Table of Contents | ||||
---|---|---|---|---|
|
...
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Data sources
Data source | Data source | Description | API endpoint | Collector service name | Devo table | Available from release | ||
---|---|---|---|---|---|---|---|---|
Alerts | Alerts | Represents potential security issues within a customer’s tenant that Microsoft or partner security solutions have identified. Refer to Microsoft documentation about Alert Resource Type for more information. |
|
| Starting from v1.2.0, the destination table depends on the tag_version configuration parameter:
|
| ||
Secure scores | Secure scores | Represents a tenant's secure score per day of scoring data, at the tenant and control level. By default, 90 days of data is held. Refer to the Microsoft documentation for more information about Secure scores resources types. |
|
| Starting from v1.2.0, the destination table depends on the
|
| ||
Secure score control profiles | Secure score control profiles | Represents a tenant's secure score per control data. Refer to the Microsoft documentation for more information about Secure score control profiles. |
|
| Starting from v1.2.0, the destination table depends on the
|
| ||
Directory audit | Directory audit | Represents the directory audit items and its collection. Refer to the Microsoft documentation for more information about Directory audit. |
|
|
|
| ||
Provisioning | Provisioning | Represents an action performed by the Azure AD Provisioning service and its associated properties. Refer to the Microsoft documentation for more information about Provisioning. |
|
|
|
| ||
Sign-in | Sign-in | Details user and application sign-in activity for a tenant (directory). Refer to the Microsoft documentation for more information about Sign-in. |
|
|
|
|
...
Note |
---|
You need the Admin level permissions on the Azure portal as the subscription setup will require admin consent API permissions, authentications, and audits. |
Action | Steps | |||
1 | Register and configure the application |
| ||
2 | Grant the required permissions |
| ||
3 | Obtain the requires credentials for the collector |
|
...