⚠️ Unpublished: This item is from a solution that is not yet published on Azure Marketplace or not installed in Content Hub.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | Data443 Risk Mitigation, Inc. |
| Support Tier | Partner |
| Support Link | https://data443.com/support |
| Categories | domains |
| Version | 3.0.0 |
| Author | Data443 Risk Mitigation, Inc. - support@data443.com |
| First Published | 2026-04-03 |
| Last Updated | 2026-04-03 |
| Solution Folder | Vaikora-Sentinel |
The Vaikora AI Agent Behavioral Signals solution integrates Vaikora AI agent behavioral data into Microsoft Sentinel using the Codeless Connector Framework (CCF). The solution deploys a REST API poller connector, a custom log table (Vaikora_AgentSignals_CL), analytics rules, and visualization workbook to help security teams monitor AI agent activity, detect behavioral anomalies, and investigate policy violations.
This solution provides 1 data connector(s):
🔶 CLv1: This connector ingests into a table that uses the legacy Custom Log V1 schema format with type-suffixed column names (e.g.
_s,_d,_b,_t,_g). Note: identification is based on column name suffixes which are also permitted in CLv2, so this classification may not always be accurate.
This solution uses 1 table(s):
| Table | Used By Connectors | Used By Content |
|---|---|---|
Vaikora_AgentSignals_CL 🔶 |
Vaikora AI Agent Behavioral Signals | Analytics, Workbooks |
🔶 CLv1: This table uses the legacy Custom Log V1 schema format with type-suffixed column names (e.g.
_s,_d,_b,_t,_g). Note: identification is based on column name suffixes which are also permitted in CLv2, so this classification may not always be accurate.
This solution includes 4 content item(s):
| Content Type | Count |
|---|---|
| Analytic Rules | 3 |
| Workbooks | 1 |
| Name | Severity | Tactics | Tables Used |
|---|---|---|---|
| Vaikora - Agent policy violation | Medium | Impact, DefenseEvasion | Vaikora_AgentSignals_CL |
| Vaikora - Behavioral anomaly detected | Medium | DefenseEvasion, Execution | Vaikora_AgentSignals_CL |
| Vaikora - High severity AI agent action detected | High | Impact, Execution, PrivilegeEscalation | Vaikora_AgentSignals_CL |
| Name | Tables Used |
|---|---|
| VaikoraAgentSignalsDashboard | Vaikora_AgentSignals_CL |
📄 Source: Vaikora-Sentinel/README.md
This solution ingests AI agent behavioral data from the Vaikora API into Microsoft Sentinel. It deploys a REST API poller connector, a custom log table, data collection rules, analytics rules, and a visualization workbook.
| Component | Description |
|---|---|
| Data connector | REST API poller — polls https://api.vaikora.com/api/v1/actions every 6 hours |
| Custom table | Vaikora_AgentSignals_CL — 17-column schema for agent signals |
| Analytic rule | Vaikora - High Risk AI Agent Action |
| Analytic rule | Vaikora - Behavioral Anomaly Detected |
| Analytic rule | Vaikora - Agent Policy Violation |
| Workbook | Vaikora AI Agent Signals Dashboard |
After deploying the solution:
The connector polls the Vaikora API every 6 hours. Data appears in Vaikora_AgentSignals_CL within the first polling window.
| Column | Type | Description |
|---|---|---|
| TimeGenerated | datetime | Timestamp of the agent action |
| action_id_s | string | Unique action identifier |
| action_type_s | string | Type of action performed |
| agent_id_s | string | Agent identifier |
| status_s | string | Action status (success, failure, blocked) |
| severity_s | string | Severity level (low, medium, high, critical) |
| policy_decision_s | string | Policy enforcement decision (allow, block, warn) |
| policy_id_s | string | Policy that evaluated the action |
| risk_score_d | int | Risk score 0-100 |
| risk_level_s | string | Risk level label |
| is_anomaly_b | bool | Whether Vaikora flagged this as anomalous |
| anomaly_score_d | real | Anomaly score 0.0-1.0 |
| anomaly_reason_s | string | Human-readable anomaly explanation |
| threat_detected_b | bool | Whether a threat was detected |
| threat_score_d | int | Threat score 0-100 |
| resource_type_s | string | Type of resource the agent accessed |
| log_hash_s | string | Unique hash for deduplication |
All three rules are deployed in disabled state. Enable them from Analytics > Rule templates after confirming data is flowing.
Vaikora - High Risk AI Agent Action — fires when an action has risk_score_d >= 75 and severity is high or critical. Severity: High. Frequency: 1h.
Vaikora - Behavioral Anomaly Detected — fires when is_anomaly_b == true and anomaly_score_d >= 0.7. Severity: Medium. Frequency: 30m.
Vaikora - Agent Policy Violation — fires when policy_decision_s == 'block'. Severity: Medium. Frequency: 15m.
[Content truncated...]
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.0.0 | 18-04-2026 | Initial Vaikora AI Agent Behavioral Signals CCF solution package with data connector, analytics rules and workbook. |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