Skip to content

Commit 3f78fb5

Browse files
authored
Merge pull request #197024 from MSFTandrelom/andrelom-docsv2.1
Edits to v2 docs
2 parents baac441 + 15836e9 commit 3f78fb5

7 files changed

+81
-106
lines changed

articles/sentinel/sap/configure-snc.md

Lines changed: 12 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -134,25 +134,28 @@ This section explains how to import a certificate so that it's trusted by your A
134134
chmod +x ./sapcon-sentinel-kickstart.sh
135135
```
136136
137-
1. Run the script, specifying the following parameters:
137+
1. Run the script, specifying the following base parameters:
138138
139139
```bash
140140
./sapcon-sentinel-kickstart.sh \
141141
--use-snc \
142142
--cryptolib <path to sapcryptolib.so> \
143143
--sapgenpse <path to sapgenpse> \
144-
# CLIENT CERTIFICATE
145-
# If client certificate is in .crt/.key format
144+
--server-cert <path to server certificate public key> \
145+
```
146+
If the client certificate is in .crt/.key format, use the following switches:
147+
```bash
146148
--client-cert <path to client certificate public key> \
147149
--client-key <path to client certificate private key> \
148-
# If client certificate is in .pfx or .p12 format
150+
```
151+
If client certificate is in .pfx or .p12 format
152+
```bash
149153
--client-pfx <pfx filename>
150154
--client-pfx-passwd <password>
151-
# If client certificate issued by enterprise CA
152-
--cacert <path to ca certificate> # for each CA in the trust chain
153-
# SERVER CERTIFICATE
154-
--server-cert <path to server certificate public key> \
155-
155+
```
156+
If client certificate issued by enterprise CA, add the switch for **each** CA in the trust chain
157+
```bash
158+
--cacert <path to ca certificate> #
156159
```
157160
158161
For example:
@@ -162,17 +165,10 @@ This section explains how to import a certificate so that it's trusted by your A
162165
--use-snc \
163166
--cryptolib /home/azureuser/libsapcrypto.so \
164167
--sapgenpse /home/azureuser/sapgenpse \
165-
# CLIENT CERTIFICATE
166-
# If client certificate is in .crt/.key format
167168
--client-cert /home/azureuser/client.crt \
168169
--client-key /home/azureuser/client.key \
169-
# If client certificate is in .pfx or .p12 format
170-
--client-pfx /home/azureuser/client.pfx \
171-
--client-pfx-passwd <password>
172-
# If client certificate issued by enterprise CA
173170
--cacert /home/azureuser/issuingca.crt
174171
--cacert /home/azureuser/rootca.crt
175-
# SERVER CERTIFICATE
176172
--server-cert /home/azureuser/server.crt \
177173
```
178174

articles/sentinel/sap/configure-transport.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ The following steps show the process for configuring the Transport Management Sy
7575
Now that you've configured the Transport Management System, you'll be able to successfully complete the `STMS_IMPORT` transaction and you can continue [preparing your SAP environment](preparing-sap.md) for deploying the Continuous Threat Monitoring solution for SAP in Microsoft Sentinel.
7676

7777
> [!div class="nextstepaction"]
78-
> [Deploy SAP Change Requests and configure authorization](preparing-sap.md#set-up-the-applications)
78+
> [Deploy SAP Change Requests and configure authorization](preparing-sap.md#import-the-crs)
7979
8080
Learn more about the Microsoft Sentinel SAP solutions:
8181

articles/sentinel/sap/deploy-data-connector-agent-container.md

Lines changed: 38 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -37,19 +37,19 @@ Deployment of the SAP continuous threat monitoring solution is divided into the
3737

3838
## Data connector agent deployment overview
3939

40-
The Continuous Threat Monitoring solution for SAP is built on first getting all your SAP log data into Microsoft Sentinel, so that all the other components of the solution can do their jobs. To accomplish this, you need to deploy the SAP data connector agent.
40+
For the Continuous Threat Monitoring solution for SAP to operate correctly, data must first be ingested from SAP system into Microsoft Sentinel. To accomplish this, you need to deploy the Continuous Threat Monitoring solution for SAP data connector agent.
4141

