Skip to content

Commit 2063a49

Browse files
committed
GA content changes
1 parent 3ad19e7 commit 2063a49

File tree

3 files changed

+111
-59
lines changed

3 files changed

+111
-59
lines changed

articles/sentinel/sap/deployment-solution-configuration.md

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,14 @@ ms.date: 04/27/2022
99

1010
# Configure Microsoft Sentinel Solution for SAP
1111

12+
[!INCLUDE [Banner for top of topics](../includes/banner.md)]
13+
1214
This article provides best practices for configuring the Microsoft Sentinel Solution for SAP. The full deployment process is detailed in a whole set of articles linked under [Deployment milestones](deployment-overview.md#deployment-milestones).
1315

16+
> [!IMPORTANT]
17+
> Some components of the Microsoft Sentinel Solution for SAP are currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18+
>
19+
1420
Deployment of the data collector agent and solution in Microsoft Sentinel provides you with the ability to monitor SAP systems for suspicious activities and identify threats. However, for best results, best practices for operating the solution strongly recommend carrying out several additional configuration steps that are very dependent on the SAP deployment.
1521

1622
## Deployment milestones
@@ -35,19 +41,19 @@ Track your SAP solution deployment journey through this series of articles:
3541

3642
## Configure watchlists
3743

38-
Microsoft Sentinel Solution for SAP configuration is accomplished by providing customer-specific information in the provisioned watchlists.
44+
Threat Monitoring for SAP solution configuration is accomplished by providing customer-specific information in the provisioned watchlists.
3945

4046
> [!NOTE]
4147
>
4248
> After initial solution deployment, it may take some time before watchlists are populated with data.
4349
> If you edit a watchlist and find it is empty, please wait a few minutes and retry opening the watchlist for editing.
4450
4551
### SAP - Systems watchlist
46-
SAP - Systems watchlist defines which SAP Systems are present in the monitored environment. For every system, specify its SID, whether it is a production system or a dev/test environment, as well as a description.
52+
SAP - Systems watchlist defines which SAP Systems are present in the monitored environment. For every system, specify its SID, whether it's a production system or a dev/test environment, as well as a description.
4753
This information is used by some analytics rules, which may react differently if relevant events appear in a Development or a Production system.
4854

4955
### SAP - Networks watchlist
50-
SAP - Networks watchlist outlines all networks used by the organization. It is primarily used to identify whether or not user logons are originating from within known segments of the network, also if user logon origin changes unexpectedly.
56+
SAP - Networks watchlist outlines all networks used by the organization. It's primarily used to identify whether or not user logons are originating from within known segments of the network, also if user logon origin changes unexpectedly.
5157

5258
There are a number of approaches for documenting network topology. You could define a broad range of addresses, like 172.16.0.0/16, and name it "Corporate Network", which will be good enough for tracking logons from outside that range. A more segmented approach, however, allows you better visibility into potentially atypical activity.
5359

@@ -76,10 +82,10 @@ All of these watchlists identify sensitive actions or data that can be carried o
7682
- SAP - Sensitive Roles
7783
- SAP - Privileged Users
7884

79-
Microsoft Sentinel Solution for SAP uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
85+
Threat Monitoring for SAP solution uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
8086

8187
## Start enabling analytics rules
82-
By default, all analytics rules provided in the Microsoft Sentinel Solution for SAP are disabled. When you install the solution, it's best if you don't enable all the rules at once so you don't end up with a lot of noise. Instead, use a staged approach, enabling rules over time, ensuring you are not receiving noise or false positives. Ensure alerts are operationalized, that is, have a response plan for each of the alerts. We consider the following rules to be easiest to implement, so best to start with them:
88+
By default, all analytics rules provided in the Threat Monitoring for SAP solution are disabled. When you install the solution, it's best if you don't enable all the rules at once so you don't end up with a noisey workspace. Instead, use a staged approach, enabling rules over time, ensuring you aren't receiving noise or false positives. Ensure alerts are operationalized, that is, have a response plan for each of the alerts. We consider the following rules to be easiest to implement, so best to start with those:
8389

