Device | Details |
---|---|
Vendor | Microsoft |
Device Type | Unified Threat Management |
Connection Type | Syslog |
Data Source Name | O365-asm |
Data Source ID | 1885 |
Click Add SIEM agent to start the wizard.
In the wizard, click Add SIEM agent.
In Select your SIEM format, choose Generic CEF.
Click Next.
Select the Activities you want to export to Sheriff CSM. By default, everything is selected.
Click Next.
Returning to the SIEM page, you will see the SIEM agent you added.
On the Syslog Forwarder, download the Microsoft Cloud App Security SIEM Agent, unzip and extract the .jar file.
You must have Java 8 running on the Syslog Forwarder.
Run the .jar file from the CLI:
java -jar mcas-siemagent-0.87.20-signed.jar --token TOKEN
Note: The name of the .jar file may vary, depending on the version of the SIEM agent. TOKEN is the SIEM agent token you copied in Step 12.
Confirm that the SIEM agent is working.
Using your preferred method, forward the logs to Sheriff CSM.
For example, you can create a syslog configuration with the following content
*.* @@<Sheriff-CSM-Sensor-IP-Address>:514