42-
The data connector agent runs as a container on a Linux virtual machine (VM). This VM can be hosted either in Azure, in other clouds, or on-premises. You install and configure this container using a *kickstart* script.
42+
The data connector agent runs as a container on a Linux virtual machine (VM). This VM can be hosted either in Azure, in a third-party cloud, or on-premises. The recommended way for you to install and configure this container is by using a *kickstart* script, however you can choose to deploy the container [manually](?tabs=deploy-manually)
4343

44-
The agent connects to your SAP system to pull the logs from it, and then sends those logs to your Microsoft Sentinel workspace. To do this, the agent has to authenticate to your SAP system - that's why you created a user and a role for the agent in your SAP system in the previous step.
44+
The agent connects to your SAP system to pull logs and other data from it, then sends those logs to your Microsoft Sentinel. To do this, the agent has to authenticate to your SAP system - that's why you created a user and a role for the agent in your SAP system in the previous step.
4545

4646
Your SAP authentication infrastructure, and where you deploy your VM, will determine how and where your agent configuration information, including your SAP authentication secrets, is stored. These are the options, in descending order of preference:
4747

4848
- An Azure Key Vault, accessed through an Azure **system-assigned managed identity**
4949
- An Azure Key Vault, accessed through an Azure AD **registered-application service principal**
5050
- A plaintext **configuration file**
5151

52-
If your **SAP authentication** infrastructure is based on **PKI**, using **X.509 certificates**, your only option is to use a configuration file. Select the **Configuration file** tab below for the instructions to deploy your agent container.
52+
If your **SAP authentication** infrastructure is based on **SNC**, using **X.509 certificates**, your only option is to use a configuration file. Select the **Configuration file** tab below for the instructions to deploy your agent container.
5353

5454
If not, then your SAP configuration and authentication secrets can and should be stored in an [**Azure Key Vault**](../../key-vault/general/authentication.md). How you access your key vault depends on where your VM is deployed:
5555

@@ -65,11 +65,18 @@ If not, then your SAP configuration and authentication secrets can and should be
6565

6666
# [Managed identity](#tab/managed-identity)
6767

68+
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
69+
1.
6870
1. Run the following command to **Create a VM** in Azure (substitute actual names for the `<placeholders>`):
6971

