{"id":17789,"date":"2020-02-20T13:00:58","date_gmt":"2020-02-20T21:00:58","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/20\/news-11522\/"},"modified":"2020-02-20T13:00:58","modified_gmt":"2020-02-20T21:00:58","slug":"news-11522","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/20\/news-11522\/","title":{"rendered":"Free import of AWS CloudTrail logs through June 2020 and other exciting Azure Sentinel updates"},"content":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Thu, 20 Feb 2020 14:00:44 +0000<\/strong><\/p>\n<p>SecOps teams are increasingly challenged to protect assets across distributed environments, analyze the growing volume of security data, and prioritize response to real threats.<\/p>\n<p>As a cloud-native SIEM solution (security information and event management), Azure Sentinel uses artificial intelligence (AI) and automation to help address these challenges. Azure Sentinel empowers SecOps teams to be more efficient and effective at responding to threats in the cloud, on-premises, and beyond.<\/p>\n<div class=\"interruption interruption-image-type\">\n<div class=\"interruption-image-container\"> \t\t\t\t<img decoding=\"async\" class=\"interruption-image\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Azure-Sentinal.png\"> \t\t\t<\/div>\n<div class=\"interruption-content-wrap\">\n<h3 class=\"interruption-title\">Azure Sentinel<\/h3>\n<p class=\"interruption-text\">Intelligent security analytics for your entire enterprise.<\/p>\n<p> \t\t\t\t<a class=\"interruption-link c-glyph\" href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\" style=\"background-color:; border: none; color:!important;\">Learn more<\/a> \t\t\t<\/div>\n<p><!-- .interruption-content-wrap --> \t\t<\/div>\n<p><!-- .interruption -->  \t\t <\/p>\n<p>Our innovation continues, and we have some exciting news to share for the RSA 2020 conference including the ability to import AWS CloudTrail data for free through June 2020, opportunities to win up to $1,000 for community contributions, and many other product updates.<\/p>\n<h3>Enable unified response across multiple clouds\u2014now with free import of AWS CloudTrail data through June 2020<\/h3>\n<p>More than <a href=\"https:\/\/medium.com\/@jaychapel\/multi-cloud-hybrid-cloud-and-cloud-spend-statistics-on-cloud-computing-ba4c194d2e10\" target=\"_blank\" rel=\"noopener noreferrer\">60 percent of enterprises<\/a> have a hybrid cloud strategy\u2014a combination of private and multi-cloud deployments. We\u2019re committed to help SecOps teams defend the entire stack, not just Microsoft workloads. That\u2019s why Azure Sentinel includes built-in connectors to bring together data from Microsoft solutions with data from other cloud platforms and security solutions.<\/p>\n<p>You can already ingest data from Azure activity logs, Office 365 audit logs, and alerts from Microsoft 365 security solutions at no additional cost. To further help our customers secure their entire multi-cloud estate, today we\u2019re announcing the ability to import your AWS CloudTrail logs into Azure Sentinel at no additional cost from February 24, 2020 until June 30, 2020.<\/p>\n<p>New and existing customers of Azure Sentinel can take advantage of this offer by using the built-in connector for AWS CloudTrail logs. Data retention charges after 90 days period and other related charges are applicable during this time as per Azure Sentinel terms. Learn more about <a href=\"https:\/\/azure.microsoft.com\/en-us\/pricing\/details\/azure-sentinel\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Sentinel pricing<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-1.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90646 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-1.png\" alt=\"Image of AWS CloudTrail logs.\" width=\"1318\" height=\"735\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-1.png 1318w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-1-300x167.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-1-1024x571.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-1-768x428.png 768w\" sizes=\"auto, (max-width: 1318px) 100vw, 1318px\" \/><\/a><\/p>\n<p>Once connected to your AWS CloudTrail logs, you can visualize and get relevant insights using built-in workbooks. You can even customize these dashboards and combine insights from other sources to meet your needs:<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90647 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2.png\" alt=\"Image of AWS network activities.\" width=\"1359\" height=\"679\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2.png 1359w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2-300x150.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2-1024x512.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2-768x384.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-2-1200x600.png 1200w\" sizes=\"auto, (max-width: 1359px) 100vw, 1359px\" \/><\/a><\/p>\n<p>Detections and hunting queries developed by Microsoft Security experts will make it easier to identify and respond to potential threats in your AWS environment:<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-3.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-90648 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-3.png\" alt=\"Image showing credential abuse in AWS CloudTrail.