Skip to content

Commit 333b32a

Browse files
committed
Adding new section for audit log rules and updating related sections
1 parent 1c77f85 commit 333b32a

File tree

5 files changed

+96
-30
lines changed

5 files changed

+96
-30
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -426,6 +426,8 @@
426426
href: sap/collect-sap-hana-audit-logs.md
427427
- name: Deploy SAP connector manually
428428
href: sap/sap-solution-deploy-alternate.md
429+
- name: Configure SAP audit log monitoring rules
430+
href: sap/configure-audit-log-rules.md
429431
- name: Troubleshooting
430432
items:
431433
- name: Troubleshooting SAP solution deployment
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: Configure SAP audit log monitoring rules
3+
description: Monitor the SAP audit logs and enable anomaly detection using a set of analytics rules.
4+
author: limwainstein
5+
ms.author: lwainstein
6+
ms.topic: how-to
7+
ms.date: 08/19/2022
8+
#Customer.intent: As a security operator, I want to monitor the SAP audit logs and enable anomaly detection using a set of analytics rules, so I can better analyze SAP data and protect my SAP systems.
9+
---
10+
11+
# Configure SAP audit log monitoring rules
12+
13+
The SAP audit log records audit and security actions on SAP systems, such as failed logon attempts, suspicious actions such as debug and replace, and more. Microsoft Sentinel uses the SAP audit log data for further monitoring and analysis. This article describes how to monitor and analyze the SAP audit logs and enable anomaly detection using a set of analytics rules. With this additional layer of analysis, you can better analyze SAP data and protect your SAP systems.
14+
15+
You use two analytics rules to monitor and analyze your SAP audit log data:
16+
17+
- **SAP - Dynamic Deterministic Audit Log Monitor**. Alerts on SAP audit log events only when anomalies are detected, using machine learning capabilities and with no coding required. [Learn how to configure the rule](#set-up-the-sap---dynamic-deterministic-audit-log-monitor-for-anomaly-detection)
18+
- **SAP - Dynamic Anomaly based Audit Log Monitor Alerts (PREVIEW)**. Alerts on any SAP audit log events with minimal configuration. You can configure the rule for an even lower false-positive rate. [Learn how to configure the rule](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-sentinel-for-sap-news-dynamic-sap-security-audit-log/ba-p/3326842).
19+
20+
The two [SAP Audit log monitor rules](sap-solution-security-content.md#built-in-sap-analytics-rules-for-monitoring-the-sap-audit-log) are delivered as ready to run out of the box, and allow for further fine tuning using the [SAP_Dynamic_Audit_Log_Monitor_Configuration and SAP_User_Config watchlists](sap-solution-security-content.md#available-watchlists).
21+
22+
## Anomaly detection
23+
24+
When trying to identify security events in a diverse activity log like the SAP audit log, you need to balance the configuration effort and the amount of noise the alerts produce.
25+
26+
With the SAP Dynamic Deterministic Audit Log Monitor rule, you can choose:
27+
- Which events you want to look at deterministically, using customized, predefined thresholds and filters.
28+
- Which events you want to leave out, so the machine can learn the parameters on its own.
29+
30+
Once Microsoft Sentinel marks an SAP audit log event type for anomaly detection, the alerting engine checks if the events recently streamed in from the SAP audit log seem normal, considering the history it has learned.
31+
32+
As an example flow:
33+
1. Microsoft Sentinel checks an event or group of events for anomalies.
34+
1. It tries to match the event or group of events with previously seen activities of the same kind, at the user and system levels.
35+
1. The algorithm learns the network characteristics of the user at the subnet mask level. This is done according to seasonality.
36+
37+
With this ability, you can look for anomalies in previously quieted event types, such as user logons. For example, if the user JohnDoe logs on hundreds of times in an hour, you can now let Microsoft Sentinel decide if this is John from accounting, repeatedly refreshing a financial dashboard with multiple data source, or a DDoS attack forming up.
38+
39+
## Set up the SAP - Dynamic Deterministic Audit Log Monitor for anomaly detection
40+
41+
