Citrix Analytics for Security

Microsoft Azure Sentinel integration

Notes

  • The Microsoft Azure Sentinel integration feature is in preview.

  • Contact CAS-PM-Ext@citrix.com to request assistance for the Azure Sentinel integration, exporting data to Azure Sentinel, or provide feedback.

  • Data export to Azure Sentinel by using the Logstash engine is in preview. This feature is provided without a service level agreement and it’s not recommended for production workloads. For more information, see the Microsoft Azure Sentinel documentation.

Integrate Citrix Analytics for Security with your Microsoft Azure Sentinel by using the Logstash engine.

This integration enables you to export and correlate the users’ data from your Citrix IT environment to Azure Sentinel and get deeper insights into your organization’s security posture. View the insightful dashboards that are unique to Citrix Analytics for Security in your Splunk environment. You can also create custom views based on your security requirements.

For more information about the benefits of the integration and the type of processed data that is sent to your SIEM, see Security Information and Event Management integration.

Prerequisites

  • Turn on data processing for at least one data source. It helps Citrix Analytics for Security to begin the Azure Sentinel integration process.

  • Ensure that the following endpoint is in the allow list in your network.

    Endpoint US region EU region
    Kafka brokers casnb-0.citrix.com:9094 casnb-eu-0.citrix.com:9094
      casnb-1.citrix.com:9094 casnb-eu-1.citrix.com:9094
      casnb-2.citrix.com:9094 casnb-eu-2.citrix.com:9094
  • Ensure that you use Logstash versions from 7.0 to 7.9 with the Azure Sentinel output plug-in for Logstash.

Integrate with Azure Sentinel

  1. Go to Settings > Data Sources >Security > DATA EXPORTS.

  2. On the SIEM site card, select Get Started.

  3. On the Configure SIEM integration page, create an account by specifying the user name and a password. This account is used to prepare a configuration file, which is required for the integration.

    SIEM config page

  4. Ensure that the password meets the following conditions:

    SIEM password requirements

  5. Click Configure to generate the Logstash configuration file.

    Configure

  6. Select the Azure Sentinel tab to download the configuration files:

    • Logstash config file: Contains the configuration data (input, filter, and output sections) for sending events from Citrix Analytics for Security to Azure Sentinel using the Logstash data collection engine.

      For information on Logstash config file structure, see the Logstash documentation.

    • JKS file: Contains the certificates required for SSL connection.

    Note

    These files contain sensitive information. Keep them in a safe and secure location.

    Select Azure Sentinel

  7. Prepare your Azure Sentinel integration:

    1. On your Azure portal, enable Azure Sentinel. You can create a workspace or use your existing workspace to run Azure Sentinel.

    2. From the main menu, select Data connectors to open the data connectors gallery.

    3. Search for Citrix Analytics (Security).

    4. Select Citrix Analytics (Security) and select Open connector page.

      Sentinel data connector page

    5. From the Citrix Analytics (Security) page, copy the Workspace ID and Primary Key. You must enter this information in the Logstash config file in subsequent steps.

      Data connector config page

    6. Configure Logstash on your host machine:

      1. On your Linux or Windows host machine, install Logstash and Azure Sentinel output plug-in for Logstash.

      2. On the host machine where you have installed Logstash, place the following files in the specified directory:

        Host machine type File name Directory path
        Linux CAS_AzureSentinel_LogStash_Config.config For Debian and RPM packages: /etc/logstash/conf.d/
            For .zip and .tar.gz archives: {extract.path}/config
          kafka.client.truststore.jks For Debian and RPM packages: /etc/logstash/ssl/
            For .zip and .tar.gz archives: {extract.path}/ssl
        Windows CAS_AzureSentinel_LogStash_Config.config C:\logstash-7.xx.x\config
          kafka.client.truststore.jks  

        For information on the default directory structure of Logstash installation packages, see Logstash documentation.

      3. Open the Logstash config file and do the following:

        1. In the input section of the file, enter the following:

          • Password: The password of the account that you have created in Citrix Analytics for Security to prepare the configuration file.

          • SSL truststore location: The location of your SSL client certificate. This is the location of the kafka.client.truststore.jks file in your host machine.

          Input section

        2. In the output section of the file, enter the Workspace ID and Primary key (that you have copied from Azure Sentinel) in the output section of the file.

          Output section

      4. Restart the Logstash host machine to send the processed data from Citrix Analytics for Security to Azure Sentinel.

    7. Go to your Azure Sentinel Workspace and view the data in the Citrix Analytics workbook.

Microsoft Azure Sentinel integration