Skip to content

Commit 0bdf55a

Browse files
committed
Chg text around installed connector w/ solution
1 parent b06b405 commit 0bdf55a

File tree

5 files changed

+21
-18
lines changed

5 files changed

+21
-18
lines changed

articles/sentinel/cef-syslog-ama-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: concept-article
77
ms.custom: linux-related-content
8-
ms.date: 05/13/2024
8+
ms.date: 06/27/2024
99
#Customer intent: As a security operator, I want to understand how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent so that I can determine if this solution fits my organization's needs.
1010
---
1111

@@ -87,7 +87,7 @@ For more information, see the following articles:
8787

8888
- [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md)
8989
- [CEF via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
90-
- [Syslog via AMA data connector - Configure specific appliance or device for the Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
90+
- [Syslog via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
9191

9292
## Data ingestion duplication avoidance
9393

articles/sentinel/connect-cef-syslog-ama.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.custom: linux-related-content
8-
ms.date: 06/11/2024
8+
ms.date: 06/27/2024
99
appliesto:
1010
- Microsoft Sentinel in the Azure portal
1111
- Microsoft Sentinel in the Microsoft Defender portal
@@ -26,15 +26,18 @@ Before you begin, you must have the resources configured and the appropriate per
2626

2727
### Microsoft Sentinel prerequisites
2828

29-
For Microsoft Sentinel, install the appropriate solution and make sure you have the permissions to complete the steps in this article.
29+
Install the appropriate Microsoft Sentinel solution and make sure you have the permissions to complete the steps in this article.
3030

3131
- Install the appropriate solution from the **Content hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
32-
- Identify which data connector the solution requires — **Syslog via AMA** or **Common Event Format (CEF) via AMA**. In the **Content hub**, select **Manage** on the installed solution and review the data connector listed. Or, find the solution in the one of the following articles:
32+
- Identify which data connector the Microsoft Sentinel solution requires — **Syslog via AMA** or **Common Event Format (CEF) via AMA** and whether you need to install the **Syslog** or **Common Event Format** solution. To fulfill this prerequisite,
33+
- In the **Content hub**, select **Manage** on the installed solution and review the data connector listed.
34+
- If either **Syslog via AMA** or **Common Event Format (CEF) via AMA** isn't installed with the solution, identify whether you need to install the **Syslog** or **Common Event Format** solution by finding your appliance or device from one of the following articles:
3335

34-
- [CEF via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
35-
- [Syslog via AMA data connector - Configure specific appliance or device for the Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
36+
- [CEF via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
37+
- [Syslog via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
3638

37-
- Your Azure account must have the following Azure role-based access control (Azure RBAC) roles:
39+
Then install either the **Syslog** or **Common Event Format** solution from the content hub to get the related AMA data connector.
40+
- Have an Azure account with the following Azure role-based access control (Azure RBAC) roles:
3841

3942
| Built-in role | Scope | Reason |
4043
| ------------- | ----- | ------ |
@@ -84,7 +87,7 @@ Select the appropriate tab for instructions.
8487

8588
### Create data collection rule
8689

87-
To get started, open the data connector in Microsoft Sentinel and create a data connector rule.
90+
To get started, open either the **Syslog via AMA** or **Common Event Format (CEF) via AMA** data connector in Microsoft Sentinel and create a data connector rule.
8891

8992
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Configuration**, select **Data connectors**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Configuration** > **Data connectors**.
9093

@@ -365,7 +368,7 @@ If you're using a log forwarder, configure the syslog daemon to listen for messa
365368
Get specific instructions to configure your security device or appliance by going to one of the following articles:
366369

367370
- [CEF via AMA data connector - Configure specific appliances and devices for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
368-
- [Syslog via AMA data connector - Configure specific appliances and devices for the Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
371+
- [Syslog via AMA data connector - Configure specific appliances and devices for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
369372

370373
Contact the solution provider for more information or where information is unavailable for the appliance or device.
371374

articles/sentinel/data-connectors-reference.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Find your Microsoft Sentinel data connector | Microsoft Docs
33
description: Learn about specific configuration steps for Microsoft Sentinel data connectors.
44
author: cwatson-cat
55
ms.topic: reference
6-
ms.date: 06/11/2024
6+
ms.date: 06/27/2024
77
ms.custom: linux-related-content
88
ms.author: cwatson
99
appliesto:
@@ -18,7 +18,7 @@ This article lists all supported, out-of-the-box data connectors and links to ea
1818

