RSA ID Plus Admin Logs Connector

Solution: RSAIDPlus_AdminLogs_Connector

RSAIDPlus_AdminLogs_Connector Logo

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index


Attribute Value
Publisher RSA Support Team
Support Tier Partner
Support Link https://community.rsa.com/
Categories domains,verticals
Version 3.0.1
Author RSA Security
First Published 2025-10-14
Solution Folder RSAIDPlus_AdminLogs_Connector
Marketplace Azure Marketplace · Popularity: ⚪ Very Low (0%)

The RSA ID Plus Admin Logs Data Connector enables seamless integration between RSA ID Plus and Microsoft Sentinel. This connector ingests Admin Events logs from RSA ID Plus Cloud Administration Console using the RSA Admin API and stores them securely in your Azure Log Analytics (ALA) workspace. These logs can then be used for monitoring, analysis, and threat detection within Microsoft Sentinel.

Contents

Data Connectors

This solution provides 1 data connector(s):

Tables Used

This solution uses 1 table(s):

Table Used By Connectors Used By Content
RSAIDPlus_AdminLogs_CL RSA ID Plus Admin Logs Connector Analytics

Content Items

This solution includes 2 content item(s):

Content Type Count
Analytic Rules 1
Playbooks 1

Analytic Rules

Name Severity Tactics Tables Used
RSA ID Plus - Locked Administrator Account Detected Medium Impact, CredentialAccess RSAIDPlus_AdminLogs_CL

Playbooks

Name Description Tables Used
SendEmailonRSAIDPlusAlert Sends an email notification when an RSA ID Plus analytic rule triggers. This playbook can be linked ... -

Additional Documentation

📄 Source: RSAIDPlus_AdminLogs_Connector/README.md

RSA ID Plus Admin Logs Connector

Overview

The RSA ID Plus Admin Logs Data Connector enables seamless integration between RSA ID Plus and Microsoft Sentinel. This connector ingests Admin Events logs from RSA ID Plus Cloud Administration Console using the RSA Admin API and stores them securely in your Azure Log Analytics (ALA) workspace. These logs can then be used for monitoring, analysis, and threat detection within Microsoft Sentinel.

Features

Log Ingestion

Analytic Rule

Playbook (Automation)

Deployment

  1. Deploy the connector through Azure Portal under your Microsoft Sentinel instance.
  2. Configure the connector (Instructions are provided in the connector UI).
  3. Verify that the logs are being ingested into your Log Analytics workspace.
  4. Optionally, enable the analytic rule for admin account lockout detections.
  5. Optionally, link the provided Playbook to an analytic rule to enable automated email alerts.

Customization

Summary

This connector provides a ready-to-use integration between RSA ID Plus Cloud Administration Console Events and Microsoft Sentinel offering: - Simplified log ingestion - Predefined security analytics - Optional automation through Playbooks.

Together, these components help security teams gain visibility, detect threats and respond quickly to critical admin-level activities.

Release Notes

Version Date Modified (DD-MM-YYYY) Change History
3.0.1 23-10-2025 Updating offerId
3.0.0 14-10-2025 Initial Solution Release.

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Solutions Index