You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/cross-workspace.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.collection: usx-security
18
18
19
19
When you set up your Log Analytics workspace enabled for Microsoft Sentinel, you have [multiple architecture options](/azure/azure-monitor/logs/workspace-design?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) and factors to consider. Taking into account geography, regulation, access control, and other factors, you might choose to have multiple workspaces in your organization.
20
20
21
-
When working with SAP, your SAP and SOC teams might need to work in spearate workspaces to maintain security boundaries. You might not want the SAP team to have visibility into all other security logs across your organization. However, the SAP BASIS team plays a critical role in successfully implementing and maintaining the Microsoft Sentinel solution for SAP applications. Their technical knowledge is essential for effectively monitoring SAP systems, configuring security settings, and ensuring that proper incident response procedures are in place. For this reason, the SAP BASIS team must have access to the Microsoft Sentinel workspace, allowing them to collaborate with the SOC team while focusing specifically on SAP-related security monitoring.
21
+
When working with SAP, your SAP and SOC teams might need to work in spearate workspaces to maintain security boundaries. You might not want the SAP team to have visibility into all other security logs across your organization. However, the SAP BASIS team plays a critical role in successfully implementing and maintaining the Microsoft Sentinel solution for SAP applications. Their technical knowledge is essential for effectively monitoring SAP systems, configuring security settings, and ensuring that proper incident response procedures are in place. For this reason, the SAP BASIS team must have access to the Log Analytics workspace enabled for Microsoft Sentinel, allowing them to collaborate with the SOC team while focusing specifically on SAP-related security monitoring.
22
22
23
23
This article discusses how to work with the Microsoft Sentinel solution for SAP applications in multiple workspaces, with improved flexibility for:
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-command-line.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,9 +109,9 @@ This procedure describes how to create a new agent and connect it to your SAP sy
109
109
110
110
You'll use the name of the docker container in the next step.
111
111
112
-
1. Deploying the SAP data connector agent requires that you grant your agent's VM identity with specific permissions to the Microsoft Sentinel workspace, using the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles.
112
+
1. Deploying the SAP data connector agent requires that you grant your agent's VM identity with specific permissions to the Log Analytics workspace enabled for Microsoft Sentinel, using the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles.
113
113
114
-
To run the commandin this step, you must be a resource group owner on your Microsoft Sentinel workspace. If you aren't a resource group owner on your workspace, this procedure can also be performed later on.
114
+
To run the commandin this step, you must be a resource group owner on the Log Analytics workspace enabled for Microsoft Sentinel. If you aren't a resource group owner on your workspace, this procedure can also be performed later on.
115
115
116
116
Assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles to the VM's identity:
117
117
@@ -136,9 +136,9 @@ This procedure describes how to create a new agent and connect it to your SAP sy
136
136
|Placeholder |Value |
137
137
|---------|---------|
138
138
|`<OBJ_ID>`| Your VM identity object ID. <br><br> To find your VM identity object ID in Azure: <br>- **For a managed identity**, the object ID is listed on the VM's **Identity** page. <br>- **For a service principal**, go to **Enterprise application** in Azure. Select **All applications** and then select your VM. The object ID is displayed on the **Overview** page. |
139
-
|`<SUB_ID>` | Your Microsoft Sentinel workspace subscription ID |
140
-
|`<RESOURCE_GROUP_NAME>` | Your Microsoft Sentinel workspace resource group name |
141
-
|`<WS_NAME>` | Your Microsoft Sentinel workspace name |
139
+
|`<SUB_ID>` | The subscription ID for you Log Analytics workspace enabled for Microsoft Sentinel |
140
+
|`<RESOURCE_GROUP_NAME>` | The resource group name for your Log Analytics workspace enabled for Microsoft Sentinel |
141
+
|`<WS_NAME>` | The name of your Log Analytics workspace enabled for Microsoft Sentinel |
142
142
|`<AGENT_IDENTIFIER>` | The agent ID displayed after running the command in the [previous step](#agent-id-managed). |
143
143
144
144
1. To configure the Docker container to start automatically, run the following command, replacing the `<container-name>` placeholder with the name of your container:
@@ -192,9 +192,9 @@ Azure Key Vault is the recommended method to store your authentication credentia
192
192
193
193
You'll use the name of the docker container in the next step.