8490
1. Deactivation of Security Audit Log
8591
1. Client Configuration Change
@@ -91,4 +97,23 @@ By default, all analytics rules provided in the Microsoft Sentinel Solution for
9197
1. System configuration change
9298
1. Brute force (RFC)
9399
1. Function module tested
100+
1. The SAP audit log monitoring analytics rules
101+
102+
#### Configuring the SAP audit log monitoring analytics rules
103+
The two SAP Audit log monitor rules are delivered as ready to run out of the box, and allow for further fine tuning using watchlists:
104+
- **SAP_Dynamic_Audit_Log_Monitor_Configuration**
105+
The **SAP_Dynamic_Audit_Log_Monitor_Configuration** is a watchlist detailing all available SAP standard audit log message IDs and can be extended to contain additional message IDs you might create on your own using ABAP enhancements on your SAP NetWeaver systems.This watchlist allows for customizing an SAP message ID (=event type), at different levels:
106+
- Severities per production/ non-production systems -for example, debugging activity gets “High” for production systems, and “Disabled” for other systems
107+
- Assigning different thresholds for production/ non-production systems- which are considered as “speed limits”. Setting a threshold of 60 events an hour, will trigger an incident if more than 30 events were observed within 30 minutes
108+
- Assigning Rule Types- either “Deterministic” or “AnomaliesOnly” determines by which manner this event is considered
109+
- Roles and Tags to Exclude- specific users can be excluded from specific event types. This field can either accept SAP roles, SAP profiles or Tags:
110+
- Listing SAP roles or SAP profiles ([see User Master data collection](sap-solution-deploy-alternate.md#configuring-user-master-data-collection)) would exclude any user bearing those roles/ profiles from these event types for the same SAP system. For example, specifying the “BASIC_BO_USERS” ABAP role for the RFC related event types will ensure Business Objects users won't trigger incidents when making massive RFC calls.
111+
- Listing tags to be used as identifiers. Tagging an event type works just like specifying SAP roles or profiles, except that tags can be created within the Sentinel workspace, allowing the SOC personnel freedom in excluding users per activity without the dependency on the SAP team. For example, the audit message IDs AUB (authorization changes) and AUD (User master record changes) are assigned with the tag “MassiveAuthChanges”. Users assigned with this tag are excluded from the checks for these activities. Running the workspace function **SAPAuditLogConfigRecommend** will produce a list of recommended tags to be assigned to users, such as 'Add the tags ["GenericTablebyRFCOK"] to user SENTINEL_SRV using the SAP_User_Config watchlist'
112+
- **SAP_User_Config**
113+
This configuration-based watchlist is there to allow for specifying user related tags and other active directory identifiers for the SAP user. Tags are then used for identifying the user in specific contexts. For example, assigning the user GRC_ADMIN with the tag “MassiveAuthChanges” will prevent incidents from being created on user master record and authorization events made by GRC_ADMIN.
114+
115+
More information is available [in this blog](https://aka.ms/Sentinel4sapDynamicDeterministicAuditRuleBlog)
116+
117+
118+
94119

articles/sentinel/sap/sap-solution-log-reference.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ Users are *strongly encouraged* to use the functions as the subjects of their an
3131
- [SAPUsersEmail](#sapusersemail)
3232
- [SAPAuditLogConfiguration](#sapauditlogconfiguration)
3333
- [SAPAuditLogAnomalies](#sapauditloganomalies)
34+
- [SAPAuditLogConfigRecommend](#sapauditLogconfigrecommend)
3435
- [SAPSystems](#sapsystems)
3536
- [SAPUsersGetVIP](#sapusersgetvip)
3637
- [SAPUsersHeader](#sapusersheader)
@@ -287,6 +288,11 @@ SAPAuditLogAnomalies(LearningTime = 14d, DetectingTime=0h, SelectedSystems= dyna
287288
| MaxTime | Time of last event observed|
288289
| Score | the anomaly scores as produced by the anomaly model|
289290

291+
See [Built-in SAP analytics rules for monitoring the SAP audit log](sap-solution-security-content.md#built-in-sap-analytics-rules-for-monitoring-the-sap-audit-log) for more information.
292+
293+
### SAPAuditLogConfigRecommend
294+
The **SAPAuditLogConfigRecommend** is a helper function designed to offer recommendations for the configuration of the [SAP - Dynamic Anomaly based Audit Log Monitor Alerts (PREVIEW)](sap-solution-security-content.md#sap---dynamic-anomaly-based-audit-log-monitor-alerts-preview) analytics rule. See detailed explanation in the [Configuring the SAP audit log monitoring analytics rules](deployment-solution-configuration.md#configuring-the-sap-audit-log-monitoring-analytics-rules) guide.
295+
290296
### SAPUsersGetVIP
291297

292298
The Sentinel for SAP solution uses a concept of central user tagging, designed to allow for lower false positive rate with minimal effort on the customer end:

0 commit comments

Comments
 (0)