ASIM Example
ASIM Example
Windows Security Event logs often contain information about system activities like
user logins, account changes, and system start-ups. The raw logs have a specific
format, and the ASIM parser's job is to map these to a standardized schema for
easier analysis in Azure Sentinel.
```kql
let WindowsSecurityEventParser = (WindowsSecurityEventTable: datatable) {
WindowsSecurityEventTable
| where EventID == 4624 // focusing on successful logins
| extend TimeGenerated = todatetime(TimeCreated),
Account = AccountName,
Activity = 'Successful Login',
SourceIP = IpAddress
};
```