Skip to content

Commit ce01998

Browse files
authored
Merge pull request #254 from VirtualMetric:DT-414-add-missing-processors
DT-414-add-missing-processors
2 parents ad27692 + 1abe491 commit ce01998

File tree

20 files changed

+25
-23
lines changed

20 files changed

+25
-23
lines changed

blog/2025-09-01-release-notes-1.4.0.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ tags: [release]
55
title: Version 1.4.0 Released
66
---
77

8-
This release introduces powerful new capabilities for Azure integration and data management. With the new **Settings** menu and **Microsoft Stats** dashboard, managing your workspace and monitoring data flow has never been easier. We've expanded our device and target support with **Azure Blob Storage**, **Azure Event Hubs**, **Microsoft Sentinel Data Lake**, and **Elasticsearch**, while enhancing Windows device capabilities with additional log types and pipeline selection options. Important bug fixes improve configuration persistence and content management workflows.
8+
This release introduces powerful new capabilities for Azure integration and data management. With the new **Settings** menu and **Microsoft Stats** dashboard, managing your workspace and monitoring data flow has never been easier. We've expanded our device and target support with **Azure Blob Storage**, **Azure Event Hubs**, **Microsoft Sentinel data lake**, and **Elasticsearch**, while enhancing Windows device capabilities with additional log types and pipeline selection options. Important bug fixes improve configuration persistence and content management workflows.
99

1010
{/* truncate */}
1111

docs/appendix/field-formats/csl.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ pagination_next: null
55

66
# CSL
77

8-
The Common Security Log (CSL) is a standardized schema developed by Microsoft for Azure Sentinel (now Microsoft Sentinel). It provides:
8+
The Common Security Log (CSL) is a standardized schema used in Microsoft Sentinel. It provides:
99

1010
**Common Fields**:
1111

File renamed without changes.
File renamed without changes.

docs/configuration/devices/microsoft-sentinel.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
## Synopsis
66

7-
Creates a collector that fetches security incidents from Azure Sentinel workspaces. Supports authentication, batch processing, and automatic incident tracking with incremental updates.
7+
Creates a collector that fetches security incidents from Microsoft Sentinel workspaces. Supports authentication, batch processing, and automatic incident tracking with incremental updates.
88

99
## Schema
1010

docs/configuration/pipelines/processors/fqdn.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The following fields are used to define the processor:
5252

5353
## Details
5454

55-
The processor analyzes hostname strings and extracts meaningful components based on ASIM (Azure Sentinel Information Model) logic. It supports multiple input formats:
55+
The processor analyzes hostname strings and extracts meaningful components based on ASIM (Advanced Security Information Model) logic. It supports multiple input formats:
5656

5757
- **URLs**: Full URLs with protocols (http://, https://) are parsed to extract the hostname component
5858
- **FQDNs**: Domain names like `web01.example.com` are split into hostname and domain parts

docs/configuration/pipelines/processors/username-type.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ sidebar_custom_props:
1111

1212
## Synopsis
1313

14-
An identity analysis processor that classifies usernames according to their format type following ASIM (Azure Sentinel Information Model) standards, supporting UPN, Windows, Distinguished Name, and Simple username formats for enhanced security analysis.
14+
An identity analysis processor that classifies usernames according to their format type following ASIM standards, supporting UPN, Windows, Distinguished Name, and Simple username formats for enhanced security analysis.
1515

1616
## Schema
1717

@@ -49,7 +49,7 @@ The following fields are used to define the processor:
4949
The processor identifies username formats based on structural patterns and assigns appropriate ASIM-compliant type classifications. This enables consistent username analysis across different authentication systems and security platforms.
5050

5151
:::note
52-
The processor follows ASIM standards for username type classification, ensuring compatibility with Azure Sentinel and other SIEM systems.
52+
The processor follows ASIM standards for username type classification, ensuring compatibility with Microsoft Sentinel and other SIEM systems.
5353
:::
5454

5555
Username type detection uses pattern matching to identify format characteristics. UPN format contains "@" symbols, Windows format contains backslashes, Distinguished Names contain LDAP components, and Simple format represents basic usernames without special formatting.

docs/configuration/pipelines/processors/windows-user-type.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following fields are used to define the processor:
5151
The processor analyzes Windows user accounts using both username patterns and SID structures to provide accurate user type classification. SID analysis takes priority over username patterns for more reliable identification.
5252

5353
:::note
54-
The processor follows ASIM standards for Windows user type classification, ensuring compatibility with Azure Sentinel and Windows security monitoring systems.
54+
The processor follows ASIM standards for Windows user type classification, ensuring compatibility with Microsoft Sentinel and Windows security monitoring systems.
5555
:::
5656

5757
SID-based classification uses well-known SID patterns and prefixes to identify system accounts, services, and domain accounts. Username pattern analysis provides additional context for accounts that don't match specific SID patterns.

sidebars.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -362,9 +362,7 @@ const sidebars: SidebarsConfig = {
362362
"appendix/field-formats/cim",
363363
"appendix/field-formats/csl",
364364
"appendix/field-formats/ecs",
365-
"appendix/field-formats/estreamer",
366365
"appendix/field-formats/leef",
367-
"appendix/field-formats/netflow",
368366
],
369367
},
370368
{
@@ -375,9 +373,11 @@ const sidebars: SidebarsConfig = {
375373
description: "Protocol specifications"
376374
},
377375
items: [
376+
"appendix/protocols/estreamer",
378377
"appendix/protocols/ipfix",
379378
"appendix/protocols/kafka",
380379
"appendix/protocols/nats",
380+
"appendix/protocols/netflow",
381381
"appendix/protocols/rabbitmq",
382382
"appendix/protocols/redis",
383383
"appendix/protocols/sflow",

topics.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@
3636
"processors-uppercase": "/configuration/pipelines/processors/uppercase",
3737
"snmp-authentication": "/configuration/devices/snmp-trap#authentication-protocols",
3838
"snmp-privacy": "/configuration/devices/snmp-trap#privacy-protocols",
39+
3940
"appendix-bnf": "/appendix/configuration-bnf",
4041
"appendix-avro": "/appendix/file-formats/avro",
4142
"appendix-avro-compression": "/appendix/file-formats/avro#compression-codecs",
@@ -46,11 +47,12 @@
4647
"appendix-cef": "/appendix/field-formats/cef",
4748
"appendix-cim": "/appendix/field-formats/cim",
4849
"appendix-ecs": "/appendix/field-formats/ecs",
49-
"appendix-estreamer": "/appendix/field-formats/estreamer",
5050
"appendix-leef": "/appendix/field-formats/leef",
51-
"appendix-netflow": "/appendix/field-formats/netflow",
51+
"appendix-estreamer": "/appendix/protocols/estreamer",
52+
"appendix-netflow": "/appendix/protocols/netflow",
5253
"appendix-ipfix": "/appendix/protocols/ipfix",
5354
"appendix-sflow": "/appendix/protocols/sflow",
5455
"appendix-syslog": "/appendix/protocols/syslog",
56+
5557
"tutorials-local-pipeline": "/tutorials/a-local-pipeline"
5658
}

0 commit comments

Comments
 (0)