- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Integration of Cortex XDR with the SIEM (Microsoft Azure) solution
Had a few queries regarding it:-
1. Supported integration methods & recommended integration methods for integration with Microsoft Sentinel.
2. What all logs can be forwarded (eg: Alerts, Incidents, Audit, management logs and endpoint/server logs, etc.)
3. How do we evaluate disk space requirements for such events?
4. Reference documents for this integration
Hi @Shashanksinha ,
Thank you for writing to live community!
SIEM integration with Cortex XDR can be done in two mechanisms:
Depending upon your used case, you can integrate syslog receiver as mentioned in the guide here: Integrate a Syslog receiver
This will require you to whitelist the IP as per your region in which the XDR tenant is hosted and then navigate to Settings> Configurations> Integrations>External Applications. Add your syslog reciever public IP and certificate.
For API based integration, please create a curl or a python based API as supported by Microsoft Azure Sentinel and configure it in the app.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!