For SecQube Support:
support@secqube.com
https://portal.secqube.com
This guide walks you through how to set up syslog forwarding for Microsoft Sentinel using three common configurations. You don’t need to be a Linux expert to follow along.
What is syslog
Syslog is a standardized logging protocol defined in RFC 5424 that specifies how log messages are formatted and transmitted over a network.
By default, Syslog uses UDP port 514, though it can also operate over TCP - commonly on port 6514 when secured with TLS. It's a lightweight, efficient way to centralize logging from a wide variety of sources.
Syslog is widely supported across:
Unix/Linux systems
Network appliances like firewalls and routers
Many security products and enterprise applications
Here’s an example of a raw syslog message:
<134>1 1515988859.626061236 appliance flows src=172.21.84.107 dst=10.52.193.137 mac=5C:E0:C5:22:85:E4 protocol=tcp sport=50395 dport=443 pattern: allow all
What is syslog forwarding
Syslog forwarding sends log messages from a device like a server, router, or firewall to a remote system such as a log server or SIEM. This enables centralized logging for easier monitoring and analysis.
It's especially important because most firewalls send logs in syslog format.
Example FortiGate syslog setup
What is syslog forwarder
A syslog forwarder is typically a Linux machine that receives logs in syslog format and forwards them over the network to a monitoring platform like a SIEM. Some forwarders can also parse, filter, or transform messages before sending them.
Common syslog forwarding tools include rsyslog, syslog-ng, NxLog, and Graylog.
In this guide, we’ll use rsyslog, a popular and lightweight option included by default in most Linux distributions.
Syslog forwarding for Microsoft Sentinel
At a high level, syslog forwarding to Microsoft Sentinel works like this:
The data source (e.g. a firewall or server) is configured to send syslog messages to a Linux machine running a syslog daemon. In this guide, that’s rsyslog.
The Azure Monitor Agent (AMA) on that machine collects the syslog messages.
AMA then forwards the logs to Microsoft Sentinel via a configured Data Collection Rule (DCR).
High level view of syslog forwarding for MS Sentinel
Considerations
Before setting up a syslog forwarder, it’s worth thinking through a few key points:
Log Volume: How many logs are you sending? The size and specs of your VM will depend heavily on log throughput.
Deployment Location: Will your forwarders run on-premises or in the cloud?
Reliability: Is a single VM enough, or do you need a load-balanced setup for high availability?
In production, there are other technical considerations too like UDP vs TCP, mutual TLS, Private Link, traffic inspection, access control, auditing, alerting on silent sources and more.
But honestly in most cases, these are dictated by your broader security and network architecture. If you're just getting started don’t stress about them too much :)
Demo setup
In this demo, I’ll walk through a simple, single VNet setup:
One Ubuntu VM generates logs in syslog format.
Another Ubuntu VM, running rsyslog, receives those logs.
That VM then forwards the logs to Microsoft Sentinel using the Azure Monitor Agent.
No complexity, no HA, no Bicep, no Terraform just a straightforward example to show how syslog forwarding works end to end.
single VNET demo setup
[OPTIONAL] Syslog generator
This step is optional, but useful for testing. You can simulate syslog traffic using tools like logger, echo, or by exporting data from an application that supports syslog output.
We’ll start by creating a VM that will generate syslog messages. For this demo, we'll use a Standard_D2ls_v5 VM (2 vCPUs, 4 GiB memory).
Go to portal.azure.com → Virtual Machines → Create.
Below are the key configuration settings to focus on - we'll skip the defaults and highlight only what matters.
Select Ubuntu Server 22.04:
Ubuntu 22.04
2. Set public network ports to 'None' (we will change that later):
No public inbound ports
3. OPTIONAL: enable auto shutdown under Management:
Optional auto shutdown
Create the VM. You will be asked to download a SSH key.