7072
```azurecli
7173
az vm create --resource-group <resource group name> --name <VM Name> --image Canonical:0001-com-ubuntu-server-focal:20_04-lts-gen2:latest --admin-username <azureuser> --public-ip-address "" --size Standard_D2as_v5 --generate-ssh-keys --assign-identity
7274
```
75+
For more information, see [Quickstart: Create a Linux virtual machine with the Azure CLI](../../virtual-machines/linux/quick-create-cli.md).
76+
77+
> [!IMPORTANT]
78+
> After the VM is created, be sure to apply any security requirements and hardening procedures applicable in your organization.
79+
>
7380
7481
The command above will create the VM resource, producing output that looks like this:
7582
@@ -92,33 +99,21 @@ If not, then your SAP configuration and authentication secrets can and should be
9299
```
93100
94101
1. Copy the **systemAssignedIdentity** GUID, as it will be used in the coming steps.
95-
96-
For more information, see [Quickstart: Create a Linux virtual machine with the Azure CLI](../../virtual-machines/linux/quick-create-cli.md).
97-
98-
> [!IMPORTANT]
99-
> After the VM is created, be sure to apply any security requirements and hardening procedures applicable in your organization.
100-
>
101-
102-
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`):
102+
103+
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`). If you'll be using an existing key vault, ignore this step:
103104
104105
```azurecli
105-
kvgp=<KVResourceGroup>
106-
kvname=<keyvaultname>
107-
108-
#Create a key vault
109106
az keyvault create \
110-
--name $kvname \
111-
--resource-group $kvgp
112-
```
113-
114-
If you'll be using an existing key vault, ignore this step.
107+
--name <KeyVaultName> \
108+
--resource-group <KeyVaultResourceGroupName>
109+
```
115110
116111
1. Copy the name of the (newly created or existing) key vault and the name of its resource group. You'll need these when you run the deployment script in the coming steps.
117112
118113
1. Run the following command to **assign a key vault access policy** to the VM's system-assigned identity that you copied above (substitute actual names for the `<placeholders>`):
119114
120115
```azurecli
121-
az keyvault set-policy -n <key vault name> -g <key vault resource group> --object-id <VM system-assigned identity> --secret-permissions get list set
116+
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --object-id <VM system-assigned identity> --secret-permissions get list set
122117
```
123118
124119
This policy will allow the VM to list, read, and write secrets from/to the key vault.
@@ -133,7 +128,7 @@ If not, then your SAP configuration and authentication secrets can and should be
133128
wget -O sapcon-sentinel-kickstart.sh https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/SAP/sapcon-sentinel-kickstart.sh && bash ./sapcon-sentinel-kickstart.sh
134129
```
135130
136-
The script updates the OS components and installs the Azure CLI and Docker software.
131+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts, or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md)
137132
138133
1. **Follow the on-screen instructions** to enter your SAP and key vault details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
139134
@@ -153,6 +148,8 @@ If not, then your SAP configuration and authentication secrets can and should be
153148
154149
# [Registered application](#tab/registered-application)
155150
151+
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
152+
1.
156153
1. Run the following command to **create and register an application**:
157154
158155
```azurecli
@@ -172,26 +169,19 @@ If not, then your SAP configuration and authentication secrets can and should be
172169
173170
1. Copy the **appId**, **tenant**, and **password** from the output. You'll need these for assigning the key vault access policy and running the deployment script in the coming steps.
174171
175-
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`):
172+
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`). If you'll be using an existing key vault, ignore this step :
176173
177174
```azurecli
178-
kvgp=<KVResourceGroup>
179-
kvname=<keyvaultname>
180-
181-
#Create a key vault
182175
az keyvault create \
183-
--name $kvname \
184-
--resource-group $kvgp
185-
```
186-
187-
If you'll be using an existing key vault, ignore this step.
188-
176+
--name <KeyVaultName> \
177+
--resource-group <KeyVaultResourceGroupName>
178+
```
189179
1. Copy the name of the (newly created or existing) key vault and the name of its resource group. You'll need these for assigning the key vault access policy and running the deployment script in the coming steps.
190180
191181
1. Run the following command to **assign a key vault access policy** to the registered application ID that you copied above (substitute actual names or values for the `<placeholders>`):
192182
193183
```azurecli
194-
az keyvault set-policy -n <key vault name> -g <key vault resource group> --spn <appid> --secret-permissions get list set
184+
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --spn <appId> --secret-permissions get list set
195185
```
196186
197187
For example:
@@ -215,7 +205,7 @@ If not, then your SAP configuration and authentication secrets can and should be
215205
./sapcon-sentinel-kickstart.sh --keymode kvsi --appid aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa --appsecret ssssssssssssssssssssssssssssssssss -tenantid bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb -kvaultname <key vault name>
216206
```
217207
218-
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values.
208+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts, or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md)
219209
220210
1. **Follow the on-screen instructions** to enter the requested details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
221211
@@ -235,6 +225,8 @@ If not, then your SAP configuration and authentication secrets can and should be
235225
236226
# [Configuration file](#tab/config-file)
237227
228+
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
229+
1.
238230
1. Run the following commands to **download the deployment Kickstart script** from the Microsoft Sentinel GitHub repository and **mark it executable**:
