You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/configure-transport.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ The following steps show the process for configuring the Transport Management Sy
75
75
Now that you've configured the Transport Management System, you'll be able to successfully complete the `STMS_IMPORT` transaction and you can continue [preparing your SAP environment](preparing-sap.md) for deploying the Continuous Threat Monitoring solution for SAP in Microsoft Sentinel.
76
76
77
77
> [!div class="nextstepaction"]
78
-
> [Deploy SAP Change Requests and configure authorization](preparing-sap.md#set-up-the-applications)
78
+
> [Deploy SAP Change Requests and configure authorization](preparing-sap.md#import-the-crs)
79
79
80
80
Learn more about the Microsoft Sentinel SAP solutions:
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-data-connector-agent-container.md
+38-40Lines changed: 38 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,19 +37,19 @@ Deployment of the SAP continuous threat monitoring solution is divided into the
37
37
38
38
## Data connector agent deployment overview
39
39
40
-
The Continuous Threat Monitoring solution for SAP is built on first getting all your SAP log data into Microsoft Sentinel, so that all the other components of the solution can do their jobs. To accomplish this, you need to deploy the SAP data connector agent.
40
+
For the Continuous Threat Monitoring solution for SAP to operate correctly, data must first be ingested from SAP system into Microsoft Sentinel. To accomplish this, you need to deploy the Continuous Threat Monitoring solution for SAP data connector agent.
41
41
42
-
The data connector agent runs as a container on a Linux virtual machine (VM). This VM can be hosted either in Azure, in other clouds, or on-premises. You install and configure this container using a *kickstart* script.
42
+
The data connector agent runs as a container on a Linux virtual machine (VM). This VM can be hosted either in Azure, in a third-party cloud, or on-premises. The recommended way for you to install and configure this container is by using a *kickstart* script, however you can choose to deploy the container [manually](?tabs=deploy-manually)
43
43
44
-
The agent connects to your SAP system to pull the logs from it, and then sends those logs to your Microsoft Sentinel workspace. To do this, the agent has to authenticate to your SAP system - that's why you created a user and a role for the agent in your SAP system in the previous step.
44
+
The agent connects to your SAP system to pull logs and other data from it, then sends those logs to your Microsoft Sentinel. To do this, the agent has to authenticate to your SAP system - that's why you created a user and a role for the agent in your SAP system in the previous step.
45
45
46
46
Your SAP authentication infrastructure, and where you deploy your VM, will determine how and where your agent configuration information, including your SAP authentication secrets, is stored. These are the options, in descending order of preference:
47
47
48
48
- An Azure Key Vault, accessed through an Azure **system-assigned managed identity**
49
49
- An Azure Key Vault, accessed through an Azure AD **registered-application service principal**
50
50
- A plaintext **configuration file**
51
51
52
-
If your **SAP authentication** infrastructure is based on **PKI**, using **X.509 certificates**, your only option is to use a configuration file. Select the **Configuration file** tab below for the instructions to deploy your agent container.
52
+
If your **SAP authentication** infrastructure is based on **SNC**, using **X.509 certificates**, your only option is to use a configuration file. Select the **Configuration file** tab below for the instructions to deploy your agent container.
53
53
54
54
If not, then your SAP configuration and authentication secrets can and should be stored in an [**Azure Key Vault**](../../key-vault/general/authentication.md). How you access your key vault depends on where your VM is deployed:
55
55
@@ -65,11 +65,18 @@ If not, then your SAP configuration and authentication secrets can and should be
65
65
66
66
# [Managed identity](#tab/managed-identity)
67
67
68
+
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
69
+
1.
68
70
1. Run the following command to **Create a VM** in Azure (substitute actual names for the `<placeholders>`):
69
71
70
72
```azurecli
71
73
az vm create --resource-group <resource group name> --name <VM Name> --image Canonical:0001-com-ubuntu-server-focal:20_04-lts-gen2:latest --admin-username <azureuser> --public-ip-address "" --size Standard_D2as_v5 --generate-ssh-keys --assign-identity
72
74
```
75
+
For more information, see [Quickstart: Create a Linux virtual machine with the Azure CLI](../../virtual-machines/linux/quick-create-cli.md).
76
+
77
+
> [!IMPORTANT]
78
+
> After the VM is created, be sure to apply any security requirements and hardening procedures applicable in your organization.
79
+
>
73
80
74
81
The command above will create the VM resource, producing output that looks like this:
75
82
@@ -92,33 +99,21 @@ If not, then your SAP configuration and authentication secrets can and should be
92
99
```
93
100
94
101
1. Copy the **systemAssignedIdentity** GUID, as it will be used in the coming steps.
95
-
96
-
For more information, see [Quickstart: Create a Linux virtual machine with the Azure CLI](../../virtual-machines/linux/quick-create-cli.md).