4. Generate script that generates dummy syslog data. Below script will do:
import socket
import time
import random
# Configuration
SYSLOG_SERVER = 'YOUR COLLECTOR'S IP ADDRESS' # Change to your syslog server IP
SYSLOG_PORT = 514 # Syslog UDP port
EPS = 20 # Events Per Second
FACILITY = 20 # local4
SEVERITY = 6 # informational
PRI = (FACILITY * 8) + SEVERITY
# Sample data pools
source_ips = ['172.21.84.107', '192.168.1.10', '10.0.0.55', '192.168.100.23']
dest_ips = ['10.52.193.137', '8.8.8.8', '172.16.0.1', '192.168.1.100']
macs = ['5C:E0:C5:22:85:E4', '00:1A:2B:3C:4D:5E', 'D4:EE:07:11:22:33']
protocols = ['tcp', 'udp', 'icmp']
actions = ['allow all', 'deny all', 'allow http', 'deny ftp']
def get_local_ip():
"""Attempt to get the local IP address used to reach the SYSLOG_SERVER."""
try:
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
# Doesn't need to be reachable; just to get the outbound interface
s.connect((SYSLOG_SERVER, SYSLOG_PORT))
local_ip = s.getsockname()[0]
s.close()
return local_ip
except Exception:
return '0.0.0.0'
def generate_syslog_message():
timestamp = time.time()
version = 1
device_type = 'appliance'
log_type = 'flows'
src_ip = random.choice(source_ips)
dst_ip = random.choice(dest_ips)
mac = random.choice(macs)
protocol = random.choice(protocols)
sport = random.randint(1024, 65535) if protocol in ['tcp', 'udp'] else 0
dport = random.choice([80, 443, 53, 22, 0]) if protocol in ['tcp', 'udp'] else 0
pattern = random.choice(actions)
msg = (f"<{PRI}>{version} {timestamp:.9f} {device_type} {log_type} "
f"src={src_ip} dst={dst_ip} mac={mac} protocol={protocol} "
f"sport={sport} dport={dport} pattern: {pattern}")
return msg
def send_syslog_messages(eps):
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
interval = 1.0 / eps
local_ip = get_local_ip()
print(f"Sending syslog messages at {eps} EPS to {SYSLOG_SERVER}:{SYSLOG_PORT}... (Press Ctrl+C to stop)")
try:
while True:
msg = generate_syslog_message()
sock.sendto(msg.encode(), (SYSLOG_SERVER, SYSLOG_PORT))
print(f"Sent from {local_ip} to {SYSLOG_SERVER}: {msg}")
time.sleep(interval)
except KeyboardInterrupt:
print("\nStopped by user.")
finally:
sock.close()
if __name__ == "__main__":
send_syslog_messages(EPS)
5.Go to 'Network Settings' and create a new Inbound port rule to allow SSH over port 22 from your IP address:
Example NSG rule allowing SSH in
6. Use SSH to connect to your VM:
ssh -i 'your-ssh-key' your-username@public-ip-of-your-vm
7. Create a .py file using a text editor, for example nano:
nano syslog_generator.py
8. Paste the scripts content into the file, subtitute the IP address for your collector's IP address and save. Run the file to see if it works correctly. Console output should look as follows:
python3 syslog_generator.py
Example console output
Perfect. Our syslog generator script works. Now we will create syslog forwarders.
Syslog forwarder scenarios
Scenario 1: Single Syslog Forwarer aka "Big Boy"
Sometimes you just want to keep it simple and I respect that. One large server acting as your dedicated syslog forwarder. This setup works well for:
Demos and testing
Smaller production environments
Environments with predictable or low event volume
One key thing to keep in mind: log forwarding to Microsoft Sentinel is done through the Azure Monitor Agent (AMA), which has a recommended limit of 10,000 events per second (EPS) per agent. While it can technically handle up to 20,000 EPS, 10,000 EPS is the supported and recommended ceiling.
📚 AMA performance guidance
This means a single-forwarder architecture can be a good choice only if your total incoming syslog volume stays below that threshold. If that’s the case, the "Big Boy" setup is straightforward and gets the job done.
Single syslog VM setup.
Scenario 2: Load-Balanced VMs
For production environments, a load-balanced syslog forwarder setup is a solid choice. This involves deploying two or more VMs behind an internal Azure Load Balancer, each running a syslog daemon like rsyslog.
This approach offers:
Improved reliability and scalability
Redundancy, in case one forwarder goes down
A clean path to horizontal scaling if log volume grows
It's especially effective when log volumes are predictable (and honestly in most environments, they are). This setup strikes a good balance between simplicity and production readiness.
