As more businesses convert OT systems to digital IT infrastructures, security operations center (SOC) teams and chief information security officers (CISOs) are increasingly responsible for handling threats from OT networks.
We recommend using Microsoft Defender for IoT's out-of-the-box data connector and solution to integrate with Microsoft Sentinel and bridge the gap between the IT and OT security challenge.
However, if you have other security information and event management (SIEM) systems, you can also use Microsoft Sentinel to forward Defender for IoT cloud alerts on to that partner SIEM, via Microsoft Sentinel and Azure Event Hubs.
While this article uses Splunk as an example, you can use the process described below with any SIEM that supports Event Hub ingestion, such as IBM QRadar.
Important
Using Event Hubs and a Log Analytics export rule may incur additional charges. For more information, see Event Hubs pricing and Log Data Export pricing.