Data Connector built for Azure Network Security Groups
Data Connector built for Azure Network Security Groups
Data Connector built for Azure Network Security Groups | Next-Gen SIEM Third-Party Integrations | Third-Party Integration an…
Overview
Easily ingest Microsoft Azure Network Security Groups diagnostic logs for further analysis, threat detection and investigation. These logs provide detailed insights
into network traffic, including source/destination IPs, ports, and actions taken.
Requirements
Subscription: Falcon Next-Gen SIEM or Falcon Next-Gen SIEM 10GB.
Default roles :
Falcon Administrator
Connector Manager
Additional requirements :
Your environment must include a functioning deployment of Microsoft Azure Network Security Groups
Global Administrator or Security Administrator access to the Microsoft 365 Azure and Defender portals
Access to the Data Connector built for Microsoft Azure Network Security Groups app in the CrowdStrike Store
Note: If the app is not available, contact your sales engineer to have it enabled or provisioned.
Important:Some of these steps are performed in third-party products. CrowdStrike does not validate any third-party configurations in customer
environments. Perform the following steps with care, and validate your settings and values before finalizing configurations in the Falcon console.
Configuration Summary
Step 1: Register Microsoft application and generate secret [/documentation/page/k1116054/data-connector-built-for-azure-network-security-groups#m55db750]
https://falcon.us-2.crowdstrike.com/documentation/page/k1116054/data-connector-built-for-azure-network-security-groups 1/5
24/1/25, 2:19 p.m. Data Connector built for Azure Network Security Groups | Next-Gen SIEM Third-Party Integrations | Third-Party Integration an…
Step 6: Configure and activate the Data Connector built for Microsoft Azure Network Security Groups [/documentation/page/k1116054/data-connector-built-for-
azure-network-security-groups#ufd0c2b0]
Name: Enter an application name, for example, CrowdStrike NG-SIEM - MS Azure NSG Event Hub Stream. Save this Application Name to
enter in a later step.
Supported account types: Select Accounts in this organizational directory only (Crowdstrike only - Single tenant).
4. Click Register.
5. In Overview, save the Application (client) ID value and the Directory (tenant) ID values.
Note: This info is used later to configure the Data Connector built for Microsoft Azure Network Security Groups.
Important:Save the client secret in the Value field somewhere safe as it is sensitive info displayed only once and required later to configure
the Data Connector built for Microsoft Azure Network Security Groups.
1. Click Event Hubs in the Services section of the Microsoft Azure services portal page.
The Event Hubs page opens.
2. Click Create.
Resource Group : Click Create new, enter a Name for this resource group, and then click OK.
Note: Save this Event Hubs Namespace name to enter in a later step.
Note: The Microsoft Basic pricing tier does not allow Microsoft Azure Network Security Groups events.
Throughput Units : Select the number of units. For more info, see
Microsoft's documentation on throughput units [https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-faq#throughput-units].
https://falcon.us-2.crowdstrike.com/documentation/page/k1116054/data-connector-built-for-azure-network-security-groups 2/5
24/1/25, 2:19 p.m. Data Connector built for Azure Network Security Groups | Next-Gen SIEM Third-Party Integrations | Third-Party Integration an…
Optional. Enable Auto-inflate: If you want to automatically scale up the number of throughput units to meet your usage needs, select this
checkbox.
Click Create.
6. In the Event Hub page, in the Basics tab, enter the following info:
a. Name: Enter a name. Save this Event Hub Name to enter in a later step.
b. Partition count: Select the number of partitions. For more info, see
Microsoft's documentation on partitions [https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-faq#partitions].
d. Retention time (hrs): Enter the number of hours. For more info, see
Microsoft's documentaiton on the maximum retention period for events [https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-faq#what-
is-the-maximum-retention-period-for-events-]
9. In Event hubs, click the Event hub that you created earlier.
c. Click Next.
e. Search for the Application Name value that you saved earlier in Step 1.
g. Click Select.
12. In the Role assignments tab, confirm that the new role assignment is listed.
https://falcon.us-2.crowdstrike.com/documentation/page/k1116054/data-connector-built-for-azure-network-security-groups 3/5
24/1/25, 2:19 p.m. Data Connector built for Azure Network Security Groups | Next-Gen SIEM Third-Party Integrations | Third-Party Integration an…
1. Log in to the Microsoft Azure portal as a Global Administrator or Security Administrator, and then click Event Hubs.
2. Click your new Event Hubs namespace that you created in Step 2.
3. Click Properties.
1. Click Network Security Groups in the Services section of the Microsoft Azure services portal page.
The Network security groups page opens and shows a list of available network security groups.
2. Click the Network security group for which you want to ingest logs into Falcon.
3. Click Diagnostic settings in the Monitoring section of the left navigation pane.
Subscription
9. Click Save.
1. Log in to the Microsoft Azure portal as a Global Administrator or Security Administrator, and then click Event Hubs.
2. Click your new Event Hubs namespace that you created in Step 2.
3. On the created Event Hubs Namespace page, verify successful Event Hub configuration with incoming data statistics in the Messages chart.
1. In the Falcon console, go to Next-Gen SIEM > Log management > Data onboarding [/data-connectors]
Note: You can also go to Data connectors > Data connectors > Data sources [/data-connectors]
2. Click Data Connector built for Microsoft Azure Network Security Groups.
https://falcon.us-2.crowdstrike.com/documentation/page/k1116054/data-connector-built-for-azure-network-security-groups 4/5
24/1/25, 2:19 p.m. Data Connector built for Azure Network Security Groups | Next-Gen SIEM Third-Party Integrations | Third-Party Integration an…
EventHub Name: Enter the Event Hub Name value that you saved earlier.
EventHub Namespace: Enter the Event Hubs Namespace name that you created earlier.
Client ID: Enter the Application (Client) ID value that you saved earlier.
Tenant ID: Enter the Directory (Tenant) ID value that you saved earlier.
Client Secret: Enter the client secret Value that you saved earlier.
7. In the Data connector configuration field, select the EventHub configuration you just created.
Verify that data is being ingested and appears in Next-Gen SIEM search results:
2. After a few minutes, confirm that data ingestion for the connector is successful by verifying a timestamp exists in the Last ingested (UTC) column.
3. Go to Next-Gen SIEM > Log management > Advanced event search [/investigate/search].
4. Run a search for the data you ingested with this query, and confirm that at least one match is generated:
#repo = "microsoft_azure_network_security_group"
Cribl[/documentation/page/b121307d/cribl]
Data Connector built for Azure NSG Flow Logs [/documentation/page/v76acf23/data-connector-built-for-azure-nsg-flow-logs]
https://falcon.us-2.crowdstrike.com/documentation/page/k1116054/data-connector-built-for-azure-network-security-groups 5/5