Skip to content

Latest commit

 

History

History
102 lines (56 loc) · 3.23 KB

recommended-forcepoint-ngfw-via-ama.md

File metadata and controls

102 lines (56 loc) · 3.23 KB
title description author ms.topic ms.date ms.service ms.author ms.collection
[Recommended] Forcepoint NGFW via AMA connector for Microsoft Sentinel
Learn how to install the connector [Recommended] Forcepoint NGFW via AMA to connect your data source to Microsoft Sentinel.
cwatson-cat
how-to
10/23/2023
microsoft-sentinel
cwatson
sentinel-data-connector

[Recommended] Forcepoint NGFW via AMA connector for Microsoft Sentinel

The Forcepoint NGFW (Next Generation Firewall) connector allows you to automatically export user-defined Forcepoint NGFW logs into Microsoft Sentinel in real-time. This enriches visibility into user activities recorded by NGFW, enables further correlation with data from Azure workloads and other feeds, and improves monitoring capability with Workbooks inside Microsoft Sentinel.

Connector attributes

Connector attribute Description
Log Analytics table(s) CommonSecurityLog (ForcePointNGFW)
Data collection rules support Azure Monitor Agent DCR
Supported by Community

Query samples

Show all terminated actions from the Forcepoint NGFW

CommonSecurityLog

| where DeviceVendor == "Forcepoint"

| where DeviceProduct == "NGFW"

| where DeviceAction == "Terminate"

Show all Forcepoint NGFW with suspected compromise behaviour

CommonSecurityLog

| where DeviceVendor == "Forcepoint"

| where DeviceProduct == "NGFW"

| where Activity contains "compromise"

Show chart grouping all Forcepoint NGFW events by Activity type

CommonSecurityLog

| where DeviceVendor == "Forcepoint"

| where DeviceProduct == "NGFW"

| summarize count=count() by Activity

| render barchart

Prerequisites

To integrate with [Recommended] Forcepoint NGFW via AMA make sure you have:

  • ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. Learn more
  • ****: Common Event Format (CEF) via AMA and Syslog via AMA data connectors must be installed Learn more

Vendor installation instructions

Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.

Notice that the data from all regions will be stored in the selected workspace

  1. Secure your machine

Make sure to configure the machine's security according to your organization's security policy

Learn more >

  1. Forcepoint integration installation guide

To complete the installation of this Forcepoint product integration, follow the guide linked below.

Installation Guide >

Next steps

For more information, go to the related solution in the Azure Marketplace.