Skip to content

Commit 8740703

Browse files
authored
Merge pull request #235401 from cwatson-cat/4-21-23-dc-fix-lnks5
Sentinel auto-gen data connectors - fx lnks abs 5
2 parents 998df9f + 468dfd7 commit 8740703

17 files changed

+17
-17
lines changed

articles/sentinel/data-connectors/ai-vectra-stream.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Install the Linux agent on sperate Linux instance.
9292

9393
2. Configure the logs to be collected
9494

95-
Follow the configuration steps below to get Vectra Stream metadata into Microsoft Sentinel. The Log Analytics agent is leveraged to send custom JSON into Azure Monitor, enabling the storage of the metadata into a custom table. For more information, refer to the [Azure Monitor Documentation](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-json).
95+
Follow the configuration steps below to get Vectra Stream metadata into Microsoft Sentinel. The Log Analytics agent is leveraged to send custom JSON into Azure Monitor, enabling the storage of the metadata into a custom table. For more information, refer to the [Azure Monitor Documentation](/azure/azure-monitor/agents/data-sources-json).
9696
1. Download config file for the log analytics agent: VectraStream.conf (located in the Connector folder within the Vectra solution: https://aka.ms/sentinel-aivectrastream-conf).
9797
2. Login to the server where you have installed Azure Log Analytics agent.
9898
3. Copy VectraStream.conf to the /etc/opt/microsoft/omsagent/**workspace_id**/conf/omsagent.d/ folder.

articles/sentinel/data-connectors/automated-logic-webctrl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Event
3737

3838
1. Install and onboard the Microsoft agent for Windows.
3939

40-
Learn about [agent setup](https://learn.microsoft.com/services-hub/health/mma-setup) and [windows events onboarding](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events).
40+
Learn about [agent setup](/services-hub/health/mma-setup) and [windows events onboarding](/azure/azure-monitor/agents/data-sources-windows-events).
4141

4242
You can skip this step if you have already installed the Microsoft agent for Windows
4343

articles/sentinel/data-connectors/cisco-asa-ftd-via-ama.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ CommonSecurityLog
3939

4040
To integrate with Cisco ASA/FTD via AMA (Preview) make sure you have:
4141

42-
- ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. [Learn more](https://learn.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
42+
- ****: To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. [Learn more](/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)
4343

4444

4545
## Vendor installation instructions

articles/sentinel/data-connectors/cisco-meraki.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Typically, you should install the agent on a different computer from the one on
6565

6666
2. Configure the logs to be collected
6767

68-
Follow the configuration steps below to get Cisco Meraki device logs into Microsoft Sentinel. Refer to the [Azure Monitor Documentation](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
68+
Follow the configuration steps below to get Cisco Meraki device logs into Microsoft Sentinel. Refer to the [Azure Monitor Documentation](/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
6969
For Cisco Meraki logs, we have issues while parsing the data by OMS agent data using default settings.
7070
So we advice to capture the logs into custom table **meraki_CL** using below instructions.
7171
1. Login to the server where you have installed OMS agent.

articles/sentinel/data-connectors/cloudflare-using-azure-function.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Cloudflare_CL
3737
To integrate with Cloudflare (Preview) (using Azure Functions) make sure you have:
3838

3939
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions).
40-
- **Azure Blob Storage connection string and container name**: Azure Blob Storage connection string and container name where the logs are pushed to by Cloudflare Logpush. [See the documentation to learn more about creating Azure Blob Storage container.](https://learn.microsoft.com/azure/storage/blobs/storage-quickstart-blobs-portal)
40+
- **Azure Blob Storage connection string and container name**: Azure Blob Storage connection string and container name where the logs are pushed to by Cloudflare Logpush. [See the documentation to learn more about creating Azure Blob Storage container.](/azure/storage/blobs/storage-quickstart-blobs-portal)
4141

4242

4343
## Vendor installation instructions

articles/sentinel/data-connectors/cohesity-using-azure-function.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To integrate with Cohesity (using Azure Functions) make sure you have:
5252
**STEP 1 - Get a Cohesity DataHawk API key (see troubleshooting [instruction 1](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CohesitySecurity/Data%20Connectors/Helios2Sentinel/IncidentProducer))**
5353

