Azure Configuration Guide for Cloud SIEM
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Overview
Cloud SIEM applies detection rules to all processed logs in Datadog to detect threats, like a targeted attack, a threat intel listed IP communicating with your systems, or an insecure resource modification. The threats are surfaced as Security Signals in the Security Signals Explorer for triaging.
This guide walks you through configuring Microsoft Azure to send logs to Datadog so that you can start detecting threats on your Azure Platform logs.
The Azure Native integration (available for customers on Datadog's US3 site) has different log collection setup instructions. If you are using the Azure Native integration, select
US3 in the Datadog Site dropdown menu and follow the instructions in
Microsoft Azure log collection.
Click the button below and fill in the form on Azure portal. After completing the form, the Azure resources required to send activity logs into your Datadog account are deployed for you.
- Select an existing resource group or create a new one.
- Select a region.
- Select true for Send Activity Logs.
- Enter your Datadog API key.
- Enter names for your resources. See Optional Parameters for more information.
- Click Create + review.
- After the validation passes, click Create.
After the deployment is completed successfully, go to Log Explorer and enter service:azure
in the search query to view your Azure logs.
The section walks you through the manual installation steps so that you can send Azure Platform logs to Datadog:
- Create a resource group
- Create an Event Hubs namespace
- Create an Azure event hub
- Create an Azure Function App
- Add a new function to your Function App
- Forward Azure services logs to the event hub
Create a resource group
If you want to use an existing resource group, skip to Create an Event Hubs namespace.
- Go to Azure Resource groups page.
- Click Create.
- Enter a name for the resource group.
- Optionally, click Next: Tags if you want to add tags.
- Click Review + create.
- After the validation passes, click Create.
Create an Event Hubs namespace
- Navigate to Azure Event Hubs.
- Click Create.
- In the Resource group dropdown menu, select the resource group you want to add the Event Hub to.
- Enter a name for the namespace.
- Select a location for the namespace.
Note: The Event Hub must be in the same Location as the resource you want to submit logs from. For activity logs or other account-wide log sources, you can choose any region.
- Select a pricing tier.
- Leave the throughput units (for standard tier) or processing units (for premium tier) as it is.
- Click Review + create.
- After validation succeeds, click Create.
- After the deployment is completed successfully, click Go to resource.
Create an event hub
- In the Event Hubs namespace you just created, click + Event Hub.
- Enter a name for the event hub.
- Optionally, configure the partition count and retention options.
- Click Review + create.
- After validation succeeds, click Create.
Create an Azure Function App
Create a new Function App. If you are using an existing function app, skip to Add a new function to your Function App.
- Navigate to Function App.
- Click Create.
- Select a resource group for the function app.
- Enter a name for the function app.
- Leave the selection to deploy to code.
- In the Runtime stack dropdown menu, select Node.js.
- Select a region for your function app.
- Select an operating system and plan type.
- Click Next: Storage.
- Select a storage account in the dropdown menu.
- Click Review + create.
- After validation succeeds, click Create.
- After the deployment is completed successfully, click Create a function.
Add a new function to your Function App
- Navigate to the function app if you are using an existing one. Click Functions in the left side menu.
- Click Create.
- Select Azure Event Hub trigger.
- Enter a name for the new function.
- In Event Hub connection, click New.
- In the Event Hub connection dropdown menu, select the event hub you created earlier.
- Click OK.
- In the Event Hub name, enter the name of the event hub you created earlier.
- Click Create.
Add the Datadog Azure function
- In the new function, select Code + Test in the left side menu.
- Copy and paste the Datadog-Azure function code to your
index.js
file. - Replace
<DATADOG_API_KEY>
with your Datadog API on line 22 of the function code. - If you are not using the Datadog US1 site, replace
DD_SITE
with your Datadog site parameter on line 23 of the function code. - Click Save.
- Click Integrations in the left side menu.
- Click Azure Event Hubs.
- Set
Event parameter name
to eventHubMessages
. Event Hub Cardinality
must be set to Many
.- Set
Event Hub Data Type
to empty. - Click Save.
- Verify your setup is correct by running the function and then checking the Datadog log explorer for the test message. The test log event must be in valid JSON format. For example:
{
is_test:true,
name: "Datadog Test"
}
Forward Azure services logs to Event Hub
Forward Activity logs to Event Hub
- Navigate to Azure Activity log.
- Click Export Activity Logs.
- Click Add diagnostic settings.
- Enter a name for the diagnostic setting.
- Select the categories of logs you want to send to Datadog.
- Select Stream to an event hub.
- Select the event hub namespace created previously.
- Click Save.
Forward resource logs to Event Hub
- Navigate to the resource from which you want to send resource logs.
- Under Monitor in the left side menu, click Diagnostic settings.
- Click Add diagnostic setting.
- Enter a name for the diagnostic setting.
- Select allLogs.
- Under the Destination details section, select Stream to an event hub.
- Select the event hub namespace created previously.
- Click Save.
Go to Log Explorer and enter service:azure
in the search query to view your Azure logs.
Use Cloud SIEM to triage Security Signals
Cloud SIEM applies out-of-the-box detection rules to all processed logs, including the Azure Platform logs you have just set up. When a threat is detected with a detection rule, a Security Signal is generated and can be viewed in the Security Signals Explorer.
- Go to the Cloud SIEM Signals Explorer to view and triage threats. See Security Signals Explorer for further details.
- See out-of-the-box detection rules that are applied to your logs.
- Create new rules to detect threats that match your specific use case.
Further Reading
Documentation, liens et articles supplémentaires utiles: