Cisco ETD (using Azure Functions) connector for Microsoft Sentinel

The connector fetches data from ETD api for threat analysis

This is autogenerated content. For changes, contact the solution provider.

Connector attributes

Connector attribute Description
Log Analytics table(s) CiscoETD_CL
Data collection rules support Not currently supported
Supported by Cisco Systems

Query samples

Incidents aggregated over a period on verdict type

CiscoETD_CL 
| summarize ThreatCount = count() by verdict_category_s, TimeBin = bin(TimeGenerated, 1h) 
| project TimeBin, verdict_category_s, ThreatCount 
| render columnchart

Prerequisites

To integrate with Cisco ETD (using Azure Functions) make sure you have:

  • Microsoft.Web/sites permissions: Read and write permissions to Azure Functions to create a Function App is required. See the documentation to learn more about Azure Functions.
  • Email Threat Defense API, API key, Client ID and Secret: Ensure you have the API key, Client ID and Secret key.

Vendor installation instructions

Note

This connector uses Azure Functions to connect to the ETD API to pull its logs into Microsoft Sentinel.

Follow the deployment steps to deploy the connector and the associated Azure Function

IMPORTANT: Before deploying the ETD data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).

Azure Resource Manager (ARM) Template

Use this method for automated deployment of the Cisco ETD data connector using an ARM Template.

  1. Click the Deploy to Azure button below.

    Deploy To Azure

  2. Select the preferred Subscription, Resource Group and Region.

  3. Enter the WorkspaceID, SharedKey, ClientID, ClientSecret, ApiKey, Verdicts, ETD Region

  4. Click Create to deploy.

Next steps

For more information, go to the related solution in the Azure Marketplace.