1. If your SAP audit log data is not already streaming into the Microsoft Sentinel workspace, learn how to [deploy the solution](deployment-overview.md).
42+
1. From the Microsoft Sentinel navigation menu, under **Content management**, select **Content hub (Preview)**.
43+
1. Check if your Continuous threat monitoring for SAP application has updates.
44+
1. From the navigation menu, under **Analytics**, enable these 3 audit log alerts:
45+
- **SAP - Dynamic Deterministic Audit Log Monitor**. Runs every 10 minutes and focuses on the SAP audit log events marked as **Deterministic**.
46+
- **SAP - Dynamic Anomaly-based Audit Log Monitor**. Runs hourly and focuses on SAP events marked as **AnomaliesOnly**.
47+
- **SAP - Missing configuration in the Dynamic Security Audit Log Monitor**. Runs daily to provide configuration recommendations for the SAP audit log module.
48+
49+
Microsoft Sentinel now scans the entire SAP audit log is at regular intervals, for deterministic security events and anomalies. You can view the incidents this log generates in the **Incidents** blade.
50+
51+
As with every machine learning solution, it will perform better with time. Anomaly detection works best using an SAP audit log history of 7 days or more.
52+
53+
### Configure event types with the SAP_Dynamic_Audit_Log_Monitor_Configuration watchlist
54+
55+
You can further configure event types that produce too many incidents using the **SAP_Dynamic_Audit_Log_Monitor_Configuration** watchlist. Here are a few options for reducing incidents.
56+
57+
|Option |Description |
58+
|---------|---------|
59+
|Set severities and disable unwanted events |By default, both the deterministic and the anomaly-based SAP audit log analytics rules create alerts for events marked with medium and high severities. You can set these severeties specifically for production and non-production environments. For example, you can set a debugging activity event as high severity in production systems, and disable that events in non-production systems. |
60+
|Exclude users by their SAP roles or SAP profiles |Microsoft Sentinel for SAP ingests the SAP user’s master data profile, including direct and indirect role assignments, groups and profiles, so that you can speak the SAP language in your SIEM.<br><br>An SAP event can exclude users based on their SAP roles and profiles. To do this, in the watchlist, add the roles or profiles that group your RFC interface users in the RolesTagsToExclude column, next to the Generic table access by RFC event. From now on, you’ll get alerts only for users that are missing these roles. |
61+
|Exclude users by their SOC tags |This is a great way for SOC teams to come up with their own grouping, without relying on complicated SAP definitions or even without SAP authorization.<br><br>Conceptually, this works like name tags: you can set multiple events in the configuration with multiple tags. You don’t get alerts for a user with a tag associated with a specific event. For example, you don’t want specific service accounts to be alerted for Generic table access by RFC events, but can’t find an SAP role or an SAP profile that groups these users. In this case, you can add the **GenTableRFCReadOK** tag next to the relevant event in the watchlist list, and then go to the **SAP_User_Config** watchlist and assign the interface users the same tag. |
62+
|Specify a frequency threshold per event type and system role |This works like a speed limit. For example, you can decide that the noisy User Master Record Change events only trigger alerts if more than 12 activities are observed in an hour, by the same user in a production system. If a user exceeds the 12 per hour limit—for example, 2 events in a 10-minute window—an incident is triggered. |
63+
|Determinism or anomalies |If you know the event’s characteristics, you can use the deterministic capabilities. If you aren't sure how to correctly configure the event, the machine learning capabilities can decide. |
64+
|SOAR capabilities |Microsoft Sentinel has additional capabilities intended to further orchestrate, automate and respond to incidents that can be applied to the SAP audit log dynamic alerts. Learn about [Security Orchestration, Automation, and Response (SOAR)](automation.md) in Microsoft Sentinel. |
65+
66+
67+
68+
69+
70+
71+
72+
73+
74+
75+
76+
77+
78+
79+
80+