Load balanced VMs
Scenario 3: Load-Balanced VM Scale Set (VMSS)
A Virtual Machine Scale Set (VMSS) is a dynamic group of VMs that can automatically scale in or out based on resource usage such as CPU load or custom metrics.
In the context of syslog forwarding, this means:
When the load on existing forwarders exceeds a set threshold, a new VM is automatically added to handle the traffic.
When the load decreases, VMs are deprovisioned, saving costs and keeping the system efficient.
This setup combines scalability, resilience, and automation, making it ideal for larger or more dynamic environments where log volume can spike or fluctuate. The VMSS is placed behind an internal load balancer, just like in the fixed VM scenario, but with added elasticity.
Load balanced VMSS
Big Boy (single VM)
To deploy a single syslog forwarder, follow the same steps outlined earlier for creating the syslog generator VM, but this time it will act as the forwarder.
Create the VM:
Go to portal.azure.com → Virtual Machines → Create.
Choose Ubuntu 22.04 LTS as the image.
Select a size based on expected log volume (e.g., Standard_D2s_v3 or larger).
2. Install the Syslog Connector in Sentinel:
Syslog content pack installation
3. Create a DCR:
Go to Microsoft Sentinel and open your workspace.
In the left-hand menu, select Data connectors.
Find "Syslog via AMA" in the list and click to open the connector page.
Click Create DCR to start the setup process.
Data Collection Rules (DCRs) define what data is collected and from which resources.
In the wizard, select the VM you just deployed as the resource to collect from.
Resorce selector
Next, in the Collect section, choose what types of syslog messages you want to collect.
For this demo, I'm selecting LOG_LOCAL4 as the facility and LOG_DEBUG as the severity, since that’s where my script writes logs.
In a production setup, this may vary depending on the source device or application.
If you’re unsure, you can initially select all facilities and severities, then narrow it down later based on what you actually receive.
Facility / severity selector
Create the Data Collection Rule. It will automatically deploy Azure Monitor Agent to your syslog server.
3. Connect to your VM using SSH and run this script:
sudo wget -O Forwarder_AMA_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Forwarder_AMA_installer.py&&sudo python3 Forwarder_AMA_installer.py
Successfully executed script
This script will:
Detect if rsyslog or syslog-ng is running
Enable TCP/UDP listeners on port 514.
Restart the appropriate daemon to apply changes.
The config is done and we can test the forwarding.
Important: in this demo environment the traffic is sent within a single VNET. Network security groups (NSG) allow inter-VNET traffic. If you're sending syslog from outside of your VNET you need to allow it on NSG:
Allowing logs from outside of the VNET
Load balanced VMs
A Load Balancer distributes traffic between VMs in its backend pool, making it ideal for high availability and horizontal scaling.
You can add a single VM to the backend pool for testing, but in production, you’ll likely want at least two forwarder VMs. If needed, follow the same steps from earlier to create an additional syslog forwarder VM.
Go to Azure Portal, search for Load balancers, and create a new Standard Load Balancer.
This will be used to route incoming syslog traffic (UDP/TCP 514) across your forwarder VMs.
Configure Internal Load Balancer:
In the Basics section of the Load Balancer setup, select SKU: Standard and Type: Internal.
This creates an internal-only Load Balancer, ideal for receiving traffic from devices within the same VNet.
If you need to accept traffic from outside your VNet (e.g., from on-prem devices or external sources), you can choose Type: Public instead and associate a Public IP address with the Load Balancer.
Load Balancer 'Basics' tab
Create a Frontend IP configuration and choose a dynamic IP address.
Next, go to the Backend pools section and select the Virtual Machine(s) you want to include in the pool.
These will be your syslog forwarders that receive traffic from the Load Balancer.
Example backend pool
Go to Inbound rules and select 'Add a load balancing rule':
Frontent IP address: your Frontend IP configuration
Backend pool: your backend pool
Protocol: UDP
Port: 514
Backend port: 514
Create a health probe that checks TCP port 514.
The setup script we use when configuring the syslog daemon on each VM opens both UDP and TCP port 514, so the probe will be able to verify VM availability.
Once the probe is configured, go ahead and create the Load Balancer.
