Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 17 Next »

Purpose

An analyst wants to detect <adjective> behavior in <data source>.  Using the <name> Azure collector to send <type> to Devo, the analyst will find <outcome>.  As a result, the analyst will <verb> the <entity>, preventing  them from <tactic>.

Example tables

Table

Description

Authorize It

To perform the authorization, the Entra Security Administrator role is required.

Items required before authorizing an Event Hub:

  • Subscription containing your Azure resources.

  • Resource group containing your Azure resources.

  • Name of the region containing Azure resources. Example: East US

  • Entra directory.

If you have more than one set of these items, then authorize an Event Hub or each set.

Items created or used during the authorization process:

  1. In Azure Portal, search for Entra ID.

    image-20250206-182248.png
  2. Click App registrations in the left menu and click new registration

    image-20250206-182408.png
  3. Register the application

  4. Search for the Event Hubs service and click on it. 

    image-20250206-195245.png
  5. Click Create.

    image-20250206-195421.png
  6. Select the subscription and resource group corresponding to the resources that must be monitored.

  7. Enter a name.

  8. In the Location field, select the region containing the resources that must be monitored.

  9. To capture Blob or Data Lake, see How Event Hubs Capture is charged to select a tier. Otherwise, select the cheapest tier and one throughput unit. If you need more resources, they can be added later.

    image-20250206-200043.png

  10. Select “Review+Create,” then “Create.”

  11. Return to Event Hubs and open the namespace created in the previous steps.

    image-20250206-200452.png
  12. Select Access control (IAM) in the left menu, click Add, and click Add Access Role Assignment.

    image-20250206-211925.png
  13. Search for the Azure Event Hubs Data Receiver role and select it and then click Next.

    image-20250206-212040.png
  14. Click Select members and search for the previously created App registration.

  15. Select the Application by clicking its name.

  16. Once the application is already listed as a selected member, click Select.

    image-20250206-214343.png
  17. Click Review + Assign.

  18. In the namespace, Create a shared access policy for sending data to the event hub.

    image-20250211-222119.png

  19. Create a second shared access policy for listening to the event hub.

    image-20250211-222210.png

  20. Open the listen policy and copy the primary connection string.

    image-20250211-222044.png
  21. Search for and select the Monitor service.

    image-20250206-214520.png
  22. Click the Diagnostic Settings option in the left area.

  23. Select a resource

    image-20250206-215233.png
  24. Add diagnostic setting

    image-20250206-215402.png
  25. Name the diagnostic setting.

  26. Enable metrics and logs. The options will vary.

  27. Enable “Stream to an event hub.”

  28. Select the namespace, hub, and policy you created.

    image-20250206-223615.png
  29. Click Save.

  30. Open Entra.

  31. Switch to the directory.

    image-20250211-222523.png
  32. Add your Entra ID diagnostic settings. Devo recommends enabling all log options

Run It

In the Cloud Collector App, create an Azure Collector instance using this parameters template, replacing the values enclosed in < >. The region name for each event hub will be logged in the region field of cloud.azure. It is not required to be your Azure region.

{
  "inputs": {
    "azure_event_hub": {
      "credentials": {},
      "enabled": true,
      "id": "<UNIQUE VALUE>",
      "services": {
        "event_hubs": {
          "queues": {
            "<REGION>": {
              "consumer_group": "$Default",
              "event_hub_connection_string": "<CONNECTION STRING>",
              "event_hub_name": "<EVENT HUB>",
              "namespace": "<NAMESPACE OF EVENT HUB>"
            }
          }
        }
      }
    }
  }
}

To check if your collector has been enabled successfully, validate it.

Secure It

Monitor It

Create an inactivity alert to detect interruptions of transfer of data from the source to the SQS queue using the query

from TABLE 
where toktains(hostchain,"collector-") 
select split(hostchain,"-",1) as collector_id

Set the inactivity alert to keep track of the collector_id.

  • No labels