You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/tenable-identity-exposure.md
+36-38Lines changed: 36 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,57 +118,55 @@ To integrate with Tenable Identity Exposure make sure you have:
118
118
119
119
## Vendor installation instructions
120
120
121
-
122
121
This data connector depends on [afad_parser](https://aka.ms/sentinel-TenableApp-afad-parser) based on a Kusto Function to work as expected which is deployed with the Microsoft Sentinel Solution.
123
122
124
123
1. Configure the Syslog server
125
124
126
-
You will first need a **linux Syslog** server that TenableIE will send logs to. Typically you can run **rsyslog** on **Ubuntu**.
127
-
You can then configure this server as you wish, but it is recommended to be able to output TenableIE logs in a separate file.
128
-
129
-
Configure rsyslog to accept logs from your TenableIE IP address.:
You will first need a **linux Syslog** server that TenableIE will send logs to. Typically you can run **rsyslog** on **Ubuntu**. You can then configure this server as you wish, but it is recommended to be able to output TenableIE logs in a separate file.
126
+
127
+
Configure rsyslog to accept logs from your TenableIE IP address.:
4. Configure TenableIE to send logs to your Syslog server
166
164
167
-
On your **TenableIE** portal, go to *System*, *Configuration* and then *Syslog*.
168
-
From there you can create a new Syslog alert toward your Syslog server.
165
+
On your **TenableIE** portal, go to *System*, *Configuration* and then*Syslog*.
166
+
From there you can create a new Syslog alert toward your Syslog server.
169
167
170
-
Once this is done, check that the logs are correctly gathered on your server in a separate file (to do this, you can use the *Test the configuration* button in the Syslog alert configuration in TenableIE).
171
-
If you used the Quickstart template, the Syslog server will by default listen on port 514 in UDP and 1514 in TCP, without TLS.
168
+
Once this is done, check that the logs are correctly gathered on your server in a separate file (to do this, you can use the *Test the configuration* button in the Syslog alert configuration in TenableIE).
169
+
If you used the Quickstart template, the Syslog server will by default listen on port 514 in UDP and 1514 in TCP, without TLS.
172
170
173
171
5. Configure the custom logs
174
172
@@ -180,10 +178,10 @@ Configure the agent to collect the logs.
180
178
4. Set the record delimiter to **New Line**if not already the case and click **Next**.
181
179
5. Select **Linux** and enter the file path to the **Syslog** file, click **+**then**Next**. The default location of the file is `/var/log/TenableIE.log`if you have a Tenable version <3.1.0, you must also add this linux file location `/var/log/AlsidForAD.log`.
182
180
6. Set the **Name** to *Tenable_IE_CL* (Azure automatically adds *_CL* at the end of the name, there must be only one, make sure the name is not *Tenable_IE_CL_CL*).
183
-
7. Click **Next**, you will see a resume, then click **Create**
181
+
7. Click **Next**, you will see a resume, then click **Create**.
184
182
185
183
186
-
6. Enjoy!
184
+
6. Enjoy!
187
185
188
186
You should now be able to receive logs in the *Tenable_IE_CL* table, logs data can be parse using the **afad_parser()** function, used by all query samples, workbooks and analytic templates.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/tenable-vulnerability-management.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,17 +85,15 @@ To integrate with Tenable Vulnerability Management (using Azure Functions) make
85
85
> This data connector depends on a [**TenableVM parser for vulnerabilities**](https://aka.ms/sentinel-TenableApp-TenableVMVulnerabilities-parser) and a [**TenableVM parser for assets**](https://aka.ms/sentinel-TenableApp-TenableVMAssets-parser) based on a Kusto Function to work as expected which is deployed with the Microsoft Sentinel Solution.
86
86
87
87
88
-
**STEP 1 - Configuration steps for TenableVM
88
+
**STEP 1 - Configuration steps for TenableVM**
89
89
90
90
[Follow the instructions](https://docs.tenable.com/vulnerability-management/Content/Settings/my-account/GenerateAPIKey.htm) to obtain the required API credentials.
91
91
92
92
93
93
94
94
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function App**
95
95
96
-
**IMPORTANT:** Before deploying the Workspace data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
97
-
98
-
96
+
Before deploying the Workspace data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/transmit-security-connector.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,9 +75,7 @@ Follow the instructions to obtain the credentials.
75
75
76
76
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
77
77
78
-
**IMPORTANT:** Before deploying the Transmit Security data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
79
-
80
-
78
+
Before deploying the Transmit Security data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following).
81
79
82
80
Option 1 - Azure Resource Manager (ARM) Template
83
81
@@ -88,7 +86,8 @@ Use this method for automated deployment of the Transmit Security Audit data con
88
86
[](https://aka.ms/sentinel-TransmitSecurityAPI-azuredeploy) [](https://aka.ms/sentinel-TransmitSecurityAPI-azuredeploy-gov)
89
87
90
88
2. Select the preferred **Subscription**, **Resource Group** and **Location**.
91
-
> **NOTE:** Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
89
+
90
+
Within the same resource group, you can't mix Windows and Linux apps in the same region. Select existing resource group without Windows apps in it or create new resource group.
92
91
3. Enter the **TransmitSecurityClientID**, **TransmitSecurityClientSecret**, **TransmitSecurityUserActivityEndpoint**, **TransmitSecurityAdminActivityEndpoint**, **TransmitSecurityTokenEndpoint** and deploy.
93
92
4. Mark the checkbox labeled **I agree to the terms and conditions stated above**.
94
93
5. Click **Purchase** to deploy.
@@ -134,8 +133,8 @@ If you're already signed in, go to the next step.
134
133
135
134
3. Add each of the following application settings individually, with their respective string values (case-sensitive):
0 commit comments