Skip to content

Commit 6a823c5

Browse files
committed
Fix formatting on new files
1 parent 826b8cc commit 6a823c5

File tree

3 files changed

+43
-48
lines changed

3 files changed

+43
-48
lines changed

articles/sentinel/data-connectors/tenable-identity-exposure.md

Lines changed: 36 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -118,57 +118,55 @@ To integrate with Tenable Identity Exposure make sure you have:
118118

119119
## Vendor installation instructions
120120

121-
122121
This data connector depends on [afad_parser](https://aka.ms/sentinel-TenableApp-afad-parser) based on a Kusto Function to work as expected which is deployed with the Microsoft Sentinel Solution.
123122

124123
1. Configure the Syslog server
125124

126-
You will first need a **linux Syslog** server that TenableIE will send logs to. Typically you can run **rsyslog** on **Ubuntu**.
127-
You can then configure this server as you wish, but it is recommended to be able to output TenableIE logs in a separate file.
128-
129-
Configure rsyslog to accept logs from your TenableIE IP address.:
130-
131-
```shell
132-
sudo -i
133-
134-
# Set TenableIE source IP address
135-
export TENABLE_IE_IP={Enter your IP address}
136-
137-
# Create rsyslog configuration file
138-
cat > /etc/rsyslog.d/80-tenable.conf << EOF
139-
\$ModLoad imudp
140-
\$UDPServerRun 514
141-
\$ModLoad imtcp
142-
\$InputTCPServerRun 514
143-
\$AllowedSender TCP, 127.0.0.1, $TENABLE_IE_IP
144-
\$AllowedSender UDP, 127.0.0.1, $TENABLE_IE_IP
145-
\$template MsgTemplate,"%TIMESTAMP:::date-rfc3339% %HOSTNAME% %programname%[%procid%]:%msg%\n"
146-
\$template remote-incoming-logs, "/var/log/%PROGRAMNAME%.log"
147-
*.* ?remote-incoming-logs;MsgTemplate
148-
EOF
149-
150-
# Restart rsyslog
151-
systemctl restart rsyslog
152-
```
125+
You will first need a **linux Syslog** server that TenableIE will send logs to. Typically you can run **rsyslog** on **Ubuntu**. You can then configure this server as you wish, but it is recommended to be able to output TenableIE logs in a separate file.
126+
127+
Configure rsyslog to accept logs from your TenableIE IP address.:
128+
129+
```shell
130+
sudo -i
131+
132+
# Set TenableIE source IP address
133+
export TENABLE_IE_IP={Enter your IP address}
134+
135+
# Create rsyslog configuration file
136+
cat > /etc/rsyslog.d/80-tenable.conf << EOF
137+
\$ModLoad imudp
138+
\$UDPServerRun 514
139+
\$ModLoad imtcp
140+
\$InputTCPServerRun 514
141+
\$AllowedSender TCP, 127.0.0.1, $TENABLE_IE_IP
142+
\$AllowedSender UDP, 127.0.0.1, $TENABLE_IE_IP
143+
\$template MsgTemplate,"%TIMESTAMP:::date-rfc3339% %HOSTNAME% %programname%[%procid%]:%msg%\n"
144+
\$template remote-incoming-logs, "/var/log/%PROGRAMNAME%.log"
145+
*.* ?remote-incoming-logs;MsgTemplate
146+
EOF
147+
148+
# Restart rsyslog
149+
systemctl restart rsyslog
150+
```
153151
154152
2. Install and onboard the Microsoft agent for Linux
155153
156-
The OMS agent will receive the TenableIE syslog events and publish it in Microsoft Sentinel :
154+
The OMS agent will receive the TenableIE syslog events and publish it in Microsoft Sentinel :
157155
158156
159157
3. Check agent logs on the Syslog server
160158
161-
```shell
162-
tail -f /var/opt/microsoft/omsagent/log/omsagent.log
163-
```
159+
```shell
160+
tail -f /var/opt/microsoft/omsagent/log/omsagent.log
161+
```
164162
165163
4. Configure TenableIE to send logs to your Syslog server
166164
167-
On your **TenableIE** portal, go to *System*, *Configuration* and then *Syslog*.
168-
From there you can create a new Syslog alert toward your Syslog server.
165+
On your **TenableIE** portal, go to *System*, *Configuration* and then *Syslog*.
166+
From there you can create a new Syslog alert toward your Syslog server.
169167
170-
Once this is done, check that the logs are correctly gathered on your server in a separate file (to do this, you can use the *Test the configuration* button in the Syslog alert configuration in TenableIE).
171-
If you used the Quickstart template, the Syslog server will by default listen on port 514 in UDP and 1514 in TCP, without TLS.
168+
Once this is done, check that the logs are correctly gathered on your server in a separate file (to do this, you can use the *Test the configuration* button in the Syslog alert configuration in TenableIE).
169+
If you used the Quickstart template, the Syslog server will by default listen on port 514 in UDP and 1514 in TCP, without TLS.
172170
173171
5. Configure the custom logs
174172
@@ -180,10 +178,10 @@ Configure the agent to collect the logs.
180178
4. Set the record delimiter to **New Line** if not already the case and click **Next**.
181179
5. Select **Linux** and enter the file path to the **Syslog** file, click **+** then **Next**. The default location of the file is `/var/log/TenableIE.log` if you have a Tenable version <3.1.0, you must also add this linux file location `/var/log/AlsidForAD.log`.
182180
6. Set the **Name** to *Tenable_IE_CL* (Azure automatically adds *_CL* at the end of the name, there must be only one, make sure the name is not *Tenable_IE_CL_CL*).
183-
7. Click **Next**, you will see a resume, then click **Create**
181+
7. Click **Next**, you will see a resume, then click **Create**.
184182
185183
186-
6. Enjoy !
184+
6. Enjoy!
187185
188186
You should now be able to receive logs in the *Tenable_IE_CL* table, logs data can be parse using the **afad_parser()** function, used by all query samples, workbooks and analytic templates.
189187