239231
240232
```bash
@@ -248,7 +240,7 @@ If not, then your SAP configuration and authentication secrets can and should be
248240
./sapcon-sentinel-kickstart.sh --keymode cfgf
249241
```
250242
251-
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values.
243+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts, or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md)
252244
253245
1. **Follow the on-screen instructions** to enter the requested details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
254246
@@ -269,11 +261,11 @@ If not, then your SAP configuration and authentication secrets can and should be
269261
270262
---
271263
272-
## Deploy the SAP data connector manually
264+
# [Manual Deployment](#tab/deploy-manually)
273265
274266
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
275267
276-
1. Install [Docker](https://www.docker.com/)
268+
1. Install [Docker](https://www.docker.com/) on the VM, following [recommended deployment steps](https://docs.docker.com/engine/install/) for the chosen operating system
277269
278270
1. Use the following commands (replacing <*SID*> with the name of the SAP instance) to create a folder to store the container configuration and metadata, and to download a sample systemconfig.ini file into that folder.
279271
@@ -295,14 +287,20 @@ If not, then your SAP configuration and authentication secrets can and should be
295287
docker create -d --restart unless-stopped -v /opt/sapcon/$sid/:/sapcon-app/sapcon/config/system --name sapcon-$sid sapcon
296288
````
297289
298-
1. Run the following command (replacing <*SID*> with the name of the SAP instance) to copy the SDK into the container.
290+
1. Run the following command (replacing <*SID*> with the name of the SAP instance and <*sdkfilename*> with full filename of the SAP NetWeaver SDK) to copy the SDK into the container.
299291
300292
````bash
301293
sdkfile=<sdkfilename>
302294
sid=<SID>
303295
docker cp $sdkfile sapcon-$sid:/sapcon-app/inst/
304296
````
305297
298+
1. Run the following command (replacing <*SID*> with the name of the SAP instance) to start the container.
299+
````bash
300+
sid=<SID>
301+
docker start sapcon-$sid
302+
````
303+
306304
## Next steps
307305
308306
Once connector is deployed, proceed to deploy Continuous Threat Monitoring for SAP solution content

articles/sentinel/sap/deploy-sap-security-content.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@ Deploy the [SAP security content](sap-solution-security-content.md) from the Mic
4141

4242
The **Microsoft Sentinel - Continuous Threat Monitoring for SAP** solution enables the SAP data connector to be displayed in the Microsoft Sentinel **Data connectors** area. The solution also deploys the **SAP - System Applications and Products** workbook and SAP-related analytics rules.
4343

44-
Add SAP-related watchlists to your Microsoft Sentinel workspace manually.
45-
4644
To deploy SAP solution security content, do the following:
4745

4846
1. In Microsoft Sentinel, on the left pane, select **Content hub (Preview)**.
@@ -53,12 +51,10 @@ To deploy SAP solution security content, do the following:
5351

5452
:::image type="content" source="./media/deploy-sap-security-content/sap-solution.png" alt-text="Screenshot of the 'Microsoft Sentinel - Continuous Threat Monitoring for SAP' solution pane." lightbox="media/deploy-sap-security-content/sap-solution.png":::
5553

56-
1. To launch the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription, resource group, and Log Analytics workspace where you want to deploy the solution.
54+
1. To launch the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription, resource group, and Log Analytics workspace (the one which is used by Microsoft Sentinel) where you want to deploy the solution.
5755

5856
1. Select **Next** to cycle through the **Data Connectors**, **Analytics**, and **Workbooks** tabs, where you can learn about the components that will be deployed with this solution.
5957

60-
The default name for the workbook is **SAP - System Applications and Products**. Change it in the workbooks tab as needed.
61-
6258
For more information, see [Microsoft Sentinel SAP solution: security content reference (public preview)](sap-solution-security-content.md).
6359

6460
1. On the **Review + create tab** pane, wait for the **Validation Passed** message, then select **Create** to deploy the solution.
@@ -73,16 +69,6 @@ To deploy SAP solution security content, do the following:
7369
- **Threat Management** > **Workbooks** > **My workbooks**, to find the [built-in SAP workbooks](sap-solution-security-content.md#built-in-workbooks).
7470
- **Configuration** > **Analytics** to find a series of [SAP-related analytics rules](sap-solution-security-content.md#built-in-analytics-rules).
7571

76-
1. Add SAP-related watchlists to use in your search, detection rules, threat hunting, and response playbooks. These watchlists provide the configuration for the Microsoft Sentinel SAP Continuous Threat Monitoring solution. Do the following:
77-
78-
1. Download SAP watchlists from the Microsoft Sentinel GitHub repository at https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/SAP/Analytics/Watchlists.
79-
80-
1. In the Microsoft Sentinel **Watchlists** area, add the watchlists to your Microsoft Sentinel workspace. Use the downloaded CSV files as the sources, and then customize them as needed for your environment.
81-
82-
[![SAP-related watchlists added to Microsoft Sentinel.](./media/deploy-sap-security-content/sap-watchlists.png)](./media/deploy-sap-security-content/sap-watchlists.png#lightbox)
83-
84-
For more information, see [Use Microsoft Sentinel watchlists](../watchlists.md) and [Available SAP watchlists](sap-solution-security-content.md#available-watchlists).
85-
8672
1. In Microsoft Sentinel, go to the **Microsoft Sentinel Continuous Threat Monitoring for SAP** data connector to confirm the connection:
8773

8874
[![Screenshot of the Microsoft Sentinel Continuous Threat Monitoring for SAP data connector page.](./media/deploy-sap-security-content/sap-data-connector.png)](./media/deploy-sap-security-content/sap-data-connector.png#lightbox)

0 commit comments

Comments
 (0)