It is not that easy to deploy built-in Cisco Duo Data Connector to your Sentinel environment. I have met quite a few problems during this log source onboarding.
Although there is a one-click button to deploy to Azure, and ever there is an official guide to enter all realted parameters, you might still not able to receve any logs.Â
Â
Cisco DUO Configuration
- Log in to the Duo Admin Panel and navigate to ‘Applications’.
- Click ‘Protect an Application’ and locate the entry for ‘Admin API’ in the applications list.
- Click ‘Protect’ to the far-right to configure the application and get your Integration Key, Secret Key and API Hostname.
Grant ‘Grant read log’ permissions to the Admin API application. The Admin API application can read authentication, offline access, telephony, and administrator action log information.
Cisco DUO Connector Deployment
Use this method for automated deployment of the data connector using an ARM Template.
Click the Deploy to Azure button below.
Select the preferred Subscription, Resource Group and Location.
Enter the Cisco Duo Integration Key, Cisco Duo Secret Key, Cisco Duo API Hostname, Cisco Duo Log Types, Microsoft Sentinel Workspace Id, Microsoft Sentinel Shared Key
Mark the checkbox labeled I agree to the terms and conditions stated above.
Click Purchase to deploy.
STEP 1 - Obtaining Cisco Duo Admin API credentials
- Follow the instructions to obtain integration key, secret key, and API hostname. Use Grant read log permission in the 4th step of the instructions.
STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function
Use the following step-by-step instructions to deploy the data connector manually with Azure Functions (Deployment via Visual Studio Code).
- Download the Azure Function App file. Extract archive to your local development computer.
- Follow the function app manual deployment instructions to deploy the Azure Functions app using VSCode.
- After successful deployment of the function app, follow next steps for configuring it.
- In the Function App, select the Function App Name and select Configuration.
- In the Application settings tab, select + New application setting.
- Add each of the following application settings individually, with their respective string values (case-sensitive):
CISCO_DUO_INTEGRATION_KEY:Â DIA1WDCCQJEBN7U8U7UC
CISCO_DUO_SECRET_KEY:Â 0mhns1TpZ3eNiCGsoDj5mVc0P7UU6YrdIesgYdEO
CISCO_DUO_API_HOSTNAME:Âapi-09555d31.duosecurity.com
CISCO_DUO_LOG_TYPES:Â authentication,administrator,telephony,offline_enrollment,activity
WORKSPACE_ID:Â 2d194fc2-6aab-3c1d-a46f-73d4cb1fc067
SHARED_KEY:Â wHViqPYuQAB8VTUcmsuOYFL666CwIdUDQZ4P7wvy+6wKTmM1PrBzcBn6w6wNDTcse9JyHE5UbqiJmvbqsvA+nw==
logAnalyticsUri (Optional)
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format:Â
https://WORKSPACE_ID.ods.opinsights.azure.us
.
- Once all application settings have been entered, click Save.
Issue
Cause & Solution
- https://techcommunity.microsoft.com/t5/microsoft-sentinel/cisco-duo/m-p/3275211#M9298
No comments:
Post a Comment