Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | ContrastADRCCF |
| Publisher | Contrast Security |
| Used in Solutions | ContrastADR |
| Collection Method | CCF Push |
| Connector Definition Files | connectorDefinition.json |
| CCF Configuration | dataConnector.json |
| CCF Capabilities | Push |
| Ingestion API | Log Ingestion API — CCF Push connectors use DCR-based Log Ingestion API |
The Contrast Security connector provides the capability to ingest attack events and incidents from Contrast Application Detection and Response (ADR) into Microsoft Sentinel. This connector receives data via webhook push mechanism using OAuth authentication.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
ContrastADRAttackEvents_CL |
? | ✓ | ? |
ContrastADRIncidents_CL |
? | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): read and write permissions are required.
Custom Permissions: - Microsoft Entra: Permission to create an app registration in Microsoft Entra ID (if using auto-created app). Typically requires Application Developer role or higher. - Microsoft Azure: Permission to create and configure Azure resources (DCE, DCR, Tables) and assign RBAC roles. Typically requires Contributor and User Access Administrator roles. - Contrast ADR Webhook Access: Access to Contrast ADR platform to configure webhook with OAuth authentication settings.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Deploy Connector Resources
Deploy the required Azure resources for Contrast ADR data ingestion.
Select one of the following deployment options based on requirements:
Clicking Deploy Contrast ADR CCF Connector will automatically create: - Data Collection Endpoint (DCE) - Data Collection Rule (DCR) with streams for attack events and incidents - Log Analytics tables (ContrastADRAttackEvents_CL and ContrastADRIncidents_CL) - Microsoft Entra Application with OAuth credentials - Role assignment (Monitoring Metrics Publisher) on the DCR
After deployment: All configuration values (Tenant ID, Client ID, Client Secret, DCE URI, DCR Immutable ID) will be auto-populated below for easy copy-paste into Contrast platform.
Clicking Deploy Contrast ADR CCF Connector will create: - Data Collection Endpoint (DCE) - Data Collection Rule (DCR) with streams for attack events and incidents - Log Analytics tables (ContrastADRAttackEvents_CL and ContrastADRIncidents_CL) - Microsoft Entra Application (you can ignore this)
When to use: If you have an existing Entra App that you want to reuse for security or compliance reasons.
Additional steps required: 1. After deployment, manually assign your pre-existing Entra App's Service Principal the Monitoring Metrics Publisher role on the created DCR 2. Use your own Entra App's Client ID and Client Secret (ignore the auto-generated ones below) 3. Use the DCE URI and DCR Immutable ID from below in your Contrast webhook configuration
Click Deploy to begin: Deploy Contrast ADR CCF Connector
2. Configure Contrast ADR Webhook
Copy the following values to configure the Microsoft Sentinel integration in Contrast ADR platform. For Option A (Auto-Created Entra App): Use all the auto-populated values below.
For Option B (Pre-Existing Entra App): Use the DCE URI, DCR Immutable ID, and Stream Names from below, but use your own Entra App's Tenant ID, Client ID, and Client Secret.
TenantIdNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
ApplicationIdNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
ApplicationSecretNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
DataCollectionEndpointNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
DataCollectionRuleIdNote: The value above is dynamically provided when these instructions are presented within Microsoft Sentinel.
Custom-ContrastADRAttackEventsCustom-ContrastADRIncidentsThe Contrast platform will automatically configure the OAuth authentication and data endpoints using these values.
3. Verify Data Ingestion
Verify that data is flowing from Contrast ADR to Microsoft Sentinel.
ContrastADRAttackEvents_CL
| take 10
ContrastADRIncidents_CL
| take 10
ContrastADRAttackEvents_CL
| summarize LastLogReceived = max(TimeGenerated)
| project IsConnected = LastLogReceived > ago(7d)
If data appears and IsConnected returns true, your connector is configured correctly!
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