I was wondering if anyone had any experience in implementing Azure ATP as a log source for McAfee SIEM. Can anyone provide any work instructions on how to retrieve logs, and if Azure ATP supports forwarding syslog to the event receiver. if so what needs to be done?
Any assistance would be appreciated,
I believe the Office 365 log collector can get this data.
These are recorded in the Graph/Management API as ThreatIntelligence* log types.
At a technical level, the event receiver connects to the Azure APIs at a regular interval to collect this data, so no 'forwarding' is needed. You will just need to configure a new SIEM application inside your Azure tenant.
In case of forwarding events from Azure thru Syslog settings, you should work with a custom parser.
This should work fine.
Azure ATP Syslog Settings
Azure ATP security alerts are in CEF format
This eliminates the need to create a regular expression
for each capture, and will allow the data to be mapped using the CEF key names found
in the log.
For custom parsers please take a look into this documentation:
In addition, I am not sure, but I believe that McAfee is working to create built-in resources to support this a Data Source in a native installation.
brenta's steps can an option as well.