Skip to content

Commit 0118f4f

Browse files
committed
Move prereqs to top to align to how-to pattern
1 parent 62879c6 commit 0118f4f

File tree

1 file changed

+38
-32
lines changed

1 file changed

+38
-32
lines changed

articles/sentinel/connect-cef-syslog-ama.md

Lines changed: 38 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -13,47 +13,23 @@ ms.date: 04/22/2024
1313

1414
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest Syslog messages, including those in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
1515

16-
## Set up the data connectors
17-
18-
# [Syslog](#tab/syslog)
19-
20-
### Set up the Syslog via AMA connector
21-
22-
The setup process for the Syslog via AMA connector has two parts:
23-
24-
1. **Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
25-
- [Using the Azure portal](?tabs=syslog%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
26-
- [Using the Azure Monitor Logs Ingestion API](?tabs=syslog%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
27-
28-
1. If you're collecting logs from other machines using a log forwarder, [**run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
29-
30-
# [CEF](#tab/cef)
31-
32-
### Set up the Common Event Format (CEF) via AMA connector
33-
34-
The setup process for the CEF via AMA connector has two parts:
35-
36-
1. **Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
37-
- [Using the Azure portal](?tabs=cef%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
38-
- [Using the Azure Monitor Logs Ingestion API](?tabs=cef%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
16+
## Prerequisites
3917

40-
1. [**Run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
18+
Before you begin, you must have the resources configured and the appropriate permissions described in this section.
4119

42-
---
20+
### Microsoft Sentinel prerequisites
4321

44-
### Prerequisites
22+
- You must have the appropriate Microsoft Sentinel solution enabled—**Syslog** and/or **Common Event Format**. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
4523

46-
- You must have the appropriate Microsoft Sentinel solution enabled—**Syslog** and/or **Common Event Format**.
47-
48-
- Your Azure account must have the following roles/permissions:
24+
- Your Azure account must have the following Azure role-based access control (Azure RBAC) roles:
4925

5026
| Built-in role | Scope | Reason |
5127
| ------------- | ----- | ------ |
5228
| - [Virtual Machine Contributor](../role-based-access-control/built-in-roles/compute.md#virtual-machine-contributor)<br>- [Azure Connected Machine<br>&nbsp;&nbsp;&nbsp;Resource Administrator](../role-based-access-control/built-in-roles/management-and-governance.md#azure-connected-machine-resource-administrator) | <li>Virtual machines<li>Virtual Machine Scale Sets<li>Azure Arc-enabled servers | To deploy the agent |
5329
| Any role that includes the action<br>*Microsoft.Resources/deployments/\** | <li>Subscription<li>Resource group<li>Existing data collection rule | To deploy Azure Resource Manager templates |
5430
| [Monitoring Contributor](../role-based-access-control/built-in-roles/monitor.md#monitoring-contributor) | <li>Subscription<li>Resource group<li>Existing data collection rule | To create or edit data collection rules |
5531

56-
#### Log forwarder prerequisites
32+
### Log forwarder prerequisites
5733

5834
If you're collecting messages from a log forwarder, the following additional prerequisites apply:
5935

@@ -71,7 +47,7 @@ If you're collecting messages from a log forwarder, the following additional pre
7147

7248
- Your log sources (your security devices and appliances) must be configured to send their log messages to the log forwarder's Syslog daemon instead of to their local Syslog daemon.
7349

74-
#### Avoid data ingestion duplication
50+
### Avoid data ingestion duplication
7551

7652
Using the same facility for both Syslog and CEF messages may result in data ingestion duplication between the CommonSecurityLog and Syslog tables.
7753

@@ -88,7 +64,7 @@ To avoid this scenario, use one of these methods:
8864
where ProcessName !contains "CEF"
8965
```
9066
91-
#### Log forwarder security considerations
67+
### Configure machine security
9268
9369
Make sure to configure the machine's security according to your organization's security policy. For example, you can configure your network to align with your corporate network security policy and change the ports and protocols in the daemon to align with your requirements. To improve your machine security configuration, [secure your VM in Azure](../virtual-machines/security-policy.md), or review these [best practices for network security](../security/fundamentals/network-best-practices.md).
9470
@@ -97,6 +73,36 @@ If your devices are sending Syslog and CEF logs over TLS (because, for example,
9773
- [Encrypt Syslog traffic with TLS – rsyslog](https://www.rsyslog.com/doc/v8-stable/tutorials/tls_cert_summary.html)
9874
- [Encrypt log messages with TLS – syslog-ng](https://support.oneidentity.com/technical-documents/syslog-ng-open-source-edition/3.22/administration-guide/60#TOPIC-1209298)
9975
76+
## Set up the data connectors
77+
78+
# [Syslog](#tab/syslog)
79+
80+
### Set up the Syslog via AMA connector
81+
82+
The setup process for the Syslog via AMA connector has two parts:
83+
84+
1. **Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
85+
- [Using the Azure portal](?tabs=syslog%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
86+
- [Using the Azure Monitor Logs Ingestion API](?tabs=syslog%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
87+
88+
1. If you're collecting logs from other machines using a log forwarder, [**run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
89+
90+
# [CEF](#tab/cef)
91+
92+
### Set up the Common Event Format (CEF) via AMA connector
93+
94+
The setup process for the CEF via AMA connector has two parts:
95+
96+
1. **Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
97+
- [Using the Azure portal](?tabs=cef%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
98+
- [Using the Azure Monitor Logs Ingestion API](?tabs=cef%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
99+
100+
1. [**Run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
101+
102+
---
103+
104+
105+
100106
### Install the AMA and create a Data Collection Rule (DCR)
101107
102108
# [Syslog](#tab/syslog)

0 commit comments

Comments
 (0)