Connect to Microsoft Azure for log data collection

Curated detections in the Enterprise tier of Security Command Center help identify threats in Microsoft Azure environments using both event and context data.

These rule sets require the following data to function as designed. You must ingest Azure data from each of these data sources to have maximum rule coverage.

For more information, see the following in the Google SecOps documentation:

For information about the type of log data that customers with Security Command Center Enterprise can ingest directly to the Google SecOps tenant, see Google SecOps log data collection.