Skip to content

Commit 8805d09

Browse files
committed
Cnt AAD - add prerq 4 CH
1 parent 031b29a commit 8805d09

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/sentinel/connect-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
275275
## Prerequisites
276276

277277
- You must have write permission on the Microsoft Sentinel workspace.
278-
- Install the Amazon Web Services solution from the Content Hub in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content (Public preview)](sentinel-solutions-deploy.md).
278+
- Install the Amazon Web Services solution from the Content Hub in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
279279

280280
> [!NOTE]
281281
> Microsoft Sentinel collects CloudTrail management events from all regions. It is recommended that you do not stream events from one region to another.

articles/sentinel/connect-azure-active-directory.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,6 @@ ms.custom: ignite-fall-2021
1010

1111
# Connect Azure Active Directory (Azure AD) data to Microsoft Sentinel
1212

13-
> [!IMPORTANT]
14-
> As indicated below, some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15-
16-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
17-
1813
You can use Microsoft Sentinel's built-in connector to collect data from [Azure Active Directory](../active-directory/fundamentals/active-directory-whatis.md) and stream it into Microsoft Sentinel. The connector allows you to stream the following log types:
1914

2015
- [**Sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md), which contain information about interactive user sign-ins where a user provides an authentication factor.
@@ -31,6 +26,10 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Azure
3126

3227
- [**Provisioning logs**](../active-directory/reports-monitoring/concept-provisioning-logs.md) (also in **PREVIEW**), which contain system activity information about users, groups, and roles provisioned by the Azure AD provisioning service.
3328

29+
> [!IMPORTANT]
30+
> Some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
31+
32+
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
3433

3534
## Prerequisites
3635

@@ -41,6 +40,7 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Azure
4140
- Your user must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
4241

4342
- Your user must have read and write permissions to the Azure AD diagnostic settings in order to be able to see the connection status.
43+
- Install the solution for **Azure Active Directory** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
4444

4545
## Connect to Azure Active Directory
4646

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ For more information about incident integration and advanced hunting event colle
2727
- Your user must have read and write permissions on your Microsoft Sentinel workspace.
2828

2929
- To make any changes to the connector settings, your user must be a member of the same Azure Active Directory tenant with which your Microsoft Sentinel workspace is associated.
30-
- Install the solution for **Microsoft 365 Defender** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content (Public preview)](sentinel-solutions-deploy.md).
30+
- Install the solution for **Microsoft 365 Defender** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
3131

3232
### Prerequisites for Active Directory sync via MDI
3333

0 commit comments

Comments
 (0)