Skip to content

Commit 79c5d04

Browse files
committed
Acrolinx
1 parent 14a5237 commit 79c5d04

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

articles/sentinel/sap/sap-audit-log-workbook.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You can use the workbook either for ongoing monitoring of your SAP systems, or t
4646

4747
The workbook is separated into two tabs:
4848

49-
- [**Logon analysis report**](#logon-analysis-report-tab). Shows different types of logon data regarding logon failures, including filtering by anomalous data, Azure Active Directory data, and more. The data is based on the ["SAP systems" watchlist](sap-solution-security-content.md#available-watchlists).
49+
- [**Logon analysis report**](#logon-analysis-report-tab). Shows different types of data regarding sign-in failures. Data includes anomalous data, Azure Active Directory data, and more. The data is based on the ["SAP systems" watchlist](sap-solution-security-content.md#available-watchlists).
5050
- [**Audit log alerts report**](#audit-log-alerts-report-tab). Shows different types of data regarding the SAP Audit log events that the Microsoft Sentinel Solution for SAP watches. The data is based on the ["SAP_Dynamic_Audit_Log_Monitor_Configuration" watchlist](sap-solution-security-content.md#available-watchlists).
5151

5252
## Logon analysis report tab
@@ -55,15 +55,15 @@ Includes the [Logon Analysis](#logon-analysis) and [Logon failures](#logon-failu
5555

5656
### Logon Analysis
5757

58-
Shows different types of data regarding user logons.
58+
Shows different types of data regarding user sign-ins.
5959

6060
:::image type="content" source="media/sap-audit-log-workbook/logon-analysis.png" alt-text="Screenshot of the Logon Analysis area of the SAP Audit workbook." lightbox="media/sap-audit-log-workbook/logon-analysis.png":::
6161

6262
|Area |Description |Options |
6363
|---------|---------|
64-
|**Unique user logons per system** |Shows a number of unique logons for each SAP system, and a graph with the logon trends over the selected time for each system. For example: the 012 system has 1.4K unique logon attempts in the last 14 days, and in these 14 days the graph shows a relatively rising logon trend. |
65-
|**Logon types trend** |Shows a trend of the amount of logons according to type, for example, login via dialog. |You can hover over the graph to show the logon amount for different dates. |
66-
|**Logon failures Vs. success by unique users - trend** |Shows a trend of successful and failed logons in the selected period. |You can hover over the graph to show the amount of successful and failed logons for different dates. |
64+
|**Unique user logons per system** |Shows the amount of unique sign ins for each SAP system, and a graph with the sign in trends over the selected time for each system. For example: the 012 system has 1.4-K unique logon attempts in the last 14 days, and in these 14 days the graph shows a relatively rising sign-in trend. |
65+
|**Logon types trend** |Shows a trend of the amount of sign ins according to type, for example, login via dialog. |You can hover over the graph to show the logon amount for different dates. |
66+
|**Logon failures Vs. success by unique users - trend** |Shows a trend of successful and failed sign ins in the selected period. |You can hover over the graph to show the amount of successful and failed sign ins for different dates. |
6767

6868
### Logon failures - anomaly detection
6969

@@ -73,13 +73,13 @@ The areas under **Anomaly detection - filtering out noisy failed login attempts*
7373