194
194
195
-
1. Deploying the SAP data connector agent requires that you grant your agent's VM identity with specific permissions to the Microsoft Sentinel workspace, using the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles.
195
+
1. Deploying the SAP data connector agent requires that you grant your agent's VM identity with specific permissions to the Log Analytics workspace enabled for Microsoft Sentinel, using the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles.
196
196
197
-
To run the commands in this step, you must be a resource group owner on your Microsoft Sentinel workspace. If you aren't a resource group owner on your workspace, this step can also be performed later on.
197
+
To run the commands in this step, you must be a resource group owner on your workspace. If you aren't a resource group owner on your workspace, this step can also be performed later on.
198
198
199
199
Assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles to the VM's identity:
200
200
@@ -219,9 +219,9 @@ Azure Key Vault is the recommended method to store your authentication credentia
219
219
|Placeholder |Value |
220
220
|---------|---------|
221
221
|`<OBJ_ID>` | Your VM identity object ID. <br><br> To find your VM identity object ID in Azure: For a managed identity, the object ID is listed on the VM's **Identity** page. For a service principal, go to **Enterprise application**in Azure. Select **All applications** and thenselectyour VM. The object ID is displayed on the **Overview** page. |
222
-
|`<SUB_ID>`| Your Microsoft Sentinel workspace subscription ID |
223
-
|`<RESOURCE_GROUP_NAME>`|Your Microsoft Sentinel workspace resource group name|
224
-
|`<WS_NAME>`|Your Microsoft Sentinel workspace name |
222
+
|`<SUB_ID>`|The subscription ID for your Log Analytics workspace enabled for Microsoft Sentinel|
223
+
|`<RESOURCE_GROUP_NAME>`|The resource group name for your Log Analytics workspace enabled for Microsoft Sentinel|
224
+
|`<WS_NAME>`|The name of your Log Analytics workspace enabled for Microsoft Sentinel|
225
225
|`<AGENT_IDENTIFIER>`| The agent ID displayed after running the commandin the [previous step](#agent-id-file). |
226
226
227
227
1. Run the following command to configure the Docker container to start automatically.
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-data-connector-agent-container.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -296,7 +296,7 @@ While deployment is also supported from the command line, we recommend that you
296
296
297
297
:::image type="content" source="media/deploy-data-connector-agent-container/finish-agent-deployment-role.png" alt-text="Screenshot of the Copy icon for the command from step 1.":::
298
298
299
-
To find your VM identity object ID in Azure: <!--confirm this with Dvir-->
299
+
To find your VM identity object ID in Azure:
300
300
301
301
- For a managed identity, the object ID is listed on the VM's **Identity** page.
302
302
@@ -348,7 +348,7 @@ While deployment is also supported from the command line, we recommend that you
348
348
349
349
When you're done, select **Next: Authentication**.
350
350
351
-
For example: <!--can we get a screenshot with an example?-->
351
+
For example:
352
352
353
353
:::image type="content" source="media/deploy-data-connector-agent-container/create-system.png" alt-text="Screenshot of the Add new system area's System settings tab.":::
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-sap-security-content.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Install the Microsoft Sentinel solution for SAP applications
3
-
description: Learn how to install the Microsoft Sentinel solution for SAP applications from the content hub to your Microsoft Sentinel workspace.
3
+
description: Learn how to install the Microsoft Sentinel solution for SAP applications from the content hub to your Log Analytics workspace enabled for Microsoft Sentinel.
4
4
author: batamig
5
5
ms.author: bagol
6
6
ms.topic: how-to
@@ -16,7 +16,7 @@ ms.collection: usx-security
16
16
17
17
# Install the Microsoft Sentinel solution for SAP applications
18
18
19
-
The Microsoft Sentinel solution for SAP applications includes the SAP data connector, which collects logs from your SAP systems and sends them to your Microsoft Sentinel workspace, and out-of-the-box security content, which helps you gain insight into your organization's SAP environment and detect and respond to security threats. Installing your solution is a required step before you can configure your data connector agent container.
19
+
The Microsoft Sentinel solution for SAP applications includes the SAP data connector, which collects logs from your SAP systems and sends them to your Log Analytics workspace enabled for Microsoft Sentinel, and out-of-the-box security content, which helps you gain insight into your organization's SAP environment and detect and respond to security threats. Installing your solution is a required step before you can configure your data connector agent container.
