NETWORK ADMINISTRATIONSsnmp

Ingest CEF logs from Network devices to Microsoft Sentinel | 1hr Complete Demonstration

What is Microsoft Sentinel? – https://youtu.be/guA9refsy7Y
Get started with Microsoft Sentinel – https://youtu.be/H2ifC0JfrqA
How to Set up Microsoft Sentinel? – https://youtu.be/BOOggQAcOnA
What is Microsoft Sentinel Data Connector? https://youtu.be/Q7y3DyZONbM
Enabling Data Connector – https://youtu.be/cvGLgjNkpn4
Enable Microsoft Entra Id Data Connector – https://youtu.be/XrOyTe0gUGU
Enable Microsoft Defender XDR Connector – https://youtu.be/CRCFG1POp_o
Enable Microsoft Defender Threat Intelligence Connector – https://youtu.be/hUQ3sA72Ics
Ingest logs from Windows Machines to Microsoft Sentinel – https://youtu.be/9lZdpCab95g
Ingest logs from Linux Machines to Microsoft Sentinel – https://youtu.be/W1YQw0H1iV8
Ingest logs from Network devices Routers, switches, Firewall and Proxy to Microsoft Sentinel – https://youtu.be/BLqNvaF5nXg

Playlist –
What is SIEM Solution? | Security Information and Event Management – https://youtu.be/IKzNfD8LpOA
SIEM Solution | What are data types in SIEM solution? – https://youtu.be/Cnr7cT1e1Dw
SIEM solution | How data ingestion works in SIEM solutions? – https://youtu.be/yfkGK371qEA
SIEM Solution | How data is stored in SIEM solutions? – https://youtu.be/U97thKBm5EY
SIEM Solution | How data parsing works in SIEM solutions? – https://youtu.be/mdXnd7ORpiE
SIEM Solution | Data Normalization and Indexing – https://youtu.be/qpud92U2xmM
SIEM Solution | What is data correlation in SIEM solutions? – https://youtu.be/E-WDwYdpjWg
SIEM Solution | How data enrichment works in SIEM solutions? – https://youtu.be/vgRGEgfRusE
Microsoft Azure Log Analytics Worksapce – https://youtu.be/2tSLfd02VLc
Microsoft Azure Log Analytics Workspace | Detailed Tutorial – https://youtu.be/2ZZrNiXxk28
Azure Monitor | What Azure Monitor Agent? – https://youtu.be/OrMhTdyd0Kc
Azure Monitor | Data Collection Rules | Detailed Video – https://youtu.be/rsi-RAzq_m0
Azure Monitor | Deploy Azure Monitor Agent on Windows Servers | Data Collection Rule | Tutorial – https://youtu.be/AWYSVyMRw4E
Azure Monitor | Custom Windows Logs Collection | Azure Monitor Agent – https://youtu.be/uPjCE1KZqR4
Azure Monitor | Deploy Azure Monitor Agent on Linux | Data Collection Rule | Tutorial – https://youtu.be/hse77lz3Ba4
What is Azure ARC? – https://youtu.be/HwmRsDRuskk
Azure ARC for Server | Deployment | Getting started – https://youtu.be/dcdtk5N0kYI
Azure ARC Onboard Windows Servers | Detailed Video – https://youtu.be/sw1DtwMR2gc
Automate Server Onboarding – Azure Arc – https://youtu.be/dAxIDfYc3Os
Azure Arc | Onboard Windows Servers from Group Policy Object – https://youtu.be/A2Zf9ExQVVw
Azure Arc-Enabled Servers | Linux Server Onboarding – https://youtu.be/pALL_IjJ4H4
Azure Arc- Enabled Servers | Portal walkthrough and Architecture – https://youtu.be/s695NZ4a7GE

source

by Concepts Work

simple network management protocol

3 thoughts on “Ingest CEF logs from Network devices to Microsoft Sentinel | 1hr Complete Demonstration

  • Thanks for the detailed video.
    How come data will be normalized because different network devices will have different log formats and will be sending to the same table i.e. same schema.
    Also, in my case I don't have CEF connector installed and all the network devices sending logs to the same table i.e. syslog and the data is a mess because of no normalization.
    I want to achieve something like a different table for a different log format from network devices.

Comments are closed.