7474
|Area |Description |Specific data |Options/notes |
7575
|---------|---------|---------|---------|
76-
| **Logon failure rate** > **Logon failure anomalies** > **Unique User failed logons per SAP system** | Shows the amount of unique failed logons for each SAP system. | | |
77-
|**SAP and Active Directory are better together** | The **Anomalous login failures** table shows a combination of Microsoft Sentinel and Azure Active Directory data. The list is organized by risk, where the most users that indicate the most risk are on top, and the users with less security risk are at the bottom. |For each user, shows:<br>• A timeline of failed logon attempts<br>• A timeline showing at which point an anomalous failed attempt occurred<br>• The type of anomaly<br>• The user's email address<br>• The Azure Active directory risk indicator<br>• The amount of incidents and alerts in Microsoft Sentinel |• When you select a row, you can see a list of alerts and incidents for that user under **Incidents/alerts overview for user**. Below this list, you can also see of Azure Active Directory risk events under **Azure audit and signin risks for user**.<br>• If you your Azure Active Directory data is in a different Log Analytics workspace, make sure you select the relevant subscriptions and workspaces at the top of the workbook, under **Azure audit and activities**. |
78-
|**Logon failure rate per system** |Visually represents the selected SAP systems. |• For each system, shows the amount of failures in the selected period<br>• Systems are grouped by type.<br>• The color of the system indicates the amount of failed attempts: Green indicates a small amount of suspicious logon attempts, where red indicates a large amount of suspicious logon attempts. |You can select a system to see a list of failed logons with details about the failures. |
76+
| **Logon failure rate** > **Logon failure anomalies** > **Unique User failed logons per SAP system** | Shows the number of unique failed sign ins for each SAP system. | | |
77+
|**SAP and Active Directory are better together** | The **Anomalous login failures** table shows a combination of Microsoft Sentinel and Azure Active Directory data. The list is organized by risk, where users that indicate the most risk are at the top of the list, and the users with less security risk are at the bottom. |For each user, shows:<br>• A timeline of failed sign-in attempts<br>• A timeline showing at which point an anomalous failed attempt occurred<br>• The type of anomaly<br>• The user's email address<br>• The Azure Active directory risk indicator<br>• The number of incidents and alerts in Microsoft Sentinel |• When you select a row, you can see a list of alerts and incidents for that user under **Incidents/alerts overview for user**. Below this list, you can also see of Azure Active Directory risk events under **Azure audit and signin risks for user**.<br>• If your Azure Active Directory data is in a different Log Analytics workspace, make sure you select the relevant subscriptions and workspaces at the top of the workbook, under **Azure audit and activities**. |
78+
|**Logon failure rate per system** |Visually represents the selected SAP systems. |• For each system, shows the number of failures in the selected period<br>• Systems are grouped by type.<br>• The color of the system indicates the number of failed attempts: Green indicates a few suspicious logon attempts, where red indicates more suspicious logon attempts. |You can select a system to see a list of failed sign ins with details about the failures. |
7979

8080
In this screenshot, you can see the data shown when the first line is selected in the **Anomalous login failures** table.
8181
- The specific alerts and incident URLs are shown in the **Incidents/alerts overview for user** table.
82-
- The **Azure audit and signin risks for user** table doesn't show data, because Azure Active Directory did not find specific audit and sign in risks related to this user.
82+
- The **Azure audit and signin risks for user** table doesn't show data, because Azure Active Directory didn't find specific audit and sign in risks related to this user.
8383

8484
:::image type="content" source="media/sap-audit-log-workbook/anomalous-logon-failures-table.png" alt-text="Screenshot of data shown when a line is selected in the Anomalous login failures table." lightbox="media/sap-audit-log-workbook/anomalous-logon-failures-table.png":::
8585

@@ -89,15 +89,15 @@ In this screenshot, you can see the **Login failure rate per system** area, wher
8989

9090
### Logon failures - trends
9191

92-
The **Logon failures trends** area shows the trends and amount of failed logons, grouped by different types of data.
92+
The **Logon failures trends** area shows the trends and number of failed sign-ins, grouped by different types of data.
9393

9494
:::image type="content" source="media/sap-audit-log-workbook/logon-failure-trends.png" alt-text="Screenshot of the Logon failures trends area of the SAP Audit workbook." lightbox="media/sap-audit-log-workbook/logon-failure-trends.png":::
9595

9696
|Area |Description |
9797
|---------|---------|
98-
|**Login failure by cause** | Shows a trend of the amount of logon failures according to cause, for example: incorrect logon data. |
99-
|**Login failure by type** | Shows a trend of the amount of logon failures according to type, for example: the logon triggered a background job, or the logon was via HTTP. |
100-
|**Login failure by method** | Shows a trend of the amount of logon failures according to method, for example: SNC or a logon ticket. |
98+
|**Login failure by cause** | Shows a trend of the number of sign-in failures according to cause, for example: incorrect sign-in data. |
99+
|**Login failure by type** | Shows a trend of the number of sign-in failures according to type, for example: the sign-in triggered a background job, or the sign in was via HTTP. |
100+
|**Login failure by method** | Shows a trend of the number of sign-in failures according to method, for example: SNC or a sign-in ticket. |
101101

