Skip to content

Commit 5fb07ee

Browse files
committed
Full draft with tabs
1 parent 3fb30d2 commit 5fb07ee

File tree

1 file changed

+30
-2
lines changed

1 file changed

+30
-2
lines changed

articles/sentinel/connect-cef-verify.md

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,21 @@ The validation script performs the following checks:
6767

6868
1. Checks if there are any security enhancements on the machine that might be blocking network traffic (such as a host firewall).
6969

70-
1. Checks that the syslog daemon (rsyslog or syslog-ng) is properly configured to send messages that it identifies as CEF (using a regex) to the Log Analytics agent on TCP port 25226:
70+
1. Checks that the syslog daemon (rsyslog) is properly configured to send messages that it identifies as CEF (using a regex) to the Log Analytics agent on TCP port 25226:
71+
72+
- Configuration file: `/etc/rsyslog.d/security-config-omsagent.conf`
73+
74+
:rawmsg, regex, "CEF\|ASA" ~
75+
*.* @@127.0.0.1:25226
76+
77+
1. Checks that the syslog daemon is receiving data on port 514
78+
79+
1. Checks that the necessary connections are established: tcp 514 for receiving data, tcp 25226 for internal communication between the syslog daemon and the Log Analytics agent
80+
81+
1. Sends MOCK data to port 514 on localhost. This data should be observable in the Azure Sentinel workspace by running the following query:
82+
83+
CommonSecurityLog
84+
| where DeviceProduct == "MOCK" |
7185

7286
# [syslog-ng daemon](#tab/syslogng)
7387

@@ -95,8 +109,22 @@ The validation script performs the following checks:
95109

96110
1. Checks if there are any security enhancements on the machine that might be blocking network traffic (such as a host firewall).
97111

98-
1. Checks that the syslog daemon (rsyslog or syslog-ng) is properly configured to send messages that it identifies as CEF (using a regex) to the Log Analytics agent on TCP port 25226:
112+
1. Checks that the syslog daemon (syslog-ng) is properly configured to send messages that it identifies as CEF (using a regex) to the Log Analytics agent on TCP port 25226:
113+
114+
- Configuration file: `/etc/syslog-ng/conf.d/security-config-omsagent.conf`
115+
116+
filter f_oms_filter {match(\"CEF\|ASA\" ) ;};
117+
destination oms_destination {tcp(\"127.0.0.1\" port("25226"));};
118+
log {source(s_src);filter(f_oms_filter);destination(oms_destination);};
119+
120+
1. Checks that the syslog daemon is receiving data on port 514
121+
122+
1. Checks that the necessary connections are established: tcp 514 for receiving data, tcp 25226 for internal communication between the syslog daemon and the Log Analytics agent
123+
124+
1. Sends MOCK data to port 514 on localhost. This data should be observable in the Azure Sentinel workspace by running the following query:
99125

126+
CommonSecurityLog
127+
| where DeviceProduct == "MOCK" |
100128

101129
---
102130

0 commit comments

Comments
 (0)