Skip to content

claranet/terraform-azurerm-sentinel-content

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Microsoft Sentinel Content

Changelog Notice Apache V2 License OpenTofu Registry

This module deploys Microsoft Sentinel Solutions but also the rules embedded in the product solution.

Solutions and rules are directly retrieved from the Microsoft Sentinel Content Hub catalog.

Current log sources supported :

  • aws
  • azure_activity
  • azure_firewall
  • azure_keyvault
  • azure_nsg
  • azure_waf
  • cef
  • cisco_meraki
  • cloudflare
  • cyberark_pam
  • darktrace
  • entra_id
  • fortigate
  • gworkspace
  • m365
  • okta
  • proofpoint_pod
  • proofpoint_tap
  • sentinelone
  • sonicwall_fw
  • sophos_endpoint
  • syslog
  • ti
  • windows_security
  • xdr
  • zscaler_internet_access
  • zscaler_private_access

These are the values that can be set in the log_sources variable.

Some solutions don't embed rules.

Global versioning rule for Claranet Azure modules

Module version Terraform version OpenTofu version AzureRM version
>= 8.x.x Unverified 1.8.x >= 4.0
>= 7.x.x 1.3.x >= 3.0
>= 6.x.x 1.x >= 3.0
>= 5.x.x 0.15.x >= 2.0
>= 4.x.x 0.13.x / 0.14.x >= 2.0
>= 3.x.x 0.12.x >= 2.0
>= 2.x.x 0.12.x < 2.0
< 2.x.x 0.11.x < 2.0

Contributing

If you want to contribute to this repository, feel free to use our pre-commit git hook configuration which will help you automatically update and format some files for you by enforcing our Terraform code module best-practices.

More details are available in the CONTRIBUTING.md file.

Usage

This module is optimized to work with the Claranet terraform-wrapper tool which set some terraform variables in the environment needed by this module. More details about variables set by the terraform-wrapper available in the documentation.

⚠️ Since modules version v8.0.0, we do not maintain/check anymore the compatibility with Hashicorp Terraform. Instead, we recommend to use OpenTofu.

module "logs" {
  source  = "claranet/run/azurerm//modules/logs"
  version = "x.x.x"

  client_name         = var.client_name
  environment         = var.environment
  stack               = var.stack
  location            = module.azure_region.location
  location_short      = module.azure_region.location_short
  resource_group_name = module.rg.name
}

module "sentinel" {
  source  = "claranet/sentinel/azurerm"
  version = "x.x.x"

  log_analytics_workspace_id = module.logs.id
  logs_destinations_ids      = [module.logs.id]

  data_connector_aad_enabled = true
}

module "sentinel_content" {
  source  = "claranet/sentinel-content/azurerm"
  version = "x.x.x"

  location            = module.azure_region.location
  resource_group_name = module.rg.name

  log_analytics_workspace_name = module.logs.name
  log_sources                  = ["entra_id", "ti", "xdr"]
}

Providers

Name Version
azurerm ~> 4.31

Modules

No modules.

Resources

Name Type
azurerm_resource_group_template_deployment.main resource

Inputs

Name Description Type Default Required
location Azure location. string n/a yes
log_analytics_workspace_name The Log Analytics Workspace name. string n/a yes
log_sources Log sources retrieved in Microsoft Sentinel. list(string) n/a yes
resource_group_name Resource group name. string n/a yes

Outputs

No outputs.

Related documentation

Microsoft Sentinel Content Hub: learn.microsoft.com/en-us/azure/sentinel/sentinel-solutions-catalog

Microsoft Sentinel Rules: learn.microsoft.com/en-us/azure/sentinel/detect-threats-built-in

About

Terraform module for Microsoft Sentinel Content

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •  

Languages