Your Load-Balanced VM setup for syslog forwarding is now ready for testing.
Refer to the steps in the “Testing Syslog forwarder scenarios” section to validate that logs are being received and forwarded correctly.
Load balanced VMSS
At this point, we’ve covered how to create a Load Balancer and configure syslog forwarders to relay logs to Microsoft Sentinel.
If you want more flexibility and the ability to handle log volume spikes, consider using a Virtual Machine Scale Set (VMSS). VMSS is a group of VMs that can automatically scale out (add instances) or scale in (remove instances) based on resource utilization.
Configure Azure Policy to automatically install Azure Monitor Agent on VMSS
This step ensures that any new VM instances created within the scale set are automatically configured with:
The Azure Monitor Agent (AMA) installed.
The correct Data Collection Rule (DCR) associated.
In other words, this guarantees that the agent responsible for sending logs is present and knows what to collect and where to send it.
To configure the policy:
Go to Azure Policy in the portal.
Search for "Enable Azure Monitor for VMSS with Azure Monitoring Agent (AMA)".
Click Assign.
Set the scope - ideally just the resource group that contains your VMSS.
Enable Policy enforcement to ensure compliance.
Once assigned, this policy will apply AMA and DCR configuration automatically to any VM instance created within the scale set.
Go to 'Parameters' and select:
Bring Your Own User-Assigned Managed Identity: false
VMI Data Collection Rule Resource Id: your DCRs resource ID
Configuring 'false' for the first setting will create a system assigned managed identity. In production environments thats not ideal, but its fine for small scale testing.
To get the DCR's resource ID go to the DCR resource, click 'JSON View' and cop the Resource ID from the top of the page:
DCR Resource ID
2. Create a Virtual Machine Scale Set:
Go to Azure Portal, search for Virtual Machine Scale Sets, and select Create.
In the setup wizard, set the scaling mode to Autoscaling.
Choose Ubuntu Server 22.04 as the image.
Select Standard_D2ls_v5 as the VM size.
This configuration provides a solid baseline for syslog forwarding with enough headroom to scale based on load.
VMSS 'Basics' UI
The next mandatory setting is enabling 'Application health monitoring'. For Azure orchestrated scaling this needs to be done. Use the following settings:
Health states: Binary - healthy or unhealthy
Protocol: TCP
Port number: 514
And probably the most important part of setting your Virtual Machine Scale Set right is the cloud-init script. You want to run the syslog configuration script as soon as a new VM is provisioned so that its ready to go immediately. Under advanced paste this into 'Custom data':
#cloud-config
runcmd:
- wget -O /tmp/Forwarder_AMA_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Forwarder_AMA_installer.py
- python3 /tmp/Forwarder_AMA_installer.py
Perfect. We can now create the VMSS.
Testing Syslog forwarder scenarios
In your syslog generator script, update the SYSLOG_SERVER variable to match the private IP address of your syslog forwarder VM or Load Balancer (if you're using one).
Script variables
Run the script on syslog generator VM:
python3 syslog_generator.py
Then validate if the logs are being received on syslog forwarder by running tcmdump:
tcpdump -i any port 514 -A -vv &
You should see an output like in the below screenshot.
Logs are flowing in
The last step is to verify if those logs are being received in Microsoft Sentinel. Go to Sentinel -> Logs and type 'Syslog':
Logs arrived at Microsoft Sentinel
In this guide, we walked through the process of setting up syslog forwarding to Microsoft Sentinel using several deployment scenarios. Starting with a simple single VM ("Big Boy"), we then explored more scalable and production-ready setups using load-balanced VMs and Virtual Machine Scale Sets (VMSS).
We covered key concepts like:
What syslog and syslog forwarding are, and why they matter for security monitoring.
How to configure a Linux-based syslog forwarder using rsyslog and the Azure Monitor Agent (AMA).
How to set up Data Collection Rules (DCRs) and connect your forwarders to Microsoft Sentinel.
How to use Azure Load Balancer and Azure Policy to automate and scale your logging infrastructure.
Whether you’re setting up a quick test environment or laying the foundation for a production deployment, these steps help ensure your logs flow reliably into Microsoft Sentinel even if you’re not a "Linux person."
