You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-cef-syslog-ama.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Ingest syslog CEF messages to Microsoft Sentinel - AMA
3
-
description: Ingest syslog messages from linux machines, devices, and appliances to Microsoft Sentinel using data connectors based on the Azure Monitor Agent (AMA).
2
+
title: Ingest syslog and CEF messages to Microsoft Sentinel - AMA
3
+
description: Ingest syslog messages from linux machines and from network and security devices and appliances to Microsoft Sentinel, using data connectors based on the Azure Monitor Agent (AMA).
4
4
author: yelevin
5
5
ms.author: yelevin
6
6
ms.topic: how-to
@@ -22,21 +22,25 @@ This article describes how to use the **Syslog via AMA** and **Common Event Form
22
22
23
23
## Prerequisites
24
24
25
-
Before you begin, you must have the resources configured and the appropriate permissions described in this section.
25
+
Before you begin, you must have the resources configured and the appropriate permissions assigned, as described in this section.
26
26
27
27
### Microsoft Sentinel prerequisites
28
28
29
29
Install the appropriate Microsoft Sentinel solution and make sure you have the permissions to complete the steps in this article.
30
30
31
31
- Install the appropriate solution from the **Content hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
32
+
32
33
- Identify which data connector the Microsoft Sentinel solution requires —**Syslog via AMA** or **Common Event Format (CEF) via AMA** and whether you need to install the **Syslog** or **Common Event Format** solution. To fulfill this prerequisite,
34
+
33
35
- In the **Content hub**, select **Manage** on the installed solution and review the data connector listed.
36
+
34
37
- If either **Syslog via AMA** or **Common Event Format (CEF) via AMA** isn't installed with the solution, identify whether you need to install the **Syslog** or **Common Event Format** solution by finding your appliance or device from one of the following articles:
35
38
36
39
-[CEF via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-cef-device.md)
37
40
-[Syslog via AMA data connector - Configure specific appliance or device for Microsoft Sentinel data ingestion](unified-connector-syslog-device.md)
38
41
39
42
Then install either the **Syslog** or **Common Event Format** solution from the content hub to get the related AMA data connector.
43
+
40
44
- Have an Azure account with the following Azure role-based access control (Azure RBAC) roles:
41
45
42
46
| Built-in role | Scope | Reason |
@@ -77,17 +81,17 @@ If your devices are sending syslog and CEF logs over TLS because, for example, y
77
81
The setup process for the Syslog via AMA or Common Event Format (CEF) via AMA data connectors includes the following steps:
78
82
79
83
1. Install the Azure Monitor Agent and create a Data Collection Rule (DCR) by using either of the following methods:
80
-
-[Azure or Defender portal](?tabs=syslog%2Cportal#create-data-collection-rule)
84
+
-[Azure or Defender portal](?tabs=syslog%2Cportal#create-data-collection-rule-dcr)
1. If you're collecting logs from other machines using a log forwarder, [**run the "installation" script**](#run-the-installation-script) on the log forwarder to configure the syslog daemon to listen for messages from other machines, and to open the necessary local ports.
83
87
84
88
Select the appropriate tab for instructions.
85
89
86
90
# [Azure or Defender portal](#tab/portal)
87
91
88
-
### Create data collection rule
92
+
### Create data collection rule (DCR)
89
93
90
-
To get started, open either the **Syslog via AMA** or **Common Event Format (CEF) via AMA** data connector in Microsoft Sentinel and create a data connector rule.
94
+
To get started, open either the **Syslog via AMA** or **Common Event Format (CEF) via AMA** data connector in Microsoft Sentinel and create a data collection rule (DCR).
91
95
92
96
1. For Microsoft Sentinel in the [Azure portal](https://portal.azure.com), under **Configuration**, select **Data connectors**.<br> For Microsoft Sentinel in the [Defender portal](https://security.microsoft.com/), select **Microsoft Sentinel** > **Configuration** > **Data connectors**.
0 commit comments