You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-cef-syslog-ama.md
+38-32Lines changed: 38 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,47 +13,23 @@ ms.date: 04/22/2024
13
13
14
14
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest Syslog messages, including those in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
15
15
16
-
## Set up the data connectors
17
-
18
-
# [Syslog](#tab/syslog)
19
-
20
-
### Set up the Syslog via AMA connector
21
-
22
-
The setup process for the Syslog via AMA connector has two parts:
23
-
24
-
1.**Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
25
-
-[Using the Azure portal](?tabs=syslog%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
26
-
-[Using the Azure Monitor Logs Ingestion API](?tabs=syslog%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
27
-
28
-
1. If you're collecting logs from other machines using a log forwarder, [**run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
29
-
30
-
# [CEF](#tab/cef)
31
-
32
-
### Set up the Common Event Format (CEF) via AMA connector
33
-
34
-
The setup process for the CEF via AMA connector has two parts:
35
-
36
-
1.**Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
37
-
-[Using the Azure portal](?tabs=cef%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
38
-
-[Using the Azure Monitor Logs Ingestion API](?tabs=cef%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
16
+
## Prerequisites
39
17
40
-
1.[**Run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
18
+
Before you begin, you must have the resources configured and the appropriate permissions described in this section.
41
19
42
-
---
20
+
### Microsoft Sentinel prerequisites
43
21
44
-
### Prerequisites
22
+
- You must have the appropriate Microsoft Sentinel solution enabled—**Syslog** and/or **Common Event Format**. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
45
23
46
-
- You must have the appropriate Microsoft Sentinel solution enabled—**Syslog** and/or **Common Event Format**.
47
-
48
-
- Your Azure account must have the following roles/permissions:
24
+
- Your Azure account must have the following Azure role-based access control (Azure RBAC) roles:
| Any role that includes the action<br>*Microsoft.Resources/deployments/\**| <li>Subscription<li>Resource group<li>Existing data collection rule | To deploy Azure Resource Manager templates |
54
30
|[Monitoring Contributor](../role-based-access-control/built-in-roles/monitor.md#monitoring-contributor)| <li>Subscription<li>Resource group<li>Existing data collection rule | To create or edit data collection rules |
55
31
56
-
####Log forwarder prerequisites
32
+
### Log forwarder prerequisites
57
33
58
34
If you're collecting messages from a log forwarder, the following additional prerequisites apply:
59
35
@@ -71,7 +47,7 @@ If you're collecting messages from a log forwarder, the following additional pre
71
47
72
48
- Your log sources (your security devices and appliances) must be configured to send their log messages to the log forwarder's Syslog daemon instead of to their local Syslog daemon.
73
49
74
-
####Avoid data ingestion duplication
50
+
### Avoid data ingestion duplication
75
51
76
52
Using the same facility for both Syslog and CEF messages may result in data ingestion duplication between the CommonSecurityLog and Syslog tables.
77
53
@@ -88,7 +64,7 @@ To avoid this scenario, use one of these methods:
88
64
where ProcessName !contains "CEF"
89
65
```
90
66
91
-
#### Log forwarder security considerations
67
+
### Configure machine security
92
68
93
69
Make sure to configure the machine's security according to your organization's security policy. For example, you can configure your network to align with your corporate network security policy and change the ports and protocols in the daemon to align with your requirements. To improve your machine security configuration, [secure your VM in Azure](../virtual-machines/security-policy.md), or review these [best practices for network security](../security/fundamentals/network-best-practices.md).
94
70
@@ -97,6 +73,36 @@ If your devices are sending Syslog and CEF logs over TLS (because, for example,
97
73
- [Encrypt Syslog traffic with TLS – rsyslog](https://www.rsyslog.com/doc/v8-stable/tutorials/tls_cert_summary.html)
98
74
- [Encrypt log messages with TLS – syslog-ng](https://support.oneidentity.com/technical-documents/syslog-ng-open-source-edition/3.22/administration-guide/60#TOPIC-1209298)
99
75
76
+
## Set up the data connectors
77
+
78
+
# [Syslog](#tab/syslog)
79
+
80
+
### Set up the Syslog via AMA connector
81
+
82
+
The setup process for the Syslog via AMA connector has two parts:
83
+
84
+
1. **Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
85
+
- [Using the Azure portal](?tabs=syslog%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
86
+
- [Using the Azure Monitor Logs Ingestion API](?tabs=syslog%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
87
+
88
+
1. If you're collecting logs from other machines using a log forwarder, [**run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
89
+
90
+
# [CEF](#tab/cef)
91
+
92
+
### Set up the Common Event Format (CEF) via AMA connector
93
+
94
+
The setup process for the CEF via AMA connector has two parts:
95
+
96
+
1. **Install the Azure Monitor Agent and create a Data Collection Rule (DCR)**.
97
+
- [Using the Azure portal](?tabs=cef%2Cportal#install-the-ama-and-create-a-data-collection-rule-dcr)
98
+
- [Using the Azure Monitor Logs Ingestion API](?tabs=cef%2Capi#install-the-ama-and-create-a-data-collection-rule-dcr)
99
+
100
+
1. [**Run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the Syslog daemon to listen for messages from other machines, and to open the necessary local ports.
101
+
102
+
---
103
+
104
+
105
+
100
106
### Install the AMA and create a Data Collection Rule (DCR)
0 commit comments