\" width=\"1304\" height=\"764\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-3.png 1304w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-3-300x176.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-3-1024x600.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/02\/Azure-Sentinel-updates-3-768x450.png 768w\" sizes=\"auto, (max-width: 1304px) 100vw, 1304px\" \/><\/a><\/p>\n<h3>Gain visibility into threats targeting IoT<\/h3>\n<p>With the exponential growth in connected devices creating an uptick in attacks targeting IoT, it is critical for enterprise SecOps teams to include IoT data in their scope. A new Azure Security Center for IoT connector makes it easy for customers to onboard data from Azure IoT Hub-managed deployments into Azure Sentinel. Customers can now monitor alerts across all IoT Hub deployments along with other related alerts in Azure Sentinel, inspect and triage IoT incidents, and run investigations to track an attacker&#8217;s lateral movement within their enterprise.<\/p>\n<p>With this announcement Azure Sentinel is the first SIEM with native IoT support, allowing SecOps and analysts to identify threats in these complex converged environments.<\/p>\n<p>In addition, Upstream Security, a cloud-based automotive cybersecurity detection and response company, is launching integration with Azure Sentinel. This will enable customers to send threats detected by Upstream Security&#8217;s C4 platform to Azure Sentinel for further investigation.<\/p>\n<h3>Collect data from additional data sources<\/h3>\n<p>We\u2019re continually adding new data connectors from leading security solutions and partners. Each of these data connectors have sample queries and dashboards to help you start working with the data immediately in Azure Sentinel:<\/p>\n<ul>\n<li><strong>Forcepoint<\/strong>\u2014Three new connectors enable customers to bring in data from Forcepoint NextGen Firewall logs (NGFW), Cloud Access Security Broker (CASB) logs and events, and Data Loss Prevention (DLP) incident data in Azure Sentinel.<\/li>\n<li><strong>Zimperium<\/strong>\u2014Customers can use the Zimperium Mobile Threat Defense (MTP) connector to get Zimperium threat logs in Azure Sentinel.<\/li>\n<li><strong>Squadra technologies<\/strong>\u2014Customers can get their Squadra secRMM (security removable media manager) event data for the USB removable devices in Azure Sentinel.<\/li>\n<\/ul>\n<h3>Bring SIGMA detections to Azure Sentinel<\/h3>\n<p>The SOC Prime <a href=\"https:\/\/my.socprime.com\/en\/tdm\/\" target=\"_blank\" rel=\"noopener noreferrer\">Threat Detection Marketplace<\/a>\u2014which includes 950+ rules mapped to MITRE ATT&amp;CK to address over 180 attacker techniques\u2014now supports Azure Sentinel analytics rules. The SOC Prime marketplace provides unprecedented access to the latest threat detection content from the SIGMA community, SOC Prime team, and its Threat Bounty Program members. New detection rules are continuously created and updated by security researchers and published daily at the SOC Prime marketplace, helping companies to detect latest threats, vulnerability exploitation attempts and enable TTP-based threat hunting. Once the rules are published, using the Azure Sentinel integration you can instantly deploy them from within TDM to your Azure Sentinel instance with just one click.<\/p>\n<h3>Use ReversingLabs threat intelligence to inform threat response<\/h3>\n<p>ReversingLabs brings two new integrations to Azure Sentinel, enabling customers to leverage rich ReversingLabs threat intelligence for hunting and investigation in Azure Sentinel. The first integration features an Azure Sentinel Notebooks sample that connects to the Reversing Labs API to enable hunting scenarios that include ReversingLabs threat intelligence data. In addition, a new ReversingLabs TitaniumCloud connector for Azure Logic Apps and sample playbook enable security incident responders to automatically identify key information about file-based threats to rapidly triage incoming alerts.<\/p>\n<h3>Detect threats with greater confidence using new machine learning models<\/h3>\n<p>Azure Sentinel uses AI-based Fusion technology to stitch together huge volumes of low and medium fidelity alerts across different sources and then elevates the combined incidents to a high priority alert that security professionals can investigate. <a href=\"https:\/\/aka.ms\/mas-fusion\" target=\"_blank\" rel=\"noopener noreferrer\">Learn how Azure Sentinel evaluated nearly 50 million suspicious signals<\/a> for Microsoft in a single month to create just 23 high confidence incidents for our SecOps team to investigate.<\/p>\n<p>In addition to the existing machine learning detections that look for multi-stage attacks, we are introducing several new scenarios in public preview using <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/windows\/microsoft-defender-atp\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Defender Advanced Threat Protection (ATP)<\/a> and Palo Alto logs. These new detections will help SecOps teams to identify attacks that may otherwise be missed and reduce the mean time to remediate threats.