Syslog via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion
The Syslog via AMA data connector in Microsoft Sentinel collects logs from many security appliances and devices. This article lists provider-supplied installation instructions for specific security appliances and devices that use this data connector. Contact the provider for updates, more information, or where information is unavailable for your security appliance or device.
To forward data to your Log Analytics workspace for Microsoft Sentinel, complete the steps in Ingest syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent. As you complete those steps, install the Syslog via AMA data connector in Microsoft Sentinel. Then, use the appropriate provider's instructions in this article to complete the setup.
For more information about the related Microsoft Sentinel solution for each of these appliances or devices, search the Azure Marketplace for the Product Type > Solution Templates or review the solution from the Content hub in Microsoft Sentinel.
Important
Solutions provided by third-party vendors might still reference a deprecated Log Analytics agent connector. These connectors are not supported for new deployments. You can continue to use the same solutions with the Syslog via AMA data connector instead.
Barracuda CloudGen Firewall
Follow instructions to configure syslog streaming. Use the IP address or hostname for the Linux machine with the Microsoft Sentinel agent installed for the Destination IP address.
Blackberry CylancePROTECT
Follow these instructions to configure the CylancePROTECT to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Cisco Application Centric Infrastructure (ACI)
Configure Cisco ACI system to send logs via syslog to the remote server where you install the agent. Follow these steps to configure Syslog Destination, Destination Group, and Syslog Source.
This data connector was developed using Cisco ACI Release 1.x.
Cisco Identity Services Engine (ISE)
Follow these instructions to configure remote syslog collection locations in your Cisco ISE deployment.
Cisco Stealthwatch
Complete the following configuration steps to get Cisco Stealthwatch logs into Microsoft Sentinel.
1. Sign in to the Stealthwatch Management Console (SMC) as an administrator.
2. In the menu bar, select Configuration > Response Management.
3. From the Actions section in the Response Management menu, select Add > Syslog Message.
4. In the Add Syslog Message Action window, configure parameters.
5. Enter the following custom format:
|Lancope|Stealthwatch|7.3|{alarm_type_id}|0x7C|src={source_ip}|dst={target_ip}|dstPort={port}|proto={protocol}|msg={alarm_type_description}|fullmessage={details}|start={start_active_time}|end={end_active_time}|cat={alarm_category_name}|alarmID={alarm_id}|sourceHG={source_host_group_names}|targetHG={target_host_group_names}|sourceHostSnapshot={source_url}|targetHostSnapshot={target_url}|flowCollectorName={device_name}|flowCollectorIP={device_ip}|domain={domain_name}|exporterName={exporter_hostname}|exporterIPAddress={exporter_ip}|exporterInfo={exporter_label}|targetUser={target_username}|targetHostname={target_hostname}|sourceUser={source_username}|alarmStatus={alarm_status}|alarmSev={alarm_severity_name}
6. Select the custom format from the list and OK.
7. Select Response Management > Rules.
8. Select Add and Host Alarm.
9. Provide a rule name in the Name field.
10. Create rules by selecting values from the Type and Options menus. To add more rules, select the ellipsis icon. For a Host Alarm, combine as many possible types in a statement as possible.
This data connector was developed using Cisco Stealthwatch version 7.3.2
Cisco Unified Computing Systems (UCS)
Follow these instructions to configure the Cisco UCS to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias CiscoUCS. Alternatively, directly load the function code. It might take about 15-minutes post-installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
Cisco Web Security Appliance (WSA)
Configure Cisco to forward logs via syslog to the remote server where you install the agent. Follow these steps to configure Cisco WSA to forward logs via Syslog
Select Syslog Push as a Retrieval Method.
This data connector was developed using AsyncOS 14.0 for Cisco Web Security Appliance
Citrix Application Delivery Controller (ADC)
Configure Citrix ADC (former NetScaler) to forward logs via Syslog.
