Skip to content

Commit 22d6c51

Browse files
committed
Revert unnecessary changes
1 parent 8c11122 commit 22d6c51

File tree

8 files changed

+86
-28
lines changed

8 files changed

+86
-28
lines changed

articles/sentinel/data-connectors/amazon-web-services-s3.md

Lines changed: 57 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Amazon Web Services S3 connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Amazon Web Services S3 to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 04/26/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -25,10 +25,64 @@ This is autogenerated content. For changes, contact the solution provider.
2525

2626
| Connector attribute | Description |
2727
| --- | --- |
28-
| **Log Analytics table(s)** | AWSGuardDuty<br/> AWSVPCFlow<br/> AWSCloudTrail<br/> AWSCloudWatch<br/> |
29-
| **Data collection rules support** | Not currently supported |
28+
| **Log Analytics table(s)** | AWSGuardDuty<br/> AWSVPCFlow<br/> AWSCloudTrail<br/> AWSCloudWatch<br/>|
29+
| **Data collection rules support** | [Supported as listed](/azure/azure-monitor/logs/tables-feature-support) |
3030
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
3131

32+
## Query samples
33+
34+
**High severity findings summarized by activity type**
35+
36+
```kusto
37+
AWSGuardDuty
38+
39+
| where Severity > 7
40+
41+
| summarize count() by ActivityType
42+
```
43+
44+
**Top 10 rejected actions of type IPv4**
45+
46+
```kusto
47+
AWSVPCFlow
48+
49+
| where Action == "REJECT"
50+
51+
| where Type == "IPv4"
52+
53+
| take 10
54+
```
55+
56+
**User creation events summarized by region**
57+
58+
```kusto
59+
AWSCloudTrail
60+
61+
| where EventName == "CreateUser"
62+
63+
| summarize count() by AWSRegion
64+
```
65+
66+
67+
68+
## Prerequisites
69+
70+
To integrate with Amazon Web Services S3 make sure you have:
71+
72+
- **Environment**: you must have the following AWS resources defined and configured: S3, Simple Queue Service (SQS), IAM roles and permissions policies, and the AWS services whose logs you want to collect.
73+
74+
75+
## Vendor installation instructions
76+
77+
1. Set up your AWS environment
78+
79+
The​re are two options for setting up your AWS environment to send logs from an S3 bucket to your Log Analytics Workspace:
80+
81+
82+
2. Add connection
83+
84+
85+
3286

3387
## Next steps
3488

articles/sentinel/data-connectors/api-protection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "API Protection connector for Microsoft Sentinel"
33
description: "Learn how to install the connector API Protection to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 10/28/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -72,7 +72,7 @@ Copy the values shown below and save them for configuration of the API log forwa
7272

7373
Step 3: Install the 42Crunch protection and log forwarder
7474

75-
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the [42Crunch repository](https://hub.docker.com/u/42crunch). The exact installation will depend on your environment, consult the [42Crunch protection documentation](https://docs.42crunch.com/latest/content/concepts/api_firewall_deployment_architecture.htm) for full details. Two common installation scenarios are described below:
75+
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the [42Crunch repository](https://hub.docker.com/u/42crunch). The exact installation depends on your environment, consult the [42Crunch protection documentation](https://docs.42crunch.com/latest/content/concepts/api_firewall_deployment_architecture.htm) for full details. Two common installation scenarios are described below:
7676

7777

7878
Installation via Docker Compose
@@ -89,11 +89,11 @@ In order to test the data ingestion the user should deploy the sample *httpbin*
8989

9090
4.1 Install the sample
9191

92-
The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which will install the httpbin API server, the 42Crunch API protection and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
92+
The sample application can be installed locally using a [Docker compose file](https://github.com/42Crunch/azure-sentinel-integration/blob/main/sample-deployment/docker-compose.yml) which installs the httpbin API server, the 42Crunch API protection, and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
9393

9494
4.2 Run the sample
9595

96-
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the *localhost* at port 8080 using Postman, curl, or similar. You should see a mixture of passing and failing API calls.
96+
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the *localhost* at port 8080 using curl, or similar. You should see a mixture of passing and failing API calls.
9797

