Skip to content

Commit 6dc234a

Browse files
Merge pull request #250482 from cmcclister/Broken-link-fix-cwatson-cat
Broken Links Fixed
2 parents 0d2c648 + d890aa9 commit 6dc234a

6 files changed

+37
-47
lines changed

articles/sentinel/data-connectors/delinea-secret-server.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,6 @@ To integrate with Delinea Secret Server make sure you have:
5252

5353
- **Delinea Secret Server**: must be configured to export logs via Syslog
5454

55-
[Learn more about configure Secret Server](https://thy.center/ss/link/syslog)
56-
57-
5855
## Vendor installation instructions
5956

6057
1. Linux Syslog agent configuration

articles/sentinel/data-connectors/infoblox-cloud-data-connector.md

Lines changed: 28 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -88,10 +88,12 @@ InfobloxCDC
8888
## Vendor installation instructions
8989

9090

91-
>**IMPORTANT:** This data connector depends on a parser based on a Kusto Function to work as expected called [**InfobloxCDC**](https://aka.ms/sentinel-InfobloxCloudDataConnector-parser) which is deployed with the solution.
91+
> [!IMPORTANT]
92+
> This data connector depends on a parser based on a Kusto Function to work as expected called **InfobloxCDC** which is deployed with the solution.
9293
9394

94-
>**IMPORTANT:** This Microsoft Sentinel data connector assumes an Infoblox Cloud Data Connector host has already been created and configured in the Infoblox Cloud Services Portal (CSP). As the [**Infoblox Cloud Data Connector**](https://docs.infoblox.com/display/BloxOneThreatDefense/Deploying+the+Data+Connector+Solution) is a feature of BloxOne Threat Defense, access to an appropriate BloxOne Threat Defense subscription is required. See this [**quick-start guide**](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-data-connector.pdf) for more information and licensing requirements.
95+
> [!IMPORTANT]
96+
> This Microsoft Sentinel data connector assumes an Infoblox Cloud Data Connector host has already been created and configured in the Infoblox Cloud Services Portal (CSP). As the [**Infoblox Cloud Data Connector**](https://docs.infoblox.com/display/BloxOneThreatDefense/Deploying+the+Data+Connector+Solution) is a feature of BloxOne Threat Defense, access to an appropriate BloxOne Threat Defense subscription is required. See this [**quick-start guide**](https://www.infoblox.com/wp-content/uploads/infoblox-deployment-guide-data-connector.pdf) for more information and licensing requirements.
9597
9698
1. Linux Syslog agent configuration
9799

@@ -101,7 +103,7 @@ Install and configure the Linux agent to collect your Common Event Format (CEF)
101103
102104
1.1 Select or create a Linux machine
103105

104-
Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Microsoft Sentinel or other clouds.
106+
Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-premises environment, Microsoft Sentinel or other clouds.
105107

106108
1.2 Install the CEF collector on the Linux machine
107109

@@ -118,35 +120,36 @@ Install the Microsoft Monitoring Agent on your Linux machine and configure the m
118120
2. Configure Infoblox BloxOne to send Syslog data to the Infoblox Cloud Data Connector to forward to the Syslog agent
119121

