Skip to content

Commit 3d1a6b8

Browse files
committed
Update connect-aws-configure-environment.md
1 parent 1c5240a commit 3d1a6b8

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/sentinel/connect-aws-configure-environment.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,11 @@ This diagram shows how to set up your AWS environment to send logs to Azure:
4747

4848
### Manual setup
4949

50-
Although you can set up the AWS environment manually, as described below, we strongly recommend using the automated tools provided when you [deploy AWS connectors](#4-deploy-aws-connectors) instead.
50+
Although you can set up the AWS environment manually, as described in this section, we strongly recommend using the automated tools provided when you [deploy AWS connectors](#4-deploy-aws-connectors) instead.
5151

5252
#### 1. Create an S3 bucket and SQS queue
5353

54-
1. Create an **S3 bucket** to which you'll ship the logs from your AWS services - VPC, GuardDuty, CloudTrail, or CloudWatch.
54+
1. Create an **S3 bucket** to which you can send the logs from your AWS services - VPC, GuardDuty, CloudTrail, or CloudWatch.
5555

5656
See the [instructions to create an S3 storage bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-bucket-overview.html) in the AWS documentation.
5757

@@ -72,7 +72,7 @@ Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect
7272

7373
| Parameter | Selection/Value | Comments |
7474
| - | - | - |
75-
| **Client ID** | - | Ignore this, you already have it. See **Audience** line below. |
75+
| **Client ID** | - | Ignore this, you already have it. See **Audience**. |
7676
| **Provider type** | *OpenID Connect* | Instead of default *SAML*.|
7777
| **Provider URL** | Commercial:<br>`sts.windows.net/33e01921-4d64-4f8c-a055-5bdaffd5e33d/`<br><br>Government:<br>`sts.windows.net/cab8a31a-1906-4287-a0d8-4eef66b95f6e/` | |
7878
| **Thumbprint** | `626d44e704d1ceabe3bf0d53397464ac8080142c` | If created in the IAM console, selecting **Get thumbprint** should give you this result. |
@@ -88,12 +88,12 @@ Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect
8888
| **Identity provider** | Commercial:<br>`sts.windows.net/33e01921-4d64-4f8c-a055-5bdaffd5e33d/`<br><br>Government:<br>`sts.windows.net/cab8a31a-1906-4287-a0d8-4eef66b95f6e/` | The provider you created in the previous step. |
8989
| **Audience** | Commercial:<br>`api://1462b192-27f7-4cb9-8523-0f4ecb54b47e`<br><br>Government:<br>`api://d4230588-5f84-4281-a9c7-2c15194b28f7` | The audience you defined for the identity provider in the previous step. |
9090
| **Permissions to assign** | <ul><li>`AmazonSQSReadOnlyAccess`<li>`AWSLambdaSQSQueueExecutionRole`<li>`AmazonS3ReadOnlyAccess`<li>`ROSAKMSProviderPolicy`<li>Other policies for ingesting the different types of AWS service logs | For information on these policies, see the relevant AWS S3 connector permissions policies page, in the Microsoft Sentinel GitHub repository.<ul><li>[AWS Commercial S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPolicies.md)<li>[AWS Government S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPoliciesForGov.md)|
91-
| **Name** | "OIDC_*MicrosoftSentinelRole*"| Choose a meaningful name that includes a reference to Microsoft Sentinel.<br><br>The name must include the exact prefix `OIDC_`, otherwise the connector won't function properly. |
91+
| **Name** | "OIDC_*MicrosoftSentinelRole*"| Choose a meaningful name that includes a reference to Microsoft Sentinel.<br><br>The name must include the exact prefix `OIDC_`; otherwise, the connector can't function properly. |
9292

9393
1. Edit the new role's trust policy and add another condition:<br>`"sts:RoleSessionName": "MicrosoftSentinel_{WORKSPACE_ID)"`
9494

9595
> [!IMPORTANT]
96-
> The value of the `sts:RoleSessionName` parameter must have the exact prefix `MicrosoftSentinel_`, otherwise the connector won't function properly.
96+
> The value of the `sts:RoleSessionName` parameter must have the exact prefix `MicrosoftSentinel_`; otherwise the connector doesn't function properly.
9797
9898
The finished trust policy should look like this:
9999

@@ -125,7 +125,7 @@ Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect
125125

126126
#### Configure AWS services to export logs to an S3 bucket
127127

128-
See Amazon Web Services documentation (linked below) for the instructions for sending each type of log to your S3 bucket:
128+
See the linked Amazon Web Services documentation for instructions for sending each type of log to your S3 bucket:
129129

130130
- [Publish a VPC flow log to an S3 bucket](https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs-s3.html).
131131

0 commit comments

Comments
 (0)