9898
4.3 Verify the data ingestion on Log Analytics
9999

articles/sentinel/data-connectors/atlassian-confluence-audit.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Atlassian Confluence Audit (using Azure Functions) connector for Microso
33
description: "Learn how to install the connector Atlassian Confluence Audit (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 10/15/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -20,7 +20,7 @@ This is autogenerated content. For changes, contact the solution provider.
2020
| Connector attribute | Description |
2121
| --- | --- |
2222
| **Application settings** | ConfluenceUsername<br/>ConfluenceAccessToken<br/>ConfluenceHomeSiteName<br/>WorkspaceID<br/>WorkspaceKey<br/>logAnalyticsUri (optional) |
23-
| **Azure function app code** | https://aka.ms/sentinel-confluenceauditapi-functionapp |
23+
| **Azure function app code** | [https://aka.ms/sentinel-confluenceauditapi-functionapp](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) |
2424
| **Log Analytics table(s)** | Confluence_Audit_CL<br/> |
2525
| **Data collection rules support** | Not currently supported |
2626
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
@@ -89,7 +89,7 @@ Use the following step-by-step instructions to deploy the Confluence Audit data
8989

9090
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
9191
92-
1. Download the [Azure Function App](https://aka.ms/sentinel-confluenceauditapi-functionapp) file. Extract archive to your local development computer.
92+
1. Download the [Azure Function App](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/AtlassianConfluenceAudit/Data%20Connector/AtlassianConfluenceAuditDataConnector/ConfluenceAuditAPISentinelConn.zip) file. Extract archive to your local development computer.
9393
2. Start VS Code. Choose File in the main menu and select Open Folder.
9494
3. Select the top level folder from extracted files.
9595
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.

articles/sentinel/data-connectors/bitglass.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Bitglass (using Azure Functions) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Bitglass (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 10/15/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -63,7 +63,7 @@ To integrate with Bitglass (using Azure Functions) make sure you have:
6363

6464
Follow the instructions to obtain the credentials.
6565

66-
1. Please contact Bitglass [support](https://www.forcepoint.com/company/contact-us) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
66+
1. Please contact Bitglass [support](https://pages.bitglass.com/Contact.html) and obtain the **BitglassToken** and **BitglassServiceURL** ntation].
6767
2. Save credentials for using in the data connector.
6868

6969

articles/sentinel/data-connectors/cohesity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Cohesity (using Azure Functions) connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Cohesity (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 04/26/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -50,7 +50,7 @@ To integrate with Cohesity (using Azure Functions) make sure you have:
5050
> This connector uses Azure Functions that connect to the Azure Blob Storage and KeyVault. This might result in additional costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/), [Azure Blob Storage pricing page](https://azure.microsoft.com/pricing/details/storage/blobs/) and [Azure KeyVault pricing page](https://azure.microsoft.com/pricing/details/key-vault/) for details.
5151
5252

53-
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
53+
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Functions App.
5454
5555

5656
**STEP 1 - Get a Cohesity DataHawk API key (see troubleshooting [instruction 1](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CohesitySecurity/Data%20Connectors/Helios2Sentinel/IncidentProducer))**

articles/sentinel/data-connectors/dataminr-pulse-alerts-data-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Dataminr Pulse Alerts Data Connector (using Azure Functions) connector f
33
description: "Learn how to install the connector Dataminr Pulse Alerts Data Connector (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 10/28/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -223,7 +223,7 @@ If you're already signed in, go to the next step.
223223

224224
2) To add integration settings in Dataminr RTAP using the function URL
225225

226-
1. Open any API request tool like Postman.
226+
1. Open any API request tool.
227227
2. Click on '+' to create a new request.
228228
3. Select HTTP request method as **'POST'**.
229229
4. Enter the url prepapred in **point 1)**, in the request URL part.

articles/sentinel/data-connectors/forescout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Forescout connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Forescout to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 04/26/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -41,7 +41,7 @@ ForescoutEvent
4141