articles/sentinel/sap/deployment-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Follow your deployment journey through this series of articles, in which you'll
3636
| **4. Deploy data connector agent** | [Deploy and configure the container hosting the data connector agent](deploy-data-connector-agent-container.md) |
3737
| **5. Deploy SAP security content** | [Deploy SAP security content](deploy-sap-security-content.md)
3838
| **6. Microsoft Sentinel Solution for SAP** | [Configure Microsoft Sentinel Solution for SAP](deployment-solution-configuration.md)
39-
| **7. Optional steps** | - [Configure auditing](configure-audit.md)<br>- [Configure Microsoft Sentinel for SAP data connector to use SNC](configure-snc.md)
39+
| **7. Optional steps** | - [Configure auditing](configure-audit.md)<br>- [Configure Microsoft Sentinel for SAP data connector to use SNC](configure-snc.md)<br>- [Configure audit log monitoring rules](configure-audit-log-rules.md)
4040

4141
## Next steps
4242

articles/sentinel/sap/deployment-solution-configuration.md

Lines changed: 1 addition & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -95,23 +95,4 @@ By default, all analytics rules provided in the Microsoft Sentinel Solution for
9595
5. Sensitive privilege user password change and login
9696
6. Brute force (RFC)
9797
7. Function module tested
98-
8. The SAP audit log monitoring analytics rules
99-
100-
#### Configuring the SAP audit log monitoring analytics rules
101-
The two [SAP Audit log monitor rules](sap-solution-security-content.md#built-in-sap-analytics-rules-for-monitoring-the-sap-audit-log) are delivered as ready to run out of the box, and allow for further fine tuning using watchlists:
102-
- **SAP_Dynamic_Audit_Log_Monitor_Configuration**
103-
The **SAP_Dynamic_Audit_Log_Monitor_Configuration** is a watchlist detailing all available SAP standard audit log message IDs and can be extended to contain additional message IDs you might create on your own using ABAP enhancements on your SAP NetWeaver systems.This watchlist allows for customizing an SAP message ID (=event type), at different levels:
104-
- Severities per production/ non-production systems -for example, debugging activity gets “High” for production systems, and “Disabled” for other systems
105-
- Assigning different thresholds for production/ non-production systems- which are considered as “speed limits”. Setting a threshold of 60 events an hour, will trigger an incident if more than 30 events were observed within 30 minutes
106-
- Assigning Rule Types- either “Deterministic” or “AnomaliesOnly” determines by which manner this event is considered
107-
- Roles and Tags to Exclude- specific users can be excluded from specific event types. This field can either accept SAP roles, SAP profiles or Tags:
108-
- Listing SAP roles or SAP profiles ([see User Master data collection](sap-solution-deploy-alternate.md#configuring-user-master-data-collection)) would exclude any user bearing those roles/ profiles from these event types for the same SAP system. For example, specifying the “BASIC_BO_USERS” ABAP role for the RFC related event types will ensure Business Objects users won't trigger incidents when making massive RFC calls.
109-
- Listing tags to be used as identifiers. Tagging an event type works just like specifying SAP roles or profiles, except that tags can be created within the Sentinel workspace, allowing the SOC personnel freedom in excluding users per activity without the dependency on the SAP team. For example, the audit message IDs AUB (authorization changes) and AUD (User master record changes) are assigned with the tag “MassiveAuthChanges”. Users assigned with this tag are excluded from the checks for these activities. Running the workspace function **SAPAuditLogConfigRecommend** will produce a list of recommended tags to be assigned to users, such as 'Add the tags ["GenericTablebyRFCOK"] to user SENTINEL_SRV using the SAP_User_Config watchlist'
110-
- **SAP_User_Config**
111-
This configuration-based watchlist is there to allow for specifying user related tags and other active directory identifiers for the SAP user. Tags are then used for identifying the user in specific contexts. For example, assigning the user GRC_ADMIN with the tag “MassiveAuthChanges” will prevent incidents from being created on user master record and authorization events made by GRC_ADMIN.
112-
113-
More information is available [in this blog](https://aka.ms/Sentinel4sapDynamicDeterministicAuditRuleBlog)
114-
115-
116-
117-
98+
8. The SAP audit log monitoring analytics rules

0 commit comments

Comments
 (0)