1. Navigate to Configuration tab > System > Auditing > Syslog > Servers tab
2. Specify Syslog action name.
3. Set IP address of remote Syslog server and port.
4. Set Transport type as TCP or UDP depending on your remote syslog server configuration.
For more information, see the Citrix ADC (former NetScaler) documentation.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation. To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias CitrixADCEvent. Alternatively, you can directly load the function code. It might take about 15 minutes post-installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
This parser requires a watchlist named Sources_by_SourceType.
i. If you don't have watchlist already created, create a watchlist from Microsoft Sentinel in the Azure portal.
ii. Open watchlist Sources_by_SourceType and add entries for this data source.
ii. The SourceType value for CitrixADC is CitrixADC. For more information, see Manage Advanced Security Information Model (ASIM) parsers.
Digital Guardian Data Loss Prevention
Complete the following steps to configure Digital Guardian to forward logs via Syslog:
1. Sign in to the Digital Guardian Management Console.
2. Select Workspace > Data Export > Create Export.
3. From the Data Sources list, select Alerts or Events as the data source.
4. From the Export type list, select Syslog.
5. From the Type list, select UDP, or TCP as the transport protocol.
6. In the Server field, type the IP address of your remote syslog server.
7. In the Port field, type 514 (or other port if your syslog server was configured to use nondefault port).
8. From the Severity Level list, select a severity level.
9. Select the Is Active check box.
10. Select Next.
11. From the list of available fields, add Alert or Event fields for your data export.
12. Select a Criteria for the fields in your data export and Next.
13. Select a group for the criteria and Next.
14. Select Test Query.
15. Select Next.
16. Save the data export.
ESET Protect integration
Configure ESET PROTECT to send all events through Syslog.
1. Follow these instructions to configure syslog output. Make sure to select BSD as the format and TCP as the transport.
2. Follow these instructions to export all logs to syslog. Select JSON as the output format.
Exabeam Advanced Analytics
Follow these instructions to send Exabeam Advanced Analytics activity log data via syslog.
This data connector was developed using Exabeam Advanced Analytics i54 (Syslog)
Forescout
Complete the following steps to get Forescout logs into Microsoft Sentinel.
1. Select an Appliance to Configure.
2. Follow these instructions to forward alerts from the Forescout platform to a syslog server.
3. Configure the settings in the Syslog Triggers tab.
This data connector was developed using Forescout Syslog Plugin version: v3.6
Gitlab
Follow these instructions to send Gitlab audit log data via syslog.
ISC Bind
1. Follow these instructions to configure the ISC Bind to forward syslog: DNS Logs.
2. Configure syslog to send the syslog traffic to the agent. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Infoblox Network Identity Operating System (NIOS)
Follow these instructions to enable syslog forwarding of Infoblox NIOS Logs. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias Infoblox. Alternatively, you can directly load the function code. It might take about 15 minutes post-installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
This parser requires a watchlist named Sources_by_SourceType.
i. If you don't have watchlist already created, create a watchlist from Microsoft Sentinel in the Azure portal.
ii. Open watchlist Sources_by_SourceType and add entries for this data source.
ii. The SourceType value for InfobloxNIOS is InfobloxNIOS.
For more information, see Manage Advanced Security Information Model (ASIM) parsers.
Ivanti Unified Endpoint Management
Follow the instructions to set up Alert Actions to send logs to syslog server.
This data connector was developed using Ivanti Unified Endpoint Management Release 2021.1 Version 11.0.3.374
Juniper SRX
1. Complete the following instructions to configure the Juniper SRX to forward syslog:
• Traffic Logs (Security Policy Logs)
• System Logs
2. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
McAfee Network Security Platform
Complete the following configuration steps to get McAfee® Network Security Platform logs into Microsoft Sentinel.
1. Forward alerts from the manager to a syslog server.
2. You must add a syslog notification profile. While creating profile, to make sure that events are formatted correctly, enter the following text in the Message text box:
<SyslogAlertForwarderNSP>:|SENSOR_ALERT_UUID|ALERT_TYPE|ATTACK_TIME|ATTACK_NAME|ATTACK_ID |ATTACK_SEVERITY|ATTACK_SIGNATURE|ATTACK_CONFIDENCE|ADMIN_DOMAIN|SENSOR_NAME|INTERFACE |SOURCE_IP|SOURCE_PORT|DESTINATION_IP|DESTINATION_PORT|CATEGORY|SUB_CATEGORY |DIRECTION|RESULT_STATUS|DETECTION_MECHANISM|APPLICATION_PROTOCOL|NETWORK_PROTOCOL|
This data connector was developed using McAfee® Network Security Platform version: 10.1.x.
