Collect logs using connectors
You can allow
CylanceMDR
to collect logs from various sources by providing the necessary information to the CylanceMDR
onboarding team to configure it in your tenant.The following table lists some example log sources that can use connectors. For more information, contact the
CylanceMDR
onboarding team.Log source | Required information |
---|---|
HIBUN | Provide the following information (obtained from Hitachi Solutions) to the CylanceMDR team:
The password should not contain non-ASCII special characters. |
Microsoft Active Directory | Provide the following information to the CylanceMDR team:
For Collect only configurations, the username and password needs to be a standard Active
Directory user who is a member of the domain to be monitored. The password should not include non-ASCII special characters.For Respond configurations (if you want to also allow CylanceMDR to respond to a detected threat by disabling an Active
Directory user account), do the following:
|
Microsoft Azure Active Directory / Entra ID | Provide the following information to the CylanceMDR team:
To obtain this information for configuring CylanceMDR , you need to:
For more information, see the Microsoft documentation. |
Microsoft Azure Event Hub | Event Hub Name: The name of the Event Hub Connection String: Find the connection string in Azure. You must use a unique connection string for each instance Consumer Group: The consumer group for the Event Hub Event Source: The source of the events you want to collect from Event Hub. You must configure log sources to send data to the Event Hub.
|