This page has been updated to align with the new Grail security events table. For the complete list of updates and actions needed to accomplish the migration, follow the steps in the Grail security table migration guide.
Dynatrace integration with Microsoft Sentinel, a cloud-native security information and event management (SIEM), allows users to unify and contextualize security findings across DevSecOps tools and products, enabling central prioritization, visualization, and automation of security findings.
The integration ingests security alerts originated from various connectors, including Microsoft products, such as Microsoft Defender for Cloud, as well as external product connectors.
Microsoft Sentinel exports security findings to Azure Event Hubs.
An Azure Function app pre-processes the events and sends them to Dynatrace, taking advantage of the OpenPipeline dedicated security events ingest endpoint.
The fetched data is mapped to the Dynatrace Semantic Dictionary.
Data is stored in Grail in a unified format, in a default bucket called default_securityevents
. For details, see Built-in Grail buckets.
See below for the Microsoft Sentinel and Dynatrace requirements.
Permissions:
storage:security.events:read
.Tokens:
openpipeline.events_security
scope and save it for later. For details, see Dynatrace API - Tokens and authentication.In Dynatrace, open Dynatrace Hub.
Look for Microsoft Sentinel and select Install.
Select Set up, then select Configure new connection.
Follow the on-screen instructions to set up the ingestion.
Verify configuration by running the following query in Notebooks:
fetch security.events| filter dt.system.bucket == "default_securityevents"| filter event.provider=="Microsoft Sentinel"
Once you ingest your Microsoft Sentinel data into Grail, you can monitor your data in the app (in Dynatrace, go to Settings > Microsoft Sentinel).
You can view
A chart of ingested data from all existing connections over time
A table with information about your connections
You can create your own dashboards or use our templates to visualize and analyze container vulnerability findings.
You can create your own workflows or use our templates to automate and orchestrate container vulnerability findings.
You can query ingested data in Notebooks or Security Investigator
, using the data format in Semantic Dictionary.
You can evaluate, triage, and investigate detection findings with the Threats & Exploits app.
To stop sending events to Dynatrace
This removes the Dynatrace resources created for this integration.
Detection finding events store the individual detection findings per affected object represented by an affected Azure resource.
The actor
namespace is added to store all the actor-related fields if present in an alert:
actor.ips
represents the list of IPs of the suspicious actor
actor.fqdns
represents the list of FQDNs of the suspicious actor
actor.geo.country.name
represents the country name of the suspicious actor
actor.geo.city.name
represents the city name of the suspicious actor
The azure
namespace is added to store Azure-related fields in an alert:
azure.tenant.id
represents the ID of the Azure tenant
azure.subscription
represents the ID of the Azure subscription
azure.resource.id
represents the ID of the affect Azure resource
azure.resource.group
represents the name of the Azure resource group
azure.resource.type
represents the name of the Azure resource type
azure.resource.name
represents the name of the Azure resource
dt.security.risk.level
is mapped directly from the severity level (AlertSeverity
) set by Microsoft Sentinel.
dt.security.risk.score
is mapped directly from the severity level (AlertSeverity
) set by Microsoft Sentinel.
dt.security.risk.level (mapped from AlertSeverity ) | dt.security.risk.score (mapped from AlertSeverity ) |
---|---|
High -> HIGH | High -> 8.9 |
Medium -> MEDIUM | Medium -> 6.9 |
Low -> LOW | Low -> 3.9 |
Informational -> NONE | 0.0 |