<\/p>\n<h3>Manage incidents across multiple tenants and workspaces<\/h3>\n<p>Managed security service providers and large enterprises often need a central place to manage security incidents across multiple workspaces and tenants. Integration of Azure Sentinel with Azure Lighthouse now lets you view and investigate incidents from different tenants and workspaces in a central pane. This will also help enterprises who need to keep separate workspaces in different regions to meet regulatory requirements while managing incidents in a central place.<\/p>\n<h3>Join the Azure Sentinel private preview in Azure Government<\/h3>\n<p>Azure Sentinel is now available in private preview in Azure Government, starting with US Gov Virginia region. To join the preview please contact us at <a href=\"mailto:sentinelazuregov@microsoft.com\" target=\"_blank\" rel=\"noopener noreferrer\">sentinelazuregov@microsoft.com<\/a>.<\/p>\n<p>Azure Sentinel is currently going through the FedRAMP-High certification process, and Microsoft anticipates achieving compliance by the summer of 2020.<\/p>\n<h3>Get rewarded up to $1,000 for your contributions to the Azure Sentinel community<\/h3>\n<p>Cybersecurity is a community-driven effort with defenders helping each other to scale against sophisticated, rapidly evolving threats. Azure Sentinel has a thriving community of threat hunters that share hunting, detection and investigation queries, automated workflows, visualizations, and much more in the Azure Sentinel GitHub repository.<\/p>\n<p>We\u2019re announcing a special program for our threat hunter community, featuring:<\/p>\n<ul>\n<li>Rewards from $250 up to $1,000 for a <a href=\"https:\/\/aka.ms\/sentinelrewardswishlist\" target=\"_blank\" rel=\"noopener noreferrer\">variety of contributions<\/a>. The first submission that meets the requirements gets the reward. Rewards are subject to <a href=\"https:\/\/aka.ms\/sentinelrewardsterms\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft terms and conditions<\/a>.<\/li>\n<li>Recognition of top community contributors on <a href=\"https:\/\/aka.ms\/sentinelpageoffame\" target=\"_blank\" rel=\"noopener noreferrer\">GitHub<\/a>, in blog posts, and Tweets.<\/li>\n<\/ul>\n<p>Review the <a href=\"https:\/\/aka.ms\/sentinelrewards\" target=\"_blank\" rel=\"noopener noreferrer\">Recognition and Rewards documentation<\/a> and see our newly <a href=\"https:\/\/aka.ms\/threathunters\" target=\"_blank\" rel=\"noopener noreferrer\">redesigned GitHub experience<\/a>.<\/p>\n<h3>Try Azure Sentinel and visit us at the RSA Conference 2020<\/h3>\n<p>Since the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/09\/24\/azure-sentinel-cloud-native-siem-empowers-defenders-generally-available\/\" target=\"_blank\" rel=\"noopener noreferrer\">general availability of Azure Sentinel<\/a> last September, there are <a href=\"https:\/\/azure.microsoft.com\/en-us\/case-studies\/?term=Sentinel\" target=\"_blank\" rel=\"noopener noreferrer\">many examples<\/a> of how Azure Sentinel helps customers like ASOS, Avanade, University of Phoenix, SWC Technology Partners, and RapidDeploy improve their security across diverse environments while reducing costs.<\/p>\n<p>It\u2019s easy to get started. You can access the new features in Azure Sentinel today. If you are not using Azure Sentinel, we welcome you to <a href=\"https:\/\/aka.ms\/microsoftazuresentinel\" target=\"_blank\" rel=\"noopener noreferrer\">start a trial<\/a>.<\/p>\n<p>Our team will be showcasing Azure Sentinel at the RSA Conference next week. Take a look at all the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/rsa\" target=\"_blank\" rel=\"noopener noreferrer\">featured sessions, theater sessions and other activities<\/a> planned across Microsoft Security technologies. We hope to meet you all there.<\/p>\n<p>Also, bookmark the\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>\u00a0to keep up with our expert coverage on security matters and follow us at\u00a0<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>\u00a0for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/20\/free-import-of-aws-cloudtrail-logs-through-june-2020-and-other-exciting-azure-sentinel-updates\/\">Free import of AWS CloudTrail logs through June 2020 and other exciting Azure Sentinel updates<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/20\/free-import-of-aws-cloudtrail-logs-through-june-2020-and-other-exciting-azure-sentinel-updates\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Thu, 20 Feb 2020 14:00:44 +0000<\/strong><\/p>\n<p>Learn how Azure Sentinel helps SecOps to improve security across hybrid environments with free import of AWS CloudTrail logs through June 2020 and other product updates.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/02\/20\/free-import-of-aws-cloudtrail-logs-through-june-2020-and-other-exciting-azure-sentinel-updates\/\">Free import of AWS CloudTrail logs through June 2020 and other exciting Azure Sentinel updates<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21493,21500,4500],"class_list":["post-17789","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-ai-and-machine-learning","tag-azure-security","tag-cybersecurity"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17789"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17789\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17789"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}