20
20
21
21
:::image type="content" source="media/deployment-steps/install-solution.png" alt-text="Diagram of the SAP solution deployment flow, highlighting the Install solution content step." border="false":::
22
22
@@ -27,23 +27,23 @@ Content in this article is relevant for your **security** team.
27
27
To deploy the Microsoft Sentinel solution for SAP applications from the content hub, you need:
28
28
29
29
- A Log Analytics workspace enabled for Microsoft Sentinel.
30
-
- Read and write permissions to the workspace. For more information, see [Roles and permissions in Microsoft Sentinel](../roles.md).<!--make them all like this-->
30
+
- Read and write permissions to the workspace. For more information, see [Roles and permissions in Microsoft Sentinel](../roles.md).
31
31
32
32
Make sure that you also review the [prerequisites for deploying Microsoft Sentinel solution for SAP applications](prerequisites-for-deploying-sap-continuous-threat-monitoring.md), especially [Azure prerequisites](prerequisites-for-deploying-sap-continuous-threat-monitoring.md#azure-prerequisites).
33
33
34
34
## Install the solution from the content hub
35
35
36
36
Installing the Microsoft Sentinel solution for SAP applications makes the Microsoft Sentinel for SAP data connector available for you in as a Microsoft Sentinel data connector. The solution also deploys security content, such as the **SAP - System Applications and Products** workbook and SAP-related analytics rules.
37
37
38
-
1. In the Microsoft Sentinel **Content hub**, search for the **SAP applications** solution and install it on your Microsoft Sentinel workspace.
38
+
1. In the Microsoft Sentinel **Content hub**, search for the **SAP applications** solution and install it on your Log Analytics workspace enabled for Microsoft Sentinel.
39
39
40
40
1. On the **Microsoft Sentinel solution for SAP applications** page, select **Create** to define deployment settings. For example:
41
41
42
42
:::image type="content" source="./media/deploy-sap-security-content/sap-solution.png" alt-text="Screenshot that shows the Microsoft Sentinel solution for SAP applications solution pane." lightbox="./media/deploy-sap-security-content/sap-solution.png":::
43
43
44
44
1. On the **Basics** tab, under **Project details**, select the **Subscription** and **Resource group** where you want to install the solution.
45
45
46
-
1. Under **Instance details**, select the **Microsoft Sentinel workspace** where you want to install the solution.
46
+
1. Under **Instance details**, select the Log Analytics workspace enabled for Microsoft Sentinel where you want to install the solution.
47
47
48
48
If you're working with [the Microsoft Sentinel solution for SAP applications in multiple workspaces](cross-workspace.md), select **Some of the data is on a different workspace**, and then define your target workspace, your SOC workspace, and SAP workspace. For example:
49
49
@@ -53,7 +53,7 @@ Installing the Microsoft Sentinel solution for SAP applications makes the Micros
53
53
54
54
1. Select **Review + create** or **Next** to browse through the solution components. When you're ready, select **Create**
55
55
56
-
The deployment process can take a few minutes. After the deployment is finished, you can view the deployed content in your Microsoft Sentinel workspace.
56
+
The deployment process can take a few minutes. After the deployment is finished, you can view the deployed content in Microsoft Sentinel.
57
57
58
58
> [!TIP]
59
59
> If you want the SAP and SOC data to be kept on the same workspace with no additional access controls, do not select **Some of the data is on a different workspace**. In such cases, for more information, see [SAP and SOC data maintained in the same workspace](cross-workspace.md#sap-and-soc-data-maintained-in-the-same-workspace).
Copy file name to clipboardExpand all lines: articles/sentinel/sap/prerequisites-for-deploying-sap-continuous-threat-monitoring.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Typically, Azure prerequisites are managed by your **security** teams.
