Skip to content

Commit 78a52e3

Browse files
committed
Feedback and Acrolinx
1 parent 5df1b7c commit 78a52e3

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/sentinel/sap/select-ingestion-profiles.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,11 @@ ms.date: 01/03/2023
99

1010
# Select SAP ingestion profile
1111

12-
This article explains how to select the profile for you SAP solution. We recommend that you select an ingestion profile that maximizes your security coverage while meeting your budget requirements. As one way to select a profile, you can turn on all logs for a while, and then reevaluate the ingestion profile according the expected cost related to the ingestion. If needed, you can [simulate expected costs](../billing-monitor-costs.md).
12+
This article explains how to select the profile for your SAP solution. We recommend that you select an ingestion profile that maximizes your security coverage while meeting your budget requirements.
13+
14+
Because SAP is a business application, and business processes tend to be seasonal, it may be difficult to predict the overall volume of logs over time. To address this issue, we recommend that you keep all logs on for two weeks, and learn from the observed activity. This learning can later be revised during business activity peaks, or major landscape transformations.
15+
16+
As one way to select a profile, you can turn on all logs for a while, and then reevaluate the ingestion profile according to the expected cost related to the ingestion. If needed, you can [simulate expected costs](../billing-monitor-costs.md).
1317

1418
The following sections show typical customer configuration profiles for SAP log ingestion.
1519

@@ -19,7 +23,7 @@ This profile includes complete coverage for:
1923

2024
- Built-in analytics
2125
- The SAP user authorization master data tables, with users and privilege information
22-
- The ability to track changes and activities on the SAP landscape. This profile provides additional logging to allow for post-breach investigations and extended hunting abilities.
26+
- The ability to track changes and activities on the SAP landscape. This profile provides more logging information to allow for post-breach investigations and extended hunting abilities.
2327

2428
### systemconfig.ini file
2529

@@ -74,7 +78,7 @@ USRACL_FULL = False
7478

7579
## Detection focused profile
7680

77-
This profile includes the core security logs of the SAP landscape required for the majority of the analytic rules to perform well. Post-breach investigations and hunting capabilities are limited.
81+
This profile includes the core security logs of the SAP landscape required for the most of the analytics rules to perform well. Post-breach investigations and hunting capabilities are limited.
7882

7983
### systemconfig.ini
8084

0 commit comments

Comments
 (0)