Skip to content

Commit 068e087

Browse files
authored
Merge pull request #269394 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 283bc72 + 32a6bd3 commit 068e087

File tree

3 files changed

+63
-9
lines changed

3 files changed

+63
-9
lines changed

articles/azure-vmware/upgrade-hcx-azure-vmware-solutions.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,9 @@ You can update HCX Connector and HCX Cloud systems during separate maintenance w
2727

2828
- As part of HCX update planning, and to ensure that HCX components are updated successfully, review the service update considerations and requirements. For planning HCX upgrade, see [Planning for HCX Updates](https://docs.vmware.com/en/VMware-HCX/4.5/hcx-user-guide/GUID-61F5CED2-C347-4A31-8ACB-A4553BFC62E3.html).
2929

30-
- Ensure that you have a backup and snapshot of HCX connector in the on-premises environment, if applicable. 
30+
- Ensure that you have a backup and snapshot of HCX connector in the on-premises environment, if applicable.
31+
- For more information, see the [HCX support policy for legacy vSphere environment](https://kb.vmware.com/s/article/82702).
32+
- Check that you are using the [latest VMware HCX version validated with Azure VMware Solution](introduction.md#vmware-software-versions).
3133

3234
### Backup HCX 
3335
- Azure VMware Solution backs up HCX Cloud Manager configuration daily.

articles/key-vault/general/overview-vnet-service-endpoints.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ Here's a list of trusted services that are allowed to access a key vault if the
6565
| Azure Disk Encryption volume encryption service|Allow access to BitLocker Key (Windows VM) or DM Passphrase (Linux VM), and Key Encryption Key, during virtual machine deployment. This enables [Azure Disk Encryption](../../security/fundamentals/encryption-overview.md).|
6666
| Azure Disk Storage | When configured with a Disk Encryption Set (DES). For more information, see [Server-side encryption of Azure Disk Storage using customer-managed keys](../../virtual-machines/disk-encryption.md#customer-managed-keys).|
6767
| Azure Event Hubs|[Allow access to a key vault for customer-managed keys scenario](../../event-hubs/configure-customer-managed-key.md)|
68+
| Azure ExpressRoute | [When using MACsec with ExpressRoute Direct](../../expressroute/expressroute-howto-macsec.md)|
6869
| Azure Firewall Premium| [Azure Firewall Premium certificates](../../firewall/premium-certificates.md)|
6970
| Azure Front Door Classic|[Using Key Vault certificates for HTTPS](../../frontdoor/front-door-custom-domain-https.md#prepare-your-key-vault-and-certificate)
7071
| Azure Front Door Standard/Premium|[Using Key Vault certificates for HTTPS](../../frontdoor/standard-premium/how-to-configure-https-custom-domain.md#prepare-your-key-vault-and-certificate)

articles/sentinel/sap/deploy-sap-btp-solution.md

Lines changed: 59 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,7 @@ Before you begin, verify that:
2525
- Your organization uses SAP BTP (in a Cloud Foundry environment) to streamline interactions with SAP applications and other business applications.
2626
- You have an SAP BTP account (which supports BTP accounts in the Cloud Foundry environment). You can also use a [SAP BTP trial account](https://cockpit.hanatrial.ondemand.com/).
2727
- You have the SAP BTP auditlog-management service and service key (see [Set up the BTP account and solution](#set-up-the-btp-account-and-solution)).
28-
- You can create an [Azure function app](../../azure-functions/functions-overview.md) by using the Microsoft.Web/Sites, Microsoft.Web/ServerFarms, Microsoft.Insights/Components, and Microsoft.Storage/StorageAccounts permissions.
29-
- You can create [data collection rules and endpoints](../../azure-monitor/essentials/data-collection-rule-overview.md) by using these permissions:
30-
- Microsoft.Insights/DataCollectionEndpoints and Microsoft.Insights/DataCollectionRules.
31-
- Assign the Monitoring Metrics Publisher role to the function app.
32-
- You have an [Azure Key Vault](../../key-vault/general/overview.md) to hold the SAP BTP client secret.
28+
- You have the Microsoft Sentinel Contributor role on the target Microsoft Sentinel workspace.
3329