97
-
98
-
> [!IMPORTANT]
99
-
> After the VM is created, be sure to apply any security requirements and hardening procedures applicable in your organization.
100
-
>
101
-
102
-
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`):
102
+
103
+
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`). If you'll be using an existing key vault, ignore this step:
103
104
104
105
```azurecli
105
-
kvgp=<KVResourceGroup>
106
-
kvname=<keyvaultname>
107
-
108
-
#Create a key vault
109
106
az keyvault create \
110
-
--name $kvname \
111
-
--resource-group $kvgp
112
-
```
113
-
114
-
If you'll be using an existing key vault, ignore this step.
107
+
--name <KeyVaultName> \
108
+
--resource-group <KeyVaultResourceGroupName>
109
+
```
115
110
116
111
1. Copy the name of the (newly created or existing) key vault and the name of its resource group. You'll need these when you run the deployment script in the coming steps.
117
112
118
113
1. Run the following command to **assign a key vault access policy** to the VM's system-assigned identity that you copied above (substitute actual names for the `<placeholders>`):
119
114
120
115
```azurecli
121
-
az keyvault set-policy -n <key vault name> -g <key vault resource group> --object-id <VM system-assigned identity> --secret-permissions get list set
116
+
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --object-id <VM system-assigned identity> --secret-permissions get list set
122
117
```
123
118
124
119
This policy will allow the VM to list, read, and write secrets from/to the key vault.
@@ -133,7 +128,7 @@ If not, then your SAP configuration and authentication secrets can and should be
The script updates the OS components and installs the Azure CLI and Docker software.
131
+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts, or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md)
137
132
138
133
1. **Follow the on-screen instructions** to enter your SAP and key vault details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
139
134
@@ -153,6 +148,8 @@ If not, then your SAP configuration and authentication secrets can and should be
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
152
+
1.
156
153
1. Run the following command to **create and register an application**:
157
154
158
155
```azurecli
@@ -172,26 +169,19 @@ If not, then your SAP configuration and authentication secrets can and should be
172
169
173
170
1. Copy the **appId**, **tenant**, and **password** from the output. You'll need these for assigning the key vault access policy and running the deployment script in the coming steps.
174
171
175
-
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`):
172
+
1. Run the following commands to **create a key vault** (substitute actual names for the `<placeholders>`). If you'll be using an existing key vault, ignore this step :
176
173
177
174
```azurecli
178
-
kvgp=<KVResourceGroup>
179
-
kvname=<keyvaultname>
180
-
181
-
#Create a key vault
182
175
az keyvault create \
183
-
--name $kvname \
184
-
--resource-group $kvgp
185
-
```
186
-
187
-
If you'll be using an existing key vault, ignore this step.
188
-
176
+
--name <KeyVaultName> \
177
+
--resource-group <KeyVaultResourceGroupName>
178
+
```
189
179
1. Copy the name of the (newly created or existing) key vault and the name of its resource group. You'll need these for assigning the key vault access policy and running the deployment script in the coming steps.
190
180
191
181
1. Run the following command to **assign a key vault access policy** to the registered application ID that you copied above (substitute actual names or values for the `<placeholders>`):
192
182
193
183
```azurecli
194
-
az keyvault set-policy -n <key vault name> -g <key vault resource group> --spn <appid> --secret-permissions get list set
184
+
az keyvault set-policy -n <KeyVaultName> -g <KeyVaultResourceGroupName> --spn <appId> --secret-permissions get list set
195
185
```
196
186
197
187
For example:
@@ -215,7 +205,7 @@ If not, then your SAP configuration and authentication secrets can and should be
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values.
208
+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts, or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md)
219
209
220
210
1. **Follow the on-screen instructions** to enter the requested details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
221
211
@@ -235,6 +225,8 @@ If not, then your SAP configuration and authentication secrets can and should be
235
225
236
226
# [Configuration file](#tab/config-file)
237
227
228
+
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
229
+
1.
238
230
1. Run the following commands to **download the deployment Kickstart script** from the Microsoft Sentinel GitHub repository and **mark it executable**:
239
231
240
232
```bash
@@ -248,7 +240,7 @@ If not, then your SAP configuration and authentication secrets can and should be
248
240
./sapcon-sentinel-kickstart.sh --keymode cfgf
249
241
```
250
242
251
-
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values.
243
+
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts, or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md)
252
244
253
245
1. **Follow the on-screen instructions** to enter the requested details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
254
246
@@ -269,11 +261,11 @@ If not, then your SAP configuration and authentication secrets can and should be
269
261
270
262
---
271
263
272
-
## Deploy the SAP data connector manually
264
+
# [Manual Deployment](#tab/deploy-manually)
273
265
274
266
1. Transfer the [SAP NetWeaver SDK](https://aka.ms/sap-sdk-download) to the machine on which you want to install the agent.
