☁️
CTHFM: Azure
Ctrlk
  • Welcome
  • Getting Started
    • Account Setup
  • Azure Fundamentals
    • Azure Fundamentals Overview
  • Azure CLI
    • Introduction to Azure CLI
    • Installing Azure CLI
    • CLI Commands
    • Resource Group Management
    • Creating and Managing Resources with Azure CLI
    • Managing IAM
    • Azure CLI Automation
    • Monitoring and Troubleshooting in Azure CLI
    • Azure CLI Overview
  • KQL
    • KQL Overview
  • Powershell
    • PowerShell for Azure
  • Bicep
    • Bicep File Structure
    • Variable Types
  • Azure Logging References
    • Logging
  • Threat Hunting
    • Threat Hunting in Azure
  • Sigma
    • Sigma Rule Structure
  • Microsoft Defender TI
    • Microsoft Defender Threat Intelligence
  • MITRE Att&ck
    • MITRE Att&ck
  • Microsoft Resources
    • Microsoft Incident Response Ninja Hub
    • Microsoft Defender XDR Ninja Hub
  • Azure Threat Research Matrix (ATRM)
  • Security Research & Resources
    • Azure Goat
    • Azure Security Research
  • Defender XDR
    • Defender XDR Overview
    • Defender XDR Licensing
    • Defender XDR Default Retention
    • Defender XDR Advanced Hunting Table Schemas
    • Automated Response Requirements
    • Supported Response Actions
  • Azure Sentinel
    • Sentinel Overview
    • Azure Sentinel Deployments
    • Supported Data
    • Workbook, Playbook, Notebook Comparison
    • Sentinel Workbooks
    • Entities
    • User and Entity Behavior Analytics
    • Anomaly Detection
    • Mult-Stage Attack Detection
    • Sentinel: Az CLI
  • Microsoft Defender
    • Microsoft Defender for Cloud References
    • Defender for Cloud: Az CLI
  • Azure Policy
    • Azure Policy
    • Azure Policy Components
    • Azure Policy Rules
    • Scope Azure Policy
    • Policy Assignments
    • Policy Effect
    • Initiative Definition
    • Policy Parameters
    • Remediation Task Structure
    • Use Cases for Azure Policy
    • Azure Policy: Az CLI
  • Intune
    • Intune Overview
    • Intune Licensing
    • Intune API Permission Scopes
    • Intune Sample Script Resources
  • Intune Logging
  • Windows Host Security
    • Windows System Architecture and OS Fundamentals
    • SysInternals
    • Basic vs Advanced Security Auditing
    • Sysmon
  • Adversary Emulation
    • AzureHound
    • AADInternals
    • RoadTools
    • Oh365UserFinder
    • GraphRunner
  • Incident Response
    • Incident Response
  • Automation
    • Automation Overview
    • Logic Apps
  • Packet Analysis
    • Wireshark Cheatsheet
    • TShark Cheatsheet
    • TCPDUMP Cheatsheet
    • Protocol Analysis Basics
    • HTTP Response Code Cheatsheet
    • RFC Protocol Mappings
    • PCAP Acquisition
  • Detection Lab
    • Detection Lab Introduction
    • Account Creation Instructions
    • Enable MFA Within Azure Tenant
    • Create an Azure Admin With Cloud Shell
    • Setup and Install Instructions
  • VSCode and Code Setup
  • Deploying Code
  • Enabling Logs for Log Analytics Workspace
  • Logging Into Windows VM
  • Verifying Logs in Log Analytics Workspace
  • Creating Detections: Azure Monitor
  • Cost Management: Billing Alarms
Powered by GitBook
On this page
  • Data Schema Reference
  • Windows Security Event Data Reference
  • DNS Over AMA Reference
  • Purview Reference
  1. Azure Sentinel

Supported Data

Data Schema Reference

The following is a list of supported data references both Azure and third party.

LogoMicrosoft Sentinel data source schema referenceMicrosoftLearn

Security Alert Data Schema

LogoMicrosoft Sentinel security alert schema referenceMicrosoftLearn

Windows Security Event Data Reference

LogoWindows security event sets that can be sent to Microsoft SentinelMicrosoftLearn

DNS Over AMA Reference

LogoMicrosoft Sentinel DNS over AMA connector reference - available fields and normalization schemaMicrosoftLearn

Purview Reference

LogoMicrosoft Purview Information Protection connector reference - audit log record types and activities support in Microsoft SentinelMicrosoftLearn

Last updated 1 year ago