3430
## Set up the BTP account and solution
3531

@@ -69,14 +65,14 @@ To set up the BTP account and the solution:
6965
1. Select the resource group and the Microsoft Sentinel workspace in which to deploy the solution.
7066
1. Select **Next** until you pass validation, and then select **Create**.
7167
1. When the solution deployment is finished, return to your Microsoft Sentinel workspace and select **Data connectors**.
72-
1. In the search bar, enter **BTP**, and then select **SAP BTP (using Azure Function)**.
68+
1. In the search bar, enter **BTP**, and then select **SAP BTP**.
7369
1. Select **Open connector page**.
74-
1. On the connector page, make sure that you meet the required prerequisites and complete the configuration steps. In step 2 of the data connector configuration, specify the parameters that you defined in step 4 in this section.
70+
1. On the connector page, make sure that you meet the required prerequisites listed and complete the configuration steps. When you're ready, select **Add account**.
71+
1. Specify the parameters that you defined earlier during the configuration. The subaccount name specified is projected as a column in the `SAPBTPAuditLog_CL` table, and can be used to filter the logs when you have multiple subaccounts.
7572

7673
> [!NOTE]
7774
> Retrieving audits for the global account doesn't automatically retrieve audits for the subaccount. Follow the connector configuration steps for each of the subaccounts you want to monitor, and also follow these steps for the global account. Review these [account auditing configuration considerations](#consider-your-account-auditing-configurations).
7875
79-
1. Complete all configuration steps, including the function app deployment and the Azure Key Vault access policy configuration.
8076
1. Make sure that BTP logs are flowing into the Microsoft Sentinel workspace:
8177

8278
1. Sign in to your BTP subaccount and run a few activities that generate logs, such as sign-ins, adding users, changing permissions, and changing settings.
@@ -105,6 +101,61 @@ You also can retrieve the logs via the UI:
105101
1. In the new instance, create a service key.
106102
1. View the service key and retrieve the required parameters from step 4 of the configuration instructions in the data connector UI (**url**, **uaa.url**, **uaa.clientid**, and **uaa.clientsecret**).
107103

104+
## Rotate the BTP client secret
105+
106+
We recommend that you periodically rotate the BPT subaccount client secrets. The following sample script demonstrates the process of updating an existing data connector with a new secret fetched from Azure Key Vault.
107+
108+
Before you start, collect the values you'll need for the scripts parameters, including:
109+
110+
- The subscription ID, resource group, and workspace name for your Microsoft Sentinel workspace.
111+
- The key vault and the name of the key vault secret.
112+
- The name of the data connector you want to update with a new secret. To identify the data connector name, open the SAP BPT data connector in the Microsoft Sentinel data connectors page. The data connector name has the following syntax: *BTP_{connector name}*
113+
114+
115+
```powershell
116+
param(
117+
[Parameter(Mandatory = $true)] [string]$subscriptionId,
118+
[Parameter(Mandatory = $true)] [string]$workspaceName,
119+
[Parameter(Mandatory = $true)] [string]$resourceGroupName,
120+
[Parameter(Mandatory = $true)] [string]$connectorName,
121+
[Parameter(Mandatory = $true)] [string]$clientId,
122+
[Parameter(Mandatory = $true)] [string]$keyVaultName,
123+
[Parameter(Mandatory = $true)] [string]$secretName
124+
)
125+
126+
# Import the required modules
127+
Import-Module Az.Accounts
128+
Import-Module Az.KeyVault
129+
130+
try {
131+
# Login to Azure
132+
Login-AzAccount
133+
134+
# Retrieve BTP client secret from Key Vault
135+
$clientSecret = (Get-AzKeyVaultSecret -VaultName $keyVaultName -Name $secretName).SecretValue
136+
if (!($clientSecret)) {
137+
throw "Failed to retrieve the client secret from Azure Key Vault"
138+
}
139+
140+
# Get the connector from data connectors API
141+
$path = "/subscriptions/{0}/resourceGroups/{1}/providers/Microsoft.OperationalInsights/workspaces/{2}/providers/Microsoft.SecurityInsights/dataConnectors/{3}?api-version=2024-01-01-preview" -f $subscriptionId, $resourceGroupName, $workspaceName, $connectorName
142+
$connector = (Invoke-AzRestMethod -Path $path -Method GET).Content | ConvertFrom-Json
143+
if (!($connector)) {
144+
throw "Failed to retrieve the connector"
145+
}
146+
147+
# Add the updated client ID and client secret to the connector
148+
$connector.properties.auth | Add-Member -Type NoteProperty -Name "clientId" -Value $clientId
149+
$connector.properties.auth | Add-Member -Type NoteProperty -Name "clientSecret" -Value ($clientSecret | ConvertFrom-SecureString -AsPlainText)
150+
151+
# Update the connector with the new auth object
152+
Invoke-AzRestMethod -Path $path -Method PUT -Payload ($connector | ConvertTo-Json -Depth 10)
153+
}
154+
catch {
155+
Write-Error "An error occurred: $_"
156+
}
157+
```
158+
108159
## Related content
109160

110161
- [Learn how to enable the security content](../sentinel-solutions-deploy.md#analytics-rule)

0 commit comments

Comments
 (0)