: This item is from a solution that is not yet published on Azure Marketplace or not installed in Content Hub.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | AlsidForAD |
| Publisher | Alsid |
| Used in Solutions | Alsid For AD |
| Collection Method | MMA |
| Connector Definition Files | AlsidForAD.json |
Alsid for Active Directory connector allows to export Alsid Indicators of Exposures, trailflow and Indicators of Attacks logs to Azure Sentinel in real time.
It provides a data parser to manipulate the logs more easily. The different workbooks ease your Active Directory monitoring and provide different ways to visualize the data. The analytic templates allow to automate responses regarding different events, exposures, or attacks.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
AlsidForADLog_CL |
? | ✓ | ? |
Tenable_IE_CL |
? | ✓ | ? |
Tenable_ad_CL |
? | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): read and write permissions are required. - Keys (Workspace): read permissions to shared keys for the workspace are required. See the documentation to learn more about workspace keys.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
This data connector depends on a parser based on a Kusto Function to work as expected. Follow these steps to create the Kusto Functions alias, afad_parser
1. Configure the Syslog server
You will first need a linux Syslog server that Alsid for AD will send logs to. Typically you can run rsyslog on Ubuntu. You can then configure this server as you wish, but it is recommended to be able to output AFAD logs in a separate file. Alternatively you can use this Quickstart template which will deploy the Syslog server and the Microsoft agent for you. If you do use this template, you can skip step 3.
2. Configure Alsid to send logs to your Syslog server
On your Alsid for AD portal, go to System, Configuration and then Syslog. From there you can create a new Syslog alert toward your Syslog server.
Once this is done, check that the logs are correctly gathered on your server in a seperate file (to do this, you can use the Test the configuration button in the Syslog alert configuration in AFAD). If you used the Quickstart template, the Syslog server will by default listen on port 514 in UDP and 1514 in TCP, without TLS.
3. Install and onboard the Microsoft agent for Linux
You can skip this step if you used the Quickstart template in step 1 Choose where to install the agent:
Install agent on Azure Linux Virtual Machine
Select the machine to install the agent on and then click Connect. - Install agent on Linux Virtual Machine
Install agent on a non-Azure Linux Machine
Download the agent on the relevant machine and follow the instructions. - Install agent on Linux (Non-Azure)
4. Configure the logs to be collected by the agents
Configure the agent to collect the logs.
/var/log/AlsidForAD.log.All of these steps are showcased here as an example - Open Syslog settings
You should now be able to receive logs in the AlsidForADLog_CL table, logs data can be parse using the afad_parser() function, used by all query samples, workbooks and analytic templates.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