- Cloud Collectors Overview
- Administration
- Administrative Access
- Shareable Service Accounts
- Add Accounts for AWS Cloud Collectors
- Add Accounts for Cisco Duo Cloud Collector
- Add Accounts for Google Cloud Collectors
- Add Accounts for Microsoft Cloud Collectors
- Add Accounts for Okta Cloud Collectors
- Add Accounts for Salesforce Cloud Collectors
- Add Accounts for Splunk Cloud Collectors
- Add Accounts for Trend Micro Cloud Collectors
- Add Accounts for Wiz
- Define a Unique Site Name
- Sign Up for the Early Access Program
- Onboard Cloud Collectors
- Abnormal Security Cloud Collector
- AWS CloudTrail Cloud Collectors
- AWS CloudWatch Cloud Collector
- AWS S3 Cloud Collector
- AWS SQS Cloud Collector
- Azure Activity Logs Cloud Collector
- Azure Log Analytics Cloud Collector
- Azure Event Hub Cloud Collector
- Azure Storage Analytics Cloud Collector
- Box Cloud Collector
- Cato Networks Cloud Collector
- Cisco Duo Cloud Collector
- Cisco Umbrella Cloud Collector
- Cribl Cloud Collector
- CrowdStrike Cloud Collectors
- GCP Pub/Sub Cloud Collector
- Microsoft Defender XDR (via Azure Event Hub) Cloud Collector
- Microsoft Entra ID Context Cloud Collector
- Microsoft Entra ID Logs Cloud Collector
- Microsoft 365 Exchange Admin Reports Cloud Collector
- Supported Sources from Microsoft 365 Exchange Admin Reports
- Migrate to the Microsoft 365 Exchange Admin Reports Cloud Collector
- Prerequisites to Configure the Microsoft 365 Exchange Admin Reports Cloud Collector
- Configure the Microsoft 365 Exchange Admin Reports Cloud Collector
- Troubleshooting the Microsoft 365 Exchange Admin Reports Cloud Collector
- Microsoft 365 Management Activity Cloud Collector
- Microsoft Security Alerts Cloud Collector
- Microsoft Sentinel (via Event Hub) Cloud Collector
- Netskope Alerts Cloud Collector
- Netskope Events Cloud Collector
- Okta Cloud Collector
- Okta Context Cloud Collector
- Palo Alto Networks Cortex Data Lake Cloud Collector
- Proofpoint On-Demand Cloud Collector
- Proofpoint Targeted Attack Protection Cloud Collector
- Recorded Future Cloud Collector
- Salesforce Cloud Collector
- SentinelOne Alerts Cloud Collector
- SentinelOne Cloud Funnel Cloud Collector
- SentinelOne Threats Cloud Collector
- SentinelOne Cloud Collector
- Splunk Cloud Collector
- Symantec Endpoint Security Cloud Collector
- Trend Vision One Cloud Collector
- Zscaler ZIA Cloud Collector
- Webhook Cloud Collectors
- Wiz Issues Cloud Collector
- Wiz API Cloud Collector
- Troubleshooting Cloud Collectors
Prerequisites to Configure the Azure Activity Logs Cloud Collector
Before you configure the Azure Activity Logs Cloud Collector you must complete the following prerequisites:
Create an Event Hub and obtain the consumer group name to be entered while configuring the Cloud Collector.
Obtain the connection string to be entered while configuring the Cloud Collector.
(Optional) Configure your Event Hub setup for enabling sufficient egress. Consider referring to the tip in this section.
Configure Azure Activity Logs to enable the cloud collector to collect data related to the activities performed by users or services in the subscription.
Obtain the Consumer Group Name and Connection String
Before configuring the Azure Activity Logs Cloud Collector, use the following steps to obtain the Consumer Group Name and Connection String for your EventHub endpoint. Ensure that you create an Event Hub if you do not have one.
Tip
To configure your Event Hub setup for enabling sufficient egress, refer to the following tips.
Examine the incoming number of bytes per second, by navigating to the Event Hub page on the Azure portal.
Set up the Event Hub with a good throughput capacity. The egress and ingress capacity of Event Hubs is measured by throughput units (TU). Ensure that your Event Hub provides 1 Throughput Unit (TU) per 2MB/sec egress and 1MB/sec ingress capacity.
Ensure that your Event Hub has 32 partitions and at least 1 TU per partition.
If you notice that your workload requirement exceeds the maximum value recommended for Event Hub Premium which is 32 partitions and 40 TU, you need to migrate to a Dedicated Event Hub Cluster.
Consider using the Auto-inflate throughput feature. You can enable Auto-inflate on the Event Hub namespace to automatically increase the number of TUs based on the load. For more information about throughput units, limits, and associated billing, see Event Hubs FAQs and Azure Event Hubs quotas and limits.
To obtain the name of the consumer group of the Event Hub, perform the following steps. Ensure that you have the Event Hubs namespace. If you do not have one, create an Event Hubs namespace.
On the Azure portal, navigate to the Event Hubs namespace in which the Event Hub with the data you want to retrieve resides.
Select the EventHub where your data to be retrieved resides.
Note
If connection errors occur after the Cloud Collector configuration, enable local authentication for a given Event Hubs namespace.
Navigate to Consumer groups to note the name of the consumer group.
If only Exabeam is going to read data from the Event Hub, use the default consumer group. Otherwise, create a dedicated consumer group for Exabeam.
Note
Ensure that you create and use a unique consumer group. If you use the same consumer group for two cloud collector instances, it may result in event loss and ingestion issues.
Create a SAS policy with listen-only permissions for Exabeam:
In Event Hub, navigate to Shared access policies.
Click + Add to add a new Policy on the Add SAS Policy page and enable the Listen permission.
Provide a descriptive name for the token which is listen-only, then click Create.
After you see the confirmation message (for example Creating SAS Policy successful), access the policy you just created and note the following.
SAS policy name
Primary key value
Note
The Connection string primary key acts as a connection string for the Azure Activity Logs Cloud Collector.
Proceed to configure the Azure Activity Logs Cloud Collector.
Configure Azure Activity Logs to Forward Events to your Event Hub
To enable the cloud collector to fetch data about users or services that performed activities in the subscription and the status of the activities, perform the following steps. For more information see send the activity log to a Log Analytics workspace in Microsoft documentation.
On the Azure portal, navigate to Azure Services > Monitor > Activity Log.
Click Export Activity Logs.
Click Add diagnostic setting.
In the Diagnostic setting section, specify a name in the Diagnostic setting name field, to save your settings.
Select the log categories.
In the Destination details section, select Stream to an event hub, then select the relevant Event hub namespace and retain the default Event hub policy name.
Click Save.
The Diagnostic settings section displays the setting that you saved. The activity logs are forwarded to the selected Event hub to enable the cloud collector to collect the activity data.