Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | CTERA |
| Publisher | CTERA Networks Ltd |
| Used in Solutions | CTERA |
| Collection Method | AMA |
| Connector Definition Files | CTERA_Data_Connector.json |
The CTERA Data Connector for Microsoft Sentinel offers monitoring and threat detection capabilities for your CTERA solution.
It includes a workbook visualizing the sum of all operations per type, deletions, and denied access operations.
It also provides analytic rules which detects ransomware incidents and alert you when a user is blocked due to suspicious ransomware activity.
Additionally, it helps you identify critical patterns such as mass access denied events, mass deletions, and mass permission changes, enabling proactive threat management and response.
This connector ingests data into the following tables:
| Table | Selection Criteria | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|---|
Syslog |
ProcessName == "gw-audit"SyslogMessage contains "gw-audit[-]:"SyslogMessage contains "portal portal[-]:" |
✓ | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): write permission is required.
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
1. Step 1: Connect CTERA Platform to Syslog
Set up your CTERA portal syslog connection and Edge-Filer Syslog connector
2. Step 2: Install Azure Monitor Agent (AMA) on Syslog Server
Install the Azure Monitor Agent (AMA) on your syslog server to enable data collection.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