275
267
276
-
1. Install [Docker](https://www.docker.com/)
268
+
1. Install [Docker](https://www.docker.com/) on the VM, following [recommended deployment steps](https://docs.docker.com/engine/install/) for the chosen operating system
277
269
278
270
1. Use the following commands (replacing <*SID*> with the name of the SAP instance) to create a folder to store the container configuration and metadata, and to download a sample systemconfig.ini file into that folder.
279
271
@@ -295,14 +287,20 @@ If not, then your SAP configuration and authentication secrets can and should be
1. Run the following command (replacing <*SID*> with the name of the SAP instance) to copy the SDK into the container.
290
+
1. Run the following command (replacing <*SID*> with the name of the SAP instance and <*sdkfilename*> with full filename of the SAP NetWeaver SDK) to copy the SDK into the container.
299
291
300
292
````bash
301
293
sdkfile=<sdkfilename>
302
294
sid=<SID>
303
295
docker cp $sdkfile sapcon-$sid:/sapcon-app/inst/
304
296
````
305
297
298
+
1. Run the following command (replacing <*SID*> with the name of the SAP instance) to start the container.
299
+
````bash
300
+
sid=<SID>
301
+
docker start sapcon-$sid
302
+
````
303
+
306
304
## Next steps
307
305
308
306
Once connector is deployed, proceed to deploy Continuous Threat Monitoring for SAP solution content
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-sap-security-content.md
+1-15Lines changed: 1 addition & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,8 +41,6 @@ Deploy the [SAP security content](sap-solution-security-content.md) from the Mic
41
41
42
42
The **Microsoft Sentinel - Continuous Threat Monitoring for SAP** solution enables the SAP data connector to be displayed in the Microsoft Sentinel **Data connectors** area. The solution also deploys the **SAP - System Applications and Products** workbook and SAP-related analytics rules.
43
43
44
-
Add SAP-related watchlists to your Microsoft Sentinel workspace manually.
45
-
46
44
To deploy SAP solution security content, do the following:
47
45
48
46
1. In Microsoft Sentinel, on the left pane, select **Content hub (Preview)**.
@@ -53,12 +51,10 @@ To deploy SAP solution security content, do the following:
53
51
54
52
:::image type="content" source="./media/deploy-sap-security-content/sap-solution.png" alt-text="Screenshot of the 'Microsoft Sentinel - Continuous Threat Monitoring for SAP' solution pane." lightbox="media/deploy-sap-security-content/sap-solution.png":::
55
53
56
-
1. To launch the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription, resource group, and Log Analytics workspace where you want to deploy the solution.
54
+
1. To launch the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription, resource group, and Log Analytics workspace (the one which is used by Microsoft Sentinel) where you want to deploy the solution.
57
55
58
56
1. Select **Next** to cycle through the **Data Connectors**, **Analytics**, and **Workbooks** tabs, where you can learn about the components that will be deployed with this solution.
59
57
60
-
The default name for the workbook is **SAP - System Applications and Products**. Change it in the workbooks tab as needed.
61
-
62
58
For more information, see [Microsoft Sentinel SAP solution: security content reference (public preview)](sap-solution-security-content.md).
63
59
64
60
1. On the **Review + create tab** pane, wait for the **Validation Passed** message, then select **Create** to deploy the solution.
@@ -73,16 +69,6 @@ To deploy SAP solution security content, do the following:
73
69
-**Threat Management** > **Workbooks** > **My workbooks**, to find the [built-in SAP workbooks](sap-solution-security-content.md#built-in-workbooks).
74
70
-**Configuration** > **Analytics** to find a series of [SAP-related analytics rules](sap-solution-security-content.md#built-in-analytics-rules).
75
71
76
-
1. Add SAP-related watchlists to use in your search, detection rules, threat hunting, and response playbooks. These watchlists provide the configuration for the Microsoft Sentinel SAP Continuous Threat Monitoring solution. Do the following:
77
-
78
-
1. Download SAP watchlists from the Microsoft Sentinel GitHub repository at https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/SAP/Analytics/Watchlists.
79
-
80
-
1. In the Microsoft Sentinel **Watchlists** area, add the watchlists to your Microsoft Sentinel workspace. Use the downloaded CSV files as the sources, and then customize them as needed for your environment.
81
-
82
-
[](./media/deploy-sap-security-content/sap-watchlists.png#lightbox)
83
-
84
-
For more information, see [Use Microsoft Sentinel watchlists](../watchlists.md) and [Available SAP watchlists](sap-solution-security-content.md#available-watchlists).
85
-
86
72
1. In Microsoft Sentinel, go to the **Microsoft Sentinel Continuous Threat Monitoring for SAP** data connector to confirm the connection:
87
73
88
74
[](./media/deploy-sap-security-content/sap-data-connector.png#lightbox)
0 commit comments