| Hello everyone,  Continuing our normalization journey, we added to the networking and DNS schemas the Authentication, ProcessEvents, and Registry Events schemas and delivered normalized
 content based on the two. We also added ARM template deployment and support
 for Microsoft Defender for Endpoints to the Network
 Schema.
 
  Special thanks to @Yuval Naor , @YaronFruchtmann , and @Batami Gold , who made all this possible.
 
  Why should youcare?
  Crosssource detection: Normalized Authentication analytic rules work across
 sources, on-prem and cloud, now detecting attacks such as brute force or
 impossible travel across systems including Okta, AWS, and Azure.
 
Sourceagnostic rules:
 process event analytics support any source that a customer may use to
 bring in the data, including Defender for Endpoint, Windows Events, and
 Sysmon. We are ready to add Sysmon for Linux and WEF once released!
EDR support: Process,Registry, Network, and Authentication consist the core of EDR event
 telemetry.
Easeof use:
 The Network Schema introduced last year is now
 easier to use with a single-click ARM template deployment.
  Deploy the Authentication, Process Events,Registry
 Events, or Network Session parser packs in a single click using
 ARM templates.
 
  Jon us to learn more about the Azure Sentinel information model in two webinars: 
 
TheInformation Model: Understanding Normalization in Azure Sentinel
Deep Dive into Azure Sentinel NormalizingParsers and Normalized Content
 Why normalization, and what is the Azure SentinelInformation Model?
 Working with various data types and tables together presents a challenge.You must become familiar with many different data types and schemas, write
 and use a unique set of analytics rules, workbooks, and hunting queries for
 each, even for those that share commonalities (for example, DNS servers).
 Correlation between the different data types necessary for investigation and
 hunting is also tricky.
 
  The Azure Sentinel Information Model (ASIM) provides a seamless experiencefor handling various sources in uniform, normalized views. ASIM aligns with
 the Open-Source Security Events Metadata (OSSEM) common
 information model, promoting vendor agnostic, industry-wide normalization.
 ASIM:
 
 
Allows source agnosticcontent and solutions
Simplifies analyst useof the data in sentinel workspaces
  The current implementation is based on query time normalization using KQLfunctions. And includes the following:
 
 
Normalizedschemas cover
 standard sets of predictable event types that are easy to work with and
 build unified capabilities. The schema defines which fields should
 represent an event, a normalized column naming convention, and a standard
 format for the field values.
Parsers map existing datato the normalized schemas. Parsers are implemented using KQL functions.
Contentfor each normalized schema includes analytics rules, workbooks, hunting
 queries, and additional content. This content works on any normalized data
 without the need to create source-specific content.
 
   |