articles/sentinel/data-connectors/tenable-vulnerability-management.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -85,17 +85,15 @@ To integrate with Tenable Vulnerability Management (using Azure Functions) make
8585
> This data connector depends on a [**TenableVM parser for vulnerabilities**](https://aka.ms/sentinel-TenableApp-TenableVMVulnerabilities-parser) and a [**TenableVM parser for assets**](https://aka.ms/sentinel-TenableApp-TenableVMAssets-parser) based on a Kusto Function to work as expected which is deployed with the Microsoft Sentinel Solution.
8686
8787

88-
**STEP 1 - Configuration steps for TenableVM
88+
**STEP 1 - Configuration steps for TenableVM**
8989

9090
[Follow the instructions](https://docs.tenable.com/vulnerability-management/Content/Settings/my-account/GenerateAPIKey.htm) to obtain the required API credentials.
9191

9292

9393

9494
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function App**
9595

96-
**IMPORTANT:** Before deploying the Workspace data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
97-
98-
96+
Before deploying the Workspace data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
9997

10098
Option 1 - Azure Resource Manager (ARM) Template
10199

articles/sentinel/data-connectors/transmit-security-connector.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -75,9 +75,7 @@ Follow the instructions to obtain the credentials.
7575

7676
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
7777

78-
**IMPORTANT:** Before deploying the Transmit Security data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
79-
80-
78+
Before deploying the Transmit Security data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
8179

8280
Option 1 - Azure Resource Manager (ARM) Template
8381

@@ -88,7 +86,8 @@ Use this method for automated deployment of the Transmit Security Audit data con
8886
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-TransmitSecurityAPI-azuredeploy) [![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://aka.ms/sentinel-TransmitSecurityAPI-azuredeploy-gov)
8987

9088
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
91-
> **NOTE:** Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
89+
90+
Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
9291
3. Enter the **TransmitSecurityClientID**, **TransmitSecurityClientSecret**, **TransmitSecurityUserActivityEndpoint**, **TransmitSecurityAdminActivityEndpoint**, **TransmitSecurityTokenEndpoint** and deploy.
9392
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
9493
5. Click **Purchase** to deploy.
@@ -134,8 +133,8 @@ If you're already signed in, go to the next step.
134133

135134
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
136135

137-
- TransmitSecurityClientID
138-
- TransmitSecurityClientSecret
136+
- TransmitSecurityClientID
137+
- TransmitSecurityClientSecret
139138
- TransmitSecurityAdminActivityEndpoint
140139
- TransmitSecurityUserActivityEndpoint
141140
- TransmitSecurityTokenEndpoint

0 commit comments

Comments
 (0)