Skip to content

Commit 78313c6

Browse files
committed
Fixed Link
1 parent 2063a49 commit 78313c6

File tree

2 files changed

+13
-15
lines changed

2 files changed

+13
-15
lines changed

articles/sentinel/sap/deployment-solution-configuration.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Track your SAP solution deployment journey through this series of articles:
4141

4242
## Configure watchlists
4343

44-
Threat Monitoring for SAP solution configuration is accomplished by providing customer-specific information in the provisioned watchlists.
44+
Microsoft Sentinel Solution for SAP configuration is accomplished by providing customer-specific information in the provisioned watchlists.
4545

4646
> [!NOTE]
4747
>
@@ -82,25 +82,23 @@ All of these watchlists identify sensitive actions or data that can be carried o
8282
- SAP - Sensitive Roles
8383
- SAP - Privileged Users
8484

85-
Threat Monitoring for SAP solution uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
85+
The Microsoft Sentinel Solution for SAP uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
8686

8787
## Start enabling analytics rules
88-
By default, all analytics rules provided in the Threat Monitoring for SAP solution are disabled. When you install the solution, it's best if you don't enable all the rules at once so you don't end up with a noisey workspace. Instead, use a staged approach, enabling rules over time, ensuring you aren't receiving noise or false positives. Ensure alerts are operationalized, that is, have a response plan for each of the alerts. We consider the following rules to be easiest to implement, so best to start with those:
88+
By default, all analytics rules provided in the Microsoft Sentinel Solution for SAP are provided as [alert rule templates](../manage-analytics-rule-templates.md#manage-template-versions-for-your-scheduled-analytics-rules-in-microsoft-sentinel). We recommend a staged approach, where a few rules are created from templates at a time, allowing time for fine tuning each scenario.
89+
We consider the following rules to be easiest to implement, so best to start with those:
8990

90-
1. Deactivation of Security Audit Log
91-
1. Client Configuration Change
9291
1. Change in Sensitive Privileged User
93-
1. Client configuration change
94-
1. Sensitive privileged user logon
95-
1. Sensitive privileged user makes a change in other
96-
1. Sensitive privilege user password change and login
97-
1. System configuration change
98-
1. Brute force (RFC)
99-
1. Function module tested
100-
1. The SAP audit log monitoring analytics rules
92+
2. Client configuration change
93+
3. Sensitive privileged user logon
94+
4. Sensitive privileged user makes a change in other
95+
5. Sensitive privilege user password change and login
96+
6. Brute force (RFC)
97+
7. Function module tested
98+
8. The SAP audit log monitoring analytics rules
10199

102100
#### Configuring the SAP audit log monitoring analytics rules
103-
The two SAP Audit log monitor rules are delivered as ready to run out of the box, and allow for further fine tuning using watchlists:
101+
The two [SAP Audit log monitor rules](sap-solution-security-content.md#built-in-sap-analytics-rules-for-monitoring-the-sap-audit-log) are delivered as ready to run out of the box, and allow for further fine tuning using watchlists:
104102
- **SAP_Dynamic_Audit_Log_Monitor_Configuration**
105103
The **SAP_Dynamic_Audit_Log_Monitor_Configuration** is a watchlist detailing all available SAP standard audit log message IDs and can be extended to contain additional message IDs you might create on your own using ABAP enhancements on your SAP NetWeaver systems.This watchlist allows for customizing an SAP message ID (=event type), at different levels:
106104
- Severities per production/ non-production systems -for example, debugging activity gets “High” for production systems, and “Disabled” for other systems

articles/sentinel/sap/sap-solution-log-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Users are *strongly encouraged* to use the functions as the subjects of their an
3131
- [SAPUsersEmail](#sapusersemail)
3232
- [SAPAuditLogConfiguration](#sapauditlogconfiguration)
3333
- [SAPAuditLogAnomalies](#sapauditloganomalies)
34-
- [SAPAuditLogConfigRecommend](#sapauditLogconfigrecommend)
34+
- [SAPAuditLogConfigRecommend](#sapauditlogconfigrecommend)
3535
- [SAPSystems](#sapsystems)
3636
- [SAPUsersGetVIP](#sapusersgetvip)
3737
- [SAPUsersHeader](#sapusersheader)

0 commit comments

Comments
 (0)