4242

4343
> [!NOTE]
44-
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://aka.ms/sentinel-forescout-parser) which is deployed with the Microsoft Sentinel Solution.
44+
> This data connector depends on a parser based on a Kusto Function to work as expected [**ForescoutEvent**](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Forescout%20(Legacy)/Parsers/ForescoutEvent.yaml) which is deployed with the Microsoft Sentinel Solution.
4545
4646

4747
> [!NOTE]

articles/sentinel/data-connectors/microsoft-exchange-logs-and-events.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,23 +3,23 @@ title: "Microsoft Exchange Logs and Events connector for Microsoft Sentinel"
33
description: "Learn how to install the connector Microsoft Exchange Logs and Events to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 11/20/2024
6+
ms.date: 04/26/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
1010
---
1111

1212
# Microsoft Exchange Logs and Events connector for Microsoft Sentinel
1313

14-
[Option 2] - Using Azure Monitor Agent - You can stream all Exchange Security & Application Event logs from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to create custom alerts, and improve investigation.
14+
You can stream all Exchange Audit events, IIS Logs, HTTP Proxy logs and Security Event logs from the Windows machines connected to your Microsoft Sentinel workspace using the Windows agent. This connection enables you to view dashboards, create custom alerts, and improve investigation. This is used by Microsoft Exchange Security Workbooks to provide security insights of your On-Premises Exchange environment
1515

1616
This is autogenerated content. For changes, contact the solution provider.
1717

1818
## Connector attributes
1919

2020
| Connector attribute | Description |
2121
| --- | --- |
22-
| **Log Analytics table(s)** | Event<br/> |
22+
| **Log Analytics table(s)** | Event<br/> W3CIISLog<br/> MessageTrackingLog_CL<br/> ExchangeHttpProxy_CL<br/> |
2323
| **Data collection rules support** | Not currently supported |
2424
| **Supported by** | [Community](https://github.com/Azure/Azure-Sentinel/issues) |
2525

@@ -29,7 +29,7 @@ This is autogenerated content. For changes, contact the solution provider.
2929

3030
```kusto
3131
Event
32-
| where EventLog == 'Application'
32+
| where EventLog == 'MSExchange Management'
3333
| sort by TimeGenerated
3434
```
3535

@@ -39,26 +39,30 @@ Event
3939

4040
To integrate with Microsoft Exchange Logs and Events make sure you have:
4141

42-
- **Azure Log Analytics will be deprecated**: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
43-
- **Detailled documentation**: >**NOTE:** Detailled documentation on Installation procedure and usage can be found [here](https://aka.ms/MicrosoftExchangeSecurityGithub)
42+
- ****: Azure Log Analytics will be deprecated, to collect data from non-Azure VMs, Azure Arc is recommended. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
4443

4544

4645
## Vendor installation instructions
4746

4847

4948
> [!NOTE]
50-
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independant for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
49+
> This data connector depends on a parser based on a Kusto Function to work as expected. Follow the steps to create the Kusto Functions alias : [**ExchangeAdminAuditLogs**](https://aka.ms/sentinel-ESI-ExchangeCollector-ExchangeAdminAuditLogs-parser)
50+
5151

52-
>This Data Connector is the **option 2** of the wiki.
52+
53+
> [!NOTE]
54+
> This solution is based on options. This allows you to choose which data will be ingest as some options can generate a very high volume of data. Depending on what you want to collect, track in your Workbooks, Analytics Rules, Hunting capabilities you will choose the option(s) you will deploy. Each options are independant for one from the other. To learn more about each option: ['Microsoft Exchange Security' wiki](https://aka.ms/ESI_DataConnectorOptions)
5355
5456
1. Download and install the agents needed to collect logs for Microsoft Sentinel
5557

5658
Type of servers (Exchange Servers, Domain Controllers linked to Exchange Servers or all Domain Controllers) depends on the option you want to deploy.
5759

5860

59-
2. [Option 2] Security/Application/System logs of Exchange Servers
61+
2. Deploy log injestion following choosed options
62+
63+
64+
6065

61-
The Security/Application/System logs of Exchange Servers are collected using Data Collection Rules (DCR).
6266

6367

6468

0 commit comments

Comments
 (0)