Netskope Help

Azure Sentinel Plugin for Log Shipper

This document explains how to configure the Azure Sentinel integration with the Log Shipper module of the Netskope Cloud Exchange platform. This integration allows ingestion of Netskope events and alerts into an Azure Sentinel tenant.

Prerequisites
  • A Netskope Tenant (or multiple, for example, production and development/test instances).

  • A Netskope Cloud Exchange tenant with the Log Shipper module already configured.

  • An Azure Sentinel instance.

Workflow
  1. Obtain the Azure Sentinel Workspace ID and Primary Key.

  2. Configure the Azure Sentinel plugin.

  3. Configure Log Shipper Mapping Files.

  4. Configure Log Shipper Business Rules.

  5. Create Log Shipper SIEM mappings.

  6. Validate the plugins.

  1. Go to your Azure Sentinel instance https://portal.azure.com/.

    image1.png
  2. Log in to your Sentinel instance.

    image2.png
  3. Under the Azure Services section click More Services.

    image3.png
  4. Find and click Azure Sentinel.

    image4.png
  5. Click Create.

    image5.png
  6. Click Create a new workspace. Select Resource Group, enter a name, and select your Region. Click Review + Create.

    image6.png
  7. Click Create.

    image7.png
  8. It will take a few seconds to deploy. After deployment succeeds, click Refresh. Click on the Workspace that you created and click Add.

    image8.png
  9. It will take a few seconds to add a workspace.

    image9.png
  10. After successfully adding a workspace, go to Home All Services Log Analytics workspaces.

    image10.png
  11. Click on the workspace name that you created.

    image11.png
  12. Click on Agent Management.

    image12.png
  13. Copy and save the Workspace ID and Primary Key.

  1. Go to Settings and then Plugins.

  2. Select the Azure Sentinel box to open the plugin creation dialog.

  3. Enter a Configuration Name.

  4. Select the valid Mapping. (Default Mapping for all plugins are available. If you want to Create New Mapping, follow the CLS guide to Create New Mapping.)

    image13.png
  5. Click Next.

    image14.png
  6. Enter Workspace ID, Primary Key, Alert Log Type Name (Based on this name, schema for alerts will be created in Log Analytics Workspace with suffix "_CL" (default: Netskope_Alerts) and Event Log Type Name (Based on this name, schema for events will be created in Log Analytics Workspace with suffix "_CL" (default: Netskope_Events)

  7. Click Save.

    image15.png

Log Shipper comes with a default mapping file for Azure Sentinel plugin. If you need all the fields in Netskope alerts and events to be ingested on Azure Sentinel, then do not make any changes to this default mapping file.

If you want only specific fields of alerts and events to be ingested on Azure Sentinel, then create a new mapping file and add those fields into the contents of the default mapping file so Log Shipper will ingest only those particular attributes.

Skip this step if you do not want to filter out alerts or events before ingestion.

  1. Go to Log Shipper > Business Rules.

    image16.png
  2. Click Create New Rule.

    image17.png
  3. Enter a Rule Name and select the filters to use.

  4. Click Save.

    image18.png
  1. Go to Log Shipper > SIEM Mappings and click Add SIEM Mapping.

    image19.png
  2. Select a Source Configuration, Business Rule, and Destination Configuration.

  3. Click on Save.

    image20.png

To validate the plugin workflow, you can check from Netskope Cloud Exchange and from Azure Sentinel instance.

To validate from Netskope Cloud Exchange:

  • Go to Logging.

    image21.png

To validate from the Azure Sentinel instance:

  1. Go to Home All Services Log Analytics workspaces.

    image10.png
  2. Click on the workspace name that you created.

    image11.png
  3. Click Logs.

    image22.png
  4. Hover over Custom Logs Netskope_Events_CL and click See preview data, or you can write your query to filter data.

    image23.png