120122
Follow the steps below to configure the Infoblox CDC to send BloxOne data to Microsoft Sentinel via the Linux Syslog agent.
121-
2. Navigate to **Manage > Data Connector**.
122-
3. Click the **Destination Configuration** tab at the top.
123-
4. Click **Create > Syslog**.
124-
- **Name**: Give the new Destination a meaningful **name**, such as **Microsoft-Sentinel-Destination**.
125-
- **Description**: Optionally give it a meaningful **description**.
126-
- **State**: Set the state to **Enabled**.
127-
- **Format**: Set the format to **CEF**.
128-
- **FQDN/IP**: Enter the IP address of the Linux device on which the Linux agent is installed.
129-
- **Port**: Leave the port number at **514**.
130-
- **Protocol**: Select desired protocol and CA certificate if applicable.
131-
- Click **Save & Close**.
132-
5. Click the **Traffic Flow Configuration** tab at the top.
133-
6. Click **Create**.
134-
- **Name**: Give the new Traffic Flow a meaningful **name**, such as **Microsoft-Sentinel-Flow**.
135-
- **Description**: Optionally give it a meaningful **description**.
136-
- **State**: Set the state to **Enabled**.
137-
- Expand the **CDC Enabled Host** section.
138-
- **On-Prem Host**: Select your desired on-prem host for which the Data Connector service is enabled.
139-
- Expand the **Source Configuration** section.
123+
124+
1. Navigate to **Manage > Data Connector**.
125+
1. Click the **Destination Configuration** tab at the top.
126+
1. Click **Create > Syslog**.
127+
- **Name**: Give the new Destination a meaningful **name**, such as **Microsoft-Sentinel-Destination**.
128+
- **Description**: Optionally give it a meaningful **description**.
129+
- **State**: Set the state to **Enabled**.
130+
- **Format**: Set the format to **CEF**.
131+
- **FQDN/IP**: Enter the IP address of the Linux device on which the Linux agent is installed.
132+
- **Port**: Leave the port number at **514**.
133+
- **Protocol**: Select desired protocol and CA certificate if applicable.
134+
- Click **Save & Close**.
135+
1. Click the **Traffic Flow Configuration** tab at the top.
136+
1. Click **Create**.
137+
- **Name**: Give the new Traffic Flow a meaningful **name**, such as **Microsoft-Sentinel-Flow**.
138+
- **Description**: Optionally give it a meaningful **description**.
139+
- **State**: Set the state to **Enabled**.
140+
- Expand the **CDC Enabled Host** section.
141+
- **On-Prem Host**: Select your desired on-premises host for which the Data Connector service is enabled.
142+
- Expand the **Source Configuration** section.
140143
- **Source**: Select **BloxOne Cloud Source**.
141144
- Select all desired **log types** you wish to collect. Currently supported log types are:
142145
- Threat Defense Query/Response Log
143146
- Threat Defense Threat Feeds Hits Log
144147
- DDI Query/Response Log
145148
- DDI DHCP Lease Log
146-
- Expand the **Destination Configuration** section.
149+
- Expand the **Destination Configuration** section.
147150
- Select the **Destination** you just created.
148-
- Click **Save & Close**.
149-
7. Allow the configuration some time to activate.
151+
- Click **Save & Close**.
152+
1. Allow the configuration some time to activate.
150153

151154
3. Validate connection
152155

articles/sentinel/data-connectors/island-enterprise-browser-admin-audit-polling-ccp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ To integrate with Island Enterprise Browser Admin Audit (Polling CCP) make sure
4444

4545
Connect Island to Microsoft Sentinel
4646

47-
Provide the Island API URL and Key. API URL is https://management.island.io/api/external/v1/adminActions for US or https://eu.management.island.io/api/external/v1/adminActions for EU.
47+
Provide the Island API URL and Key. API URL is ```https://management.island.io/api/external/v1/adminActions``` for US or ```https://eu.management.island.io/api/external/v1/adminActions``` for EU.
4848
Generate the API Key in the Management Console under Settings > API.
4949

5050

articles/sentinel/data-connectors/microsoft-defender-for-office-365.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,3 @@ For more information, see the [Microsoft Sentinel documentation](https://go.micr
3232
| **Log Analytics table(s)** | SecurityAlert (OATP)<br/> |
3333
| **Data collection rules support** | Not currently supported |
3434
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com/) |
35-
36-
37-
## Next steps
38-
39-
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/azuresentinel.azure-sentinel-solution-microsoftdefenderforoffice?tab=Overview) in the Azure Marketplace.

articles/sentinel/data-connectors/netskope-using-azure-functions.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,10 @@ Netskope
4949
To integrate with Netskope (using Azure Functions) make sure you have:
5050

5151
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
52-
- **Netskope API Token**: A Netskope API Token is required. [See the documentation to learn more about Netskope API](https://innovatechcloud.goskope.com/docs/Netskope_Help/en/rest-api-v1-overview.html). **Note:** A Netskope account is required
53-
52+
- **Netskope API Token**: A Netskope account and API Token are required.
5453

