You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The script updates the OS components, installs the Azure CLI and Docker software and other required utilities (jq, netcat, curl), and prompts you for configuration parameter values. You can supply additional parameters to the script to minimize the amount of prompts or to customize the container deployment. For more information on available command line options, see [Kickstart script reference](reference-kickstart.md).
131
138
132
-
1. **Follow the on-screen instructions** to enter your SAP and key vault details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
139
+
2. **Follow the on-screen instructions** to enter your SAP and key vault details and complete the deployment. When the deployment is complete, a confirmation message is displayed:
133
140
134
141
```bash
135
142
The process has been successfully completed, thank you!
136
143
```
137
144
138
145
Note the Docker container name in the script output. You'll use it in the next step.
139
146
140
-
1. Run the following command to **configure the Docker container to start automatically**.
147
+
3. Run the following command to **configure the Docker container to start automatically**.
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deployment-solution-configuration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,6 @@ Now Microsoft Sentinel will be able to differentiate a logon from 192.168.10.15
72
72
- SAP - Sensitive Tables
73
73
- SAP - Sensitive ABAP Programs
74
74
- SAP - Sensitive Transactions
75
-
- SAP - Critical Authorizations
76
75
77
76
All of these watchlists identify sensitive actions or data that can be carried out or accessed by users. Several well-known operations, tables and authorizations have been pre-configured in the watchlists, however we recommend you consult with the SAP BASIS team to identify which operations, transactions, authorizations and tables are considered to be sensitive in your SAP environment.
78
77
@@ -81,6 +80,7 @@ All of these watchlists identify sensitive actions or data that can be carried o
81
80
- SAP - Sensitive Profiles
82
81
- SAP - Sensitive Roles
83
82
- SAP - Privileged Users
83
+
- SAP - Critical Authorizations
84
84
85
85
The Microsoft Sentinel Solution for SAP uses User Master data gathered from SAP systems to identify which users, profiles, and roles should be considered sensitive. Some sample data is included in the watchlists, though we recommend you consult with the SAP BASIS team to identify sensitive users, roles and profiles and populate the watchlists accordingly.
0 commit comments