You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deployment-solution-configuration.md
+12-14Lines changed: 12 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Track your SAP solution deployment journey through this series of articles:
41
41
42
42
## Configure watchlists
43
43
44
-
Threat Monitoring for SAP solution configuration is accomplished by providing customer-specific information in the provisioned watchlists.
44
+
Microsoft Sentinel Solution for SAP configuration is accomplished by providing customer-specific information in the provisioned watchlists.
45
45
46
46
> [!NOTE]
47
47
>
@@ -82,25 +82,23 @@ All of these watchlists identify sensitive actions or data that can be carried o
82
82
- SAP - Sensitive Roles
83
83
- SAP - Privileged Users
84
84
85
-
Threat Monitoring for SAP solution uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
85
+
The Microsoft Sentinel Solution for SAP uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
86
86
87
87
## Start enabling analytics rules
88
-
By default, all analytics rules provided in the Threat Monitoring for SAP solution are disabled. When you install the solution, it's best if you don't enable all the rules at once so you don't end up with a noisey workspace. Instead, use a staged approach, enabling rules over time, ensuring you aren't receiving noise or false positives. Ensure alerts are operationalized, that is, have a response plan for each of the alerts. We consider the following rules to be easiest to implement, so best to start with those:
88
+
By default, all analytics rules provided in the Microsoft Sentinel Solution for SAP are provided as [alert rule templates](../manage-analytics-rule-templates.md#manage-template-versions-for-your-scheduled-analytics-rules-in-microsoft-sentinel). We recommend a staged approach, where a few rules are created from templates at a time, allowing time for fine tuning each scenario.
89
+
We consider the following rules to be easiest to implement, so best to start with those:
89
90
90
-
1. Deactivation of Security Audit Log
91
-
1. Client Configuration Change
92
91
1. Change in Sensitive Privileged User
93
-
1. Client configuration change
94
-
1. Sensitive privileged user logon
95
-
1. Sensitive privileged user makes a change in other
96
-
1. Sensitive privilege user password change and login
97
-
1. System configuration change
98
-
1. Brute force (RFC)
99
-
1. Function module tested
100
-
1. The SAP audit log monitoring analytics rules
92
+
2. Client configuration change
93
+
3. Sensitive privileged user logon
94
+
4. Sensitive privileged user makes a change in other
95
+
5. Sensitive privilege user password change and login
96
+
6. Brute force (RFC)
97
+
7. Function module tested
98
+
8. The SAP audit log monitoring analytics rules
101
99
102
100
#### Configuring the SAP audit log monitoring analytics rules
103
-
The two SAP Audit log monitor rules are delivered as ready to run out of the box, and allow for further fine tuning using watchlists:
101
+
The two [SAP Audit log monitor rules](sap-solution-security-content.md#built-in-sap-analytics-rules-for-monitoring-the-sap-audit-log) are delivered as ready to run out of the box, and allow for further fine tuning using watchlists:
104
102
-**SAP_Dynamic_Audit_Log_Monitor_Configuration**
105
103
The **SAP_Dynamic_Audit_Log_Monitor_Configuration** is a watchlist detailing all available SAP standard audit log message IDs and can be extended to contain additional message IDs you might create on your own using ABAP enhancements on your SAP NetWeaver systems.This watchlist allows for customizing an SAP message ID (=event type), at different levels:
106
104
- Severities per production/ non-production systems -for example, debugging activity gets “High” for production systems, and “Disabled” for other systems
0 commit comments