1919
> [!IMPORTANT]
2020
> - Noted Microsoft Sentinel data connectors are currently in **Preview**. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21-
> - For connectors that use the Log Analytics agent, the agent will be [retired on **31 August, 2024**](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). If you are using the Log Analytics agent in your Microsoft Sentinel deployment, we recommend that you start planning your migration to the AMA. For more information, see [AMA migration for Microsoft Sentinel](ama-migrate.md).
21+
> - For connectors that use the Log Analytics agent, the agent will be [retired on **31 August, 2024**](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/). If you are using the Log Analytics agent in your Microsoft Sentinel deployment, we recommend that you migrate to the the Azure Monitor Agent (AMA). For more information, see [AMA migration for Microsoft Sentinel](ama-migrate.md).
2222
> - [!INCLUDE [unified-soc-preview-without-alert](includes/unified-soc-preview-without-alert.md)]
2323
2424
Data connectors are available as part of the following offerings:
@@ -37,10 +37,10 @@ Data connectors are available as part of the following offerings:
3737

3838
## Syslog and Common Event Format (CEF) connectors
3939

40-
Log collection from many security appliances and devices are supported by the data connectors **Syslog via AMA** or **Common Event Format (CEF) via AMA** in Microsoft Sentinel. To forward data to your Log Analytics workspace for Microsoft Sentinel, complete the steps in [Ingest syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md). These steps include installing the Microsoft Sentinel solution for a security appliance or device from the **Content hub** in Microsoft Sentinel. Then, configure either the **Syslog via AMA** or **Common Event Format (CEF) via AMA** data connector that's installed with the solution. Complete the setup by configuring the security device or appliance. Find instructions to configure your security device or appliance in one of the following articles:
40+
Log collection from many security appliances and devices are supported by the data connectors **Syslog via AMA** or **Common Event Format (CEF) via AMA** in Microsoft Sentinel. To forward data to your Log Analytics workspace for Microsoft Sentinel, complete the steps in [Ingest syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md). These steps include installing the Microsoft Sentinel solution for a security appliance or device from the **Content hub** in Microsoft Sentinel. Then, configure the **Syslog via AMA** or **Common Event Format (CEF) via AMA** data connector that's appropriate for the Microsoft Sentinel solution you installed. Complete the setup by configuring the security device or appliance. Find instructions to configure your security device or appliance in one of the following articles:
4141

4242
- [CEF via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
43-
- [Syslog via AMA data connector - Configure specific appliance or device for the Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
43+
- [Syslog via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
4444

4545
Contact the solution provider for more information or where information is unavailable for the appliance or device.
4646

articles/sentinel/unified-connector-cef-device.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: cwatson-cat
55
ms.author: cwatson
66
ms.topic: reference
77
ms.custom: linux-related-content
8-
ms.date: 06/07/2024
8+
ms.date: 06/27/2024
99
---
1010

1111
# CEF via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion
@@ -409,7 +409,7 @@ From the Vectra UI, navigate to Settings > Notifications and Edit syslog configu
409409
1. Select on **Save**.
410410
1. Select the **Test** button to send some test events.
411411

412-
For more information, refer to Cognito Detect Syslog Guide, which can be downloaded from the resource page in Detect UI.
412+
For more information, see the Cognito Detect Syslog Guide, which can be downloaded from the resource page in Detect UI.
413413

414414
## Votiro
415415

articles/sentinel/unified-connector-syslog-device.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ author: cwatson-cat
55
ms.author: cwatson
66
ms.topic: reference
77
ms.custom: linux-related-content
8-
ms.date: 06/07/2024
8+
ms.date: 06/27/2024
99
---
1010

11-
# Syslog via AMA data connector - Configure specific appliance or device for the Microsoft Sentinel data ingestion
11+
# Syslog via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion
1212

1313
Log collection from many security appliances and devices are supported by the **Syslog via AMA** data connector in Microsoft Sentinel. This article lists provider supplied installation instructions for specific security appliances and devices that use this data connector. Contact the provider for updates, more information, or where information is unavailable for your security appliance or device.
1414

0 commit comments

Comments
 (0)