You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws-configure-environment.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,11 +47,11 @@ This diagram shows how to set up your AWS environment to send logs to Azure:
47
47
48
48
### Manual setup
49
49
50
-
Although you can set up the AWS environment manually, as described below, we strongly recommend using the automated tools provided when you [deploy AWS connectors](#4-deploy-aws-connectors) instead.
50
+
Although you can set up the AWS environment manually, as described in this section, we strongly recommend using the automated tools provided when you [deploy AWS connectors](#4-deploy-aws-connectors) instead.
51
51
52
52
#### 1. Create an S3 bucket and SQS queue
53
53
54
-
1. Create an **S3 bucket** to which you'll ship the logs from your AWS services - VPC, GuardDuty, CloudTrail, or CloudWatch.
54
+
1. Create an **S3 bucket** to which you can send the logs from your AWS services - VPC, GuardDuty, CloudTrail, or CloudWatch.
55
55
56
56
See the [instructions to create an S3 storage bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-bucket-overview.html) in the AWS documentation.
57
57
@@ -72,7 +72,7 @@ Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect
72
72
73
73
| Parameter | Selection/Value | Comments |
74
74
| - | - | - |
75
-
|**Client ID**| - | Ignore this, you already have it. See **Audience** line below. |
75
+
|**Client ID**| - | Ignore this, you already have it. See **Audience**. |
76
76
|**Provider type**|*OpenID Connect*| Instead of default *SAML*.|
|**Thumbprint**|`626d44e704d1ceabe3bf0d53397464ac8080142c`| If created in the IAM console, selecting **Get thumbprint** should give you this result. |
@@ -88,12 +88,12 @@ Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect
88
88
|**Identity provider**| Commercial:<br>`sts.windows.net/33e01921-4d64-4f8c-a055-5bdaffd5e33d/`<br><br>Government:<br>`sts.windows.net/cab8a31a-1906-4287-a0d8-4eef66b95f6e/`| The provider you created in the previous step. |
89
89
|**Audience**| Commercial:<br>`api://1462b192-27f7-4cb9-8523-0f4ecb54b47e`<br><br>Government:<br>`api://d4230588-5f84-4281-a9c7-2c15194b28f7`| The audience you defined for the identity provider in the previous step. |
90
90
|**Permissions to assign**| <ul><li>`AmazonSQSReadOnlyAccess`<li>`AWSLambdaSQSQueueExecutionRole`<li>`AmazonS3ReadOnlyAccess`<li>`ROSAKMSProviderPolicy`<li>Other policies for ingesting the different types of AWS service logs | For information on these policies, see the relevant AWS S3 connector permissions policies page, in the Microsoft Sentinel GitHub repository.<ul><li>[AWS Commercial S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPolicies.md)<li>[AWS Government S3 connector permissions policies page](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/AwsRequiredPoliciesForGov.md)|
91
-
|**Name**| "OIDC_*MicrosoftSentinelRole*"| Choose a meaningful name that includes a reference to Microsoft Sentinel.<br><br>The name must include the exact prefix `OIDC_`, otherwise the connector won't function properly. |
91
+
|**Name**| "OIDC_*MicrosoftSentinelRole*"| Choose a meaningful name that includes a reference to Microsoft Sentinel.<br><br>The name must include the exact prefix `OIDC_`; otherwise, the connector can't function properly. |
92
92
93
93
1. Edit the new role's trust policy and add another condition:<br>`"sts:RoleSessionName": "MicrosoftSentinel_{WORKSPACE_ID)"`
94
94
95
95
> [!IMPORTANT]
96
-
> The value of the `sts:RoleSessionName` parameter must have the exact prefix `MicrosoftSentinel_`, otherwise the connector won't function properly.
96
+
> The value of the `sts:RoleSessionName` parameter must have the exact prefix `MicrosoftSentinel_`; otherwise the connector doesn't function properly.
97
97
98
98
The finished trust policy should look like this:
99
99
@@ -125,7 +125,7 @@ Follow these instructions in the AWS documentation:<br>[Creating OpenID Connect
125
125
126
126
#### Configure AWS services to export logs to an S3 bucket
127
127
128
-
See Amazon Web Services documentation (linked below) for the instructions for sending each type of log to your S3 bucket:
128
+
See the linked Amazon Web Services documentation for instructions for sending each type of log to your S3 bucket:
129
129
130
130
-[Publish a VPC flow log to an S3 bucket](https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs-s3.html).
0 commit comments