5554
## Vendor installation instructions
5655

57-
5856
> [!NOTE]
5957
> - This connector uses Azure Functions to connect to Netskope to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
6058
> - This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias Netskope and load the function code or click [here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Netskope/Parsers/Netskope.txt), on the second line of the query, enter the hostname(s) of your Netskope device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
@@ -72,7 +70,7 @@ To integrate with Netskope (using Azure Functions) make sure you have:
7270
7371
Option 1 - Azure Resource Manager (ARM) Template
7472

75-
This method provides an automated deployment of the Netskope connector using an ARM Tempate.
73+
This method provides an automated deployment of the Netskope connector using an ARM Template.
7674

7775
1. Click the **Deploy to Azure** button below.
7876

@@ -94,10 +92,10 @@ This method provides the step-by-step instructions to deploy the Netskope connec
9492

9593
**1. Create a Function App**
9694

97-
1. From the Azure Portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
95+
1. From the Azure portal, navigate to [Function App](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.Web%2Fsites/kind/functionapp), and select **+ Add**.
9896
2. In the **Basics** tab, ensure Runtime stack is set to **Powershell Core**.
9997
3. In the **Hosting** tab, ensure the **Consumption (Serverless)** plan type is selected.
100-
4. Make other preferrable configuration changes, if needed, then click **Create**.
98+
4. Make other preferable configuration changes, if needed, then click **Create**.
10199

102100

103101
**2. Import Function App Code**
@@ -121,9 +119,9 @@ This method provides the step-by-step instructions to deploy the Netskope connec
121119
timeInterval
122120
logTypes
123121
logAnalyticsUri (optional)
124-
- Enter the URI that corresponds to your region. The `uri` value must follow the following schema: `https://<Tenant Name>.goskope.com` - There is no need to add subsquent parameters to the Uri, the Function App will dynamically append the parameteres in the proper format.
122+
- Enter the URI that corresponds to your region. The `uri` value must follow the following schema: `https://<Tenant Name>.goskope.com` - There is no need to add subsequent parameters to the Uri, the Function App will dynamically append the parameters in the proper format.
125123
- Set the `timeInterval` (in minutes) to the default value of `5` to correspond to the default Timer Trigger of every `5` minutes. If the time interval needs to be modified, it is recommended to change the Function App Timer Trigger accordingly to prevent overlapping data ingestion.
126-
- Set the `logTypes` to `alert, page, application, audit, infrastructure, network` - This list represents all the avaliable log types. Select the log types based on logging requirements, seperating each by a single comma.
124+
- Set the `logTypes` to `alert, page, application, audit, infrastructure, network` - This list represents all the available log types. Select the log types based on logging requirements, separating each by a single comma.
127125
> [!NOTE]
128126
> If using Azure Key Vault, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](/azure/app-service/app-service-key-vault-references) for further details.
129127
- Use logAnalyticsUri to override the log analytics API endpoint for dedicated cloud. For example, for public cloud, leave the value empty; for Azure GovUS cloud environment, specify the value in the following format: `https://<CustomerId>.ods.opinsights.azure.us`.

articles/sentinel/data-connectors/symantec-vip.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,9 @@ Configure the facilities you want to collect and their severities.
6464
2. Select **Apply below configuration to my machines** and select the facilities and severities.
6565
3. Click **Save**.
6666

67+
3. Connect the Symantec VIP
6768

68-
3. Configure and connect the Symantec VIP
69-
70-
[Follow these instructions](https://help.symantec.com/cs/VIP_EG_INSTALL_CONFIG/VIP/v134652108_v128483142/Configuring-syslog) to configure the Symantec VIP Enterprise Gateway to forward syslog. Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
71-
72-
69+
Use the IP address or hostname for the Linux device with the Linux agent installed as the Destination IP address.
7370

7471
## Next steps
7572

0 commit comments

Comments
 (0)