27
27
28
28
| Prerequisite | Description |Required/optional |
29
29
| ---- | ----------- |----------- |
30
-
|**Access to Microsoft Sentinel**| Make a note of your Microsoft Sentinel *workspace ID* and *primary key*.<br>You can find these details in Microsoft Sentinel: from the navigation menu, select **Settings** > **Workspace settings** > **Agents management**. Copy the *Workspace ID* and *Primary key* and paste them aside for use during the deployment process. |Required |
30
+
|**Access to Microsoft Sentinel**| Make a note of your *workspace ID and *primary key* for your Log Analytics workspace enabled for Microsoft Sentinel.<br>You can find these details in Microsoft Sentinel: from the navigation menu, select **Settings** > **Workspace settings** > **Agents management**. Copy the *Workspace ID* and *Primary key* and paste them aside for use during the deployment process. |Required |
31
31
|**Permissions to create Azure resources**| At a minimum, you must have the necessary permissions to deploy solutions from the Microsoft Sentinel content hub. For more information, see [Prerequisites for deploying Microsoft Sentinel solutions](../sentinel-solutions-deploy.md#prerequisites). |Required |
32
32
|**Permissions to create an Azure key vault or access an existing one**| Use Azure Key Vault to store secrets required to connect to your SAP system. For more information, see [Assign key vault access permissions](deploy-data-connector-agent-container.md#assign-key-vault-access-permissions). |Required if you plan to store the SAP system credentials in Azure Key Vault. <br><br>Optional if you plan to store them in a configuration file. For more information, see [Create a virtual machine and configure access to your credentials](deploy-data-connector-agent-container.md#create-a-virtual-machine-and-configure-access-to-your-credentials).|
33
33
|**Permissions to assign a privileged role to the SAP data connector agent**| Deploying the SAP data connector agent requires that you grant your agent's VM identity with specific permissions to the Microsoft Sentinel workspace, using the **Microsoft Sentinel Business Applications Agent Operator** role. To grant this role, you need **Owner** permissions on the resource group where your Microsoft Sentinel workspace resides. <br><br>For more information, see [Connect your SAP system by deploying your data connector agent container](deploy-data-connector-agent-container.md). | Required. <br> If you don't have **Owner** permissions on the resource group, the relevant step can also be performed by another user who does have the relevant permissions, separately after the agent is fully deployed.|
Copy file name to clipboardExpand all lines: articles/sentinel/sap/sap-audit-controls-workbook.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,9 +35,9 @@ Before you can start using the **SAP - Security Audit log and Initial Access** w
35
35
36
36
- The Microsoft Sentinel solution for SAP applications solution installed and a data connector agent deployed. For more information, see [Deploy Microsoft Sentinel solution for SAP applications](deployment-overview.md).
37
37
38
-
- The **SAP Audit Controls** workbook installed in your Microsoft Sentinel workspace. For more information, see and [Visualize and monitor your data by using workbooks in Microsoft Sentinel](../monitor-your-data.md).
38
+
- The **SAP Audit Controls** workbook installed in your Log Analytics workspace enabled for Microsoft Sentinel. For more information, see and [Visualize and monitor your data by using workbooks in Microsoft Sentinel](../monitor-your-data.md).
39
39
40
-
- At least one incident in your Microsoft Sentinel workspace, with at least one entry available in the `SecurityIncident` table. This doesn't need to be an SAP incident, and you can generate a demo incident using a basic analytics rule if you don't have another one.
40
+
- At least one incident in your workspace, with at least one entry available in the `SecurityIncident` table. This doesn't need to be an SAP incident, and you can generate a demo incident using a basic analytics rule if you don't have another one.
Copy file name to clipboardExpand all lines: articles/sentinel/sap/sap-audit-log-workbook.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ Before you can start using the **SAP - Security Audit log and Initial Access** w
32
32
33
33
- The Microsoft Sentinel solution for SAP applications solution installed and a data connector agent deployed. For more information, see [Deploy Microsoft Sentinel solution for SAP applications](deployment-overview.md).
34
34
35
-
- The **SAP - Security Audit log and Initial Access** workbook installed in your Microsoft Sentinel workspace. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](../monitor-your-data.md).
35
+
- The **SAP - Security Audit log and Initial Access** workbook installed in your Log Analytics workspace enabled for Microsoft Sentinel. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](../monitor-your-data.md).
36
36
37
37
> [!IMPORTANT]
38
38
> The **SAP - Security Audit log and Initial Access** workbook is hosted by the workspace where the Microsoft Sentinel solution for SAP applications were installed. By default, both the SAP and the SOC data is assumed to be on the workspace that hosts the workbook.
0 commit comments