5454

55-
**STEP 2 - Register Azure app ([link](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps)) and save Application (client) ID, Directory (tenant) ID, and Secret Value ([instructions](https://learn.microsoft.com/azure/healthcare-apis/register-application)). Grant it Azure Storage (user_impersonation) permission. Also, assign the 'Microsoft Sentinel Contributor' role to the application in the appropriate subscription.**
55+
**STEP 2 - Register Azure app ([link](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps)) and save Application (client) ID, Directory (tenant) ID, and Secret Value ([instructions](/azure/healthcare-apis/register-application)). Grant it Azure Storage (user_impersonation) permission. Also, assign the 'Microsoft Sentinel Contributor' role to the application in the appropriate subscription.**
5656

5757

5858
**STEP 3 - Deploy the connector and the associated Azure Functions**.

articles/sentinel/data-connectors/corelight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Install the agent on the Server where the Corelight logs are generated.
5050

5151
2. Configure the logs to be collected
5252

53-
Follow the configuration steps below to get Corelight logs into Microsoft Sentinel. This configuration enriches events generated by Corelight module to provide visibility on log source information for Corelight logs. Refer to the [Azure Monitor Documentation](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
53+
Follow the configuration steps below to get Corelight logs into Microsoft Sentinel. This configuration enriches events generated by Corelight module to provide visibility on log source information for Corelight logs. Refer to the [Azure Monitor Documentation](/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
5454
1. Download config file: [corelight.conf](https://aka.ms/sentinel-Corelight-conf/).
5555
2. Login to the server where you have installed Azure Log Analytics agent.
5656
3. Copy corelight.conf to the /etc/opt/microsoft/omsagent/**workspace_id**/conf/omsagent.d/ folder.

articles/sentinel/data-connectors/darktrace-connector-for-microsoft-sentinel-rest-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ darktrace_model_alerts_CL
104104
To integrate with Darktrace Connector for Microsoft Sentinel REST API make sure you have:
105105

106106
- **Darktrace Prerequisites**: To use this Data Connector a Darktrace master running v5.2+ is required.
107-
Data is sent to the [Azure Monitor HTTP Data Collector API](https://learn.microsoft.com/azure/azure-monitor/logs/data-collector-api) over HTTPs from Darktrace masters, therefore outbound connectivity from the Darktrace master to Microsoft Sentinel REST API is required.
107+
Data is sent to the [Azure Monitor HTTP Data Collector API](/azure/azure-monitor/logs/data-collector-api) over HTTPs from Darktrace masters, therefore outbound connectivity from the Darktrace master to Microsoft Sentinel REST API is required.
108108
- **Filter Darktrace Data**: During configuration it is possible to set up additional filtering on the Darktrace System Configuration page to constrain the amount or types of data sent.
109109
- **Try the Darktrace Sentinel Solution**: You can get the most out of this connector by installing the Darktrace Solution for Microsoft Sentinel. This will provide workbooks to visualise alert data and analytics rules to automatically create alerts and incidents from Darktrace Model Breaches and AI Analyst incidents.
110110

articles/sentinel/data-connectors/flare.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ As an organization administrator, authenticate on [Flare](https://app.flare.syst
4747

4848

4949
Click on 'Create a new alert channel' and select 'Microsoft Sentinel'. Enter your Shared Key And WorkspaceID. Save the Alert Channel.
50-
For more help and details, see our [Azure configuration documentation](https://learn.microsoft.com/azure/sentinel/connect-data-sources).
50+
For more help and details, see our [Azure configuration documentation](/azure/sentinel/connect-data-sources).
5151

5252

5353
{0}

articles/sentinel/data-connectors/juniper-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Install the agent on the Server.
5252

5353
2. Configure the logs to be collected
5454

55-
Follow the configuration steps below to get Juniper IDP logs into Microsoft Sentinel. This configuration enriches events generated by Juniper IDP module to provide visibility on log source information for Juniper IDP logs. Refer to the [Azure Monitor Documentation](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
55+
Follow the configuration steps below to get Juniper IDP logs into Microsoft Sentinel. This configuration enriches events generated by Juniper IDP module to provide visibility on log source information for Juniper IDP logs. Refer to the [Azure Monitor Documentation](/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
5656
1. Download config file [juniper_idp.conf](https://aka.ms/sentinel-JuniperIDP-conf).
5757
2. Login to the server where you have installed Azure Log Analytics agent.
5858
3. Copy juniper_idp.conf to the /etc/opt/microsoft/omsagent/**workspace_id**/conf/omsagent.d/ folder.

0 commit comments

Comments
 (0)