102102
## Audit log alerts report tab
103103

@@ -108,24 +108,24 @@ This tab shows severity and audit trends for each SAP system and user. All areas
108108
|Area |Description |Specific data |Options/notes |
109109
|---------|---------|---------|---------|
110110
|**Alert severity trends per System ID** |Shows a list of systems, with a graph of medium and high severity event trends per system. For example, the 012 system had many high severity events over the entire period, and a few medium severity events with a spike that shows more medium severity events in the middle of the period. | | |
111-
|**Audit trend per user** |Shows a combination of Microsoft Sentinel and Azure Active Directory data. The list is organized by risk, where the users that indicate the most risk are on top, and the users with less security risk are at the bottom. |For each user, shows:<br>• A timeline of high and medium severity events<br>• The user's email address<br>• The Azure Active directory risk indicator<br>• The amount of incidents and alerts in Microsoft Sentinel |When you select a row, you can see a list of alerts and incidents for that user under **Incidents/alerts overview for user**. Below this list, you can also see of Azure Active Directory risk events under **Azure audit and signin risks for user**. |
111+
|**Audit trend per user** |Shows a combination of Microsoft Sentinel and Azure Active Directory data. The list is organized by risk, where users that indicate the most risk are at the top of the list, and the users with less security risk are at the bottom. |For each user, shows:<br>• A timeline of high and medium severity events<br>• The user's email address<br>• The Azure Active directory risk indicator<br>• The number of incidents and alerts in Microsoft Sentinel |When you select a row, you can see a list of alerts and incidents for that user under **Incidents/alerts overview for user**. Below this list, you can also see of Azure Active Directory risk events under **Azure audit and signin risks for user**. |
112112
|**Risk score per system** | Visually represents each system in a cell shape. |• Shows the risk score for each system.<br>• Systems are grouped by type.<br>• The color of the system indicates the risk: Green indicates a system with a lower risk score, where red indicates a higher risk score. |You can select a system to see a list of SAP events per system. |
113-
|**Events by MITRE ATT&CK® tactics** |Shows a list of SAP events grouped by MITRE ATT&CK® tactics, like Initial Access or Defense Evasion. | |You can hover over the graph to show the logon amount for different dates. |
114-
|**Events by category** |Shows a list of SAP event trends grouped by category, like RFC Start or Logon. | |You can hover over the graph to show the logon amount for different dates. |
115-
|**Events by authorization group** |Shows a list of SAP event trends grouped by the SAP authorization group, like USER or SUPER. | |You can hover over the graph to show the logon amount for different dates. |
116-
|**Events by user type** |Shows a list of SAP event trends grouped by the SAP user type, like Dialog or system. | |You can hover over the graph to show the logon amount for different dates. |
113+
|**Events by MITRE ATT&CK® tactics** |Shows a list of SAP events grouped by MITRE ATT&CK® tactics, like Initial Access or Defense Evasion. | |You can hover over the graph to show the number of sign-ins for different dates. |
114+
|**Events by category** |Shows a list of SAP event trends grouped by category, like RFC Start or Logon. | |You can hover over the graph to show the sign in number for different dates. |
115+
|**Events by authorization group** |Shows a list of SAP event trends grouped by the SAP authorization group, like USER or SUPER. | |You can hover over the graph to show the number of sign-ins for different dates. |
116+
|**Events by user type** |Shows a list of SAP event trends grouped by the SAP user type, like Dialog or system. | |You can hover over the graph to show the number of sign-ins for different dates. |
117117

118118
In this screenshot, you can see the data shown when the first line is selected in the **Audit trends per user** table.
119119
- The specific alerts and incident URLs are shown in the **Incidents/alerts overview for user** table.
120-
- The **Azure audit and signin risks for user** table doesn't show data, because Microsoft Sentinel did not find anomalies related to Azure Active Directory audit and sign in events related to this user.
120+
- The **Azure audit and signin risks for user** table doesn't show data, because Microsoft Sentinel didn't find anomalies related to Azure Active Directory audit and sign in events related to this user.
121121

122122
:::image type="content" source="media/sap-audit-log-workbook/audit-trend-per-user.png" alt-text="Screenshot of data shown when a line is selected in the Audit trends per user table." lightbox="media/sap-audit-log-workbook/audit-trend-per-user.png":::
123123

124124
In this screenshot, you can see the **Risk score per system** area, where the **cb7** system under the **UAT** group is selected. The **SAP events for system** area below the system visualization shows the SAP event for this system.
125125

126126
:::image type="content" source="media/sap-audit-log-workbook/risk-score-per-system.png" alt-text="Screenshot of the Risk score per system area of the SAP Audit workbook." lightbox="media/sap-audit-log-workbook/risk-score-per-system.png":::
127127

128-
In this screenshot, you can see the areas that show events and event trends grouped by different types of data: MITRE ATT&CK® tactics, SAP authorization group, and user type.
128+
In this screenshot, you can see areas with events and event trends grouped by different types of data: MITRE ATT&CK® tactics, SAP authorization group, and user type.
129129

130130
:::image type="content" source="media/sap-audit-log-workbook/event-data-categories.png" alt-text="Screenshot of the different event data in the SAP Audit workbook." lightbox="media/sap-audit-log-workbook/event-data-categories.png":::
131131

0 commit comments

Comments
 (0)