McAfee ePolicy Orchestrator
Contact the provider for guidance on how to register a syslog server.
Microsoft Sysmon For Linux
This data connector depends on ASIM parsers based on a Kusto Functions to work as expected. Deploy the parsers.
The following functions are deployed:
• vimFileEventLinuxSysmonFileCreated, vimFileEventLinuxSysmonFileDeleted
• vimProcessCreateLinuxSysmon, vimProcessTerminateLinuxSysmon
• vimNetworkSessionLinuxSysmon
Nasuni
Follow the instructions in the Nasuni Management Console Guide to configure Nasuni Edge Appliances to forward syslog events. Use the IP address or hostname of the Linux device running the Azure Monitor Agent in the Servers configuration field for the syslog settings.
OpenVPN
Install the agent on the Server where the OpenVPN are forwarded. OpenVPN server logs are written into common syslog file (depending on the Linux distribution used: e.g. /var/log/messages).
Oracle Database Audit
Complete the following steps.
1. Create the Oracle database Follow these steps.
2. Sign in to the Oracle database you created. Follow these steps.
3. Enable unified logging over syslog by Alter the system to enable unified logging Following these steps.
4. Create and enable an Audit policy for unified auditing Follow these steps.
5. Enabling syslog and Event Viewer Captures for the Unified Audit Trail Follow these steps.
Pulse Connect Secure
Follow the instructions to enable syslog streaming of Pulse Connect Secure logs. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias PulseConnectSecure. Alternatively, directly load the function code. It may take approximately 15 minutes after installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
RSA SecurID
Complete the following steps to get RSA® SecurID Authentication Manager logs into Microsoft Sentinel. Follow these instructions to forward alerts from the Manager to a syslog server.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias RSASecurIDAMEvent. Alternatively, you can directly load the function code. It may take approximately 15 minutes after installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
This data connector was developed using RSA SecurID Authentication Manager version: 8.4 and 8.5
Sophos XG Firewall
Follow these instructions to enable syslog streaming. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line. To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias SophosXGFirewall. Alternatively, directly load the function code. It might take about 15 minutes post-installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
Symantec Endpoint Protection
Follow these instructions to configure the Symantec Endpoint Protection to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line. To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias SymantecEndpointProtection. Alternatively, you can directly load the function code. It might take about 15 minutes post-installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
Symantec ProxySG
1. Sign in to the Blue Coat Management Console.
2. Select Configuration > Access Logging > Formats.
3. Select New.
4. Enter a unique name in the Format Name field.
5. Select the radio button for Custom format string and paste the following string into the field.
1 $(date) $(time) $(time-taken) $(c-ip) $(cs-userdn) $(cs-auth-groups) $(x-exception-id) $(sc-filter-result) $(cs-categories) $(quot)$(cs(Referer))$(quot) $(sc-status) $(s-action) $(cs-method) $(quot)$(rs(Content-Type))$(quot) $(cs-uri-scheme) $(cs-host) $(cs-uri-port) $(cs-uri-path) $(cs-uri-query) $(cs-uri-extension) $(quot)$(cs(User-Agent))$(quot) $(s-ip) $(sr-bytes) $(rs-bytes) $(x-virus-id) $(x-bluecoat-application-name) $(x-bluecoat-application-operation) $(cs-uri-port) $(x-cs-client-ip-country) $(cs-threat-risk)
6. Select OK.
7. Select Applyn.
8. Follow these instructions to enable syslog streaming of Access logs. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias SymantecProxySG. Alternatively, directly load the function code. It may take approximately 15 minutes after installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
Symantec VIP
Follow these instructions to configure the Symantec VIP Enterprise Gateway to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias SymantecVIP. Alternatively, directly load the function code. It may take approximately 15 minutes after installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
VMware ESXi
1. Follow these instructions to configure the VMware ESXi to forward syslog:
• VMware ESXi 5.0+
2. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
Note
The functionality of this data connector is reliant on a Kusto Function-based parser, which is integral to its operation. This parser is deployed as part of the solution installation.
Update the parser and specify the hostname of the source machines transmitting the logs in the parser's first line.
To access the function code within Log Analytics, navigate to the Log Analytics/Microsoft Sentinel Logs section, select Functions, and search for the alias VMwareESXi. Alternatively, directly load the function code. It may take approximately 15 minutes after installation to update. Although the solution references the deprecated Log Analytics agent connector, you can continue to use the same solution, including the referenced parser, with the Syslog via AMA data connector instead.
WatchGuard Firebox
Follow these instructions to send WatchGuard Firebox log data via syslog.
Regions where the SecQube Portal is currently installed
Azure US East
Azure UK South
Azure UK South (NHS Only)
Azure Europe, Sweden
UAE Central
Australia East
Regions where we plan to install the SecQube Portal in the near future
Azure Qatar
Azure US West
Azure US Central
Azure Singapore
If you are in a region where the portal is currently not installed, click here to request a deployment
Connecting the portal to Microsoft Sentinel or the Unified Portal is as straightforward as possible.
The process is as follows: sign up for the portal via the Microsoft Marketplace or Microsoft AppSource, if you want your billing to go through Microsoft. If you are an MSP, MSSP, or a service provider, you can alternatively connect via www.secqube.com/sign-up, create an account in the portal, and then purchase licensing through the portal using Stripe.
At the start-up configuration, the last option will supply a Lighthouse script, which enables the portal to access Microsoft Sentinel in read-only mode.
Then, by going to Settings in the menu, you will see Unified Portal Code setup. Add your Azure Subscription ID, click Update, and the remaining dialogue boxes will auto-populate with the organisation's data. Once this is complete, there is a fifteen-minute wait, after which the portal will be ready for use.
Billing is based on the size of your organisation. We offer a 30-day trial to test the SecQube portal. The pricing details for SecQube are as follows:
Connection to API: £2,000 per month
Each SOC Analyst: £200 per month
End Users (using Harvey): £4 per month
Flat Rate for Fewer Than 20 Users: £2,000 per month
For MSPs, MSSPs, and Service Providers: Please contact SecQube at partners@secqube.com to obtain a pricing schedule. We offer a scaling price discount for larger providers
A great question and one that is simple to answer, Microsoft Sentinel, Unified Portal and MS Graph for the day-today analyst tasks.
Take a look at our MSP Version which has been specifically developed to allow companies to offer enterprise grade monitoring to their clients right out of the box. Our pricing model is simple, a one off payment to get you set up and then you make a percentage of your clients usage per month. The more clients that signup to your portal, the more revenue you make. Contact us today to find discuss pricing.
Configuring the SecQube Solution is extremely easy, even for those who are less experienced. We use the Microsoft standard Azure Lighthouse to connect to Microsoft Sentinel, which is an automated configuration process. It's as running a pre-define script in Azure. This process takes around 2-5 minutes to complete. Once it is done, you just need to add your Azure Subscription into our portal, wait for 20minutes, and then you are good to go!
Any communication via email to SecQube or our support email is stored in Office 365 and Dynamics 365
Emails for user setup or emails to reset passwords will link you back to a secure website without revealing confidential information are not Office 365
No confidential information is sent out regarding alerts or incidents. Emails will only have a title and a link back to the portal.
We use SendMail (TM)for all emails from the portal. No confidential information is sent. All emails for the EU are kept in the EU; no emails are stored, emails can not be forwarded or stored outside of the portal
SecQube, does not share data with anyone outside of the SecQube company (SecQube has no subsidiaries)
No. SecQube, does not share data with anyone outside of the SecQube company (SecQube has no subsidiaries).
100% based in Azure, on a platform compliant with HIPAA, GDPR, SOC2 and many other compliance
Core security data stays in the client's MS Graph
Cyber Essentials and Cyber Essentials Plus approved
Data in the region of the client or chosen by the client
Security monitored in real-time with Microsoft Cloud Defender for Cloud, Defender EASM, Defender EDR, XDR, MDR (our internal MDR) and Sentinel or Unified Portal
(All data remains in Azure)
Company details (only that have been added at sign-up or by your admin)
Ticket Data and Change management data will contain data from Sentinel alerts (all data is stored in the region of Azure you deployed your portal)
User data (only the data added either at sign-up or by your admin)