You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/cef-syslog-ama-overview.md
+6-11Lines changed: 6 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,15 @@
1
1
---
2
-
title: Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel
3
-
description: Learn how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent.
2
+
title: Syslog and CEFAMA connectors - Microsoft Sentinel
3
+
description: Learn how Microsoft Sentinel collects Syslog and Common Event Format (CEF) messages with the Azure Monitor Agent.
4
4
author: yelevin
5
5
ms.author: yelevin
6
6
ms.topic: concept
7
7
ms.custom: linux-related-content
8
-
ms.date: 04/22/2024
8
+
ms.date: 05/13/2024
9
9
#Customer intent: As a security operator, I want to understand how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent so that I can determine if this solution fits my organization's needs.
10
10
---
11
11
12
-
# Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel
12
+
# Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel
13
13
14
14
The Syslog via AMA and Common Event Format (CEF) via AMA data connectors for Microsoft Sentinel filter and ingest Syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. These connectors install the Azure Monitor Agent (AMA) on any Linux machine from which you want to collect Syslog and/or CEF messages. This machine could be the originator of the messages, or it could be a forwarder that collects messages from other machines, such as network or security devices and appliances. The connector sends the agents instructions based on [Data Collection Rules (DCRs)](../azure-monitor/essentials/data-collection-rule-overview.md) that you define. DCRs specify the systems to monitor and the types of logs or messages to collect. They define filters to apply to the messages before they're ingested, for better performance and more efficient querying and analysis.
15
15
@@ -81,12 +81,9 @@ As part of the setup process, create a data collection rule and install the Azur
81
81
82
82
- Alternatively, send HTTP requests to the Logs Ingestion API. With this setup, you can create, manage, and delete DCRs. This option is more flexible than the portal. For example, with the API, you can filter by specific log levels. In the Azure or Defender portal, you can only select a minimum log level. The downside to using this method is that you have to manually install the Azure Monitor Agent on the log forwarder before creating a DCR.
83
83
84
-
After you create the DCR, and AMA is installed, run the "installation" script on the log forwarder. This script configures the Syslog daemon to listen for messages from other machines, and to open the necessary local ports. Then configure the security devices, or appliances as needed.
84
+
After you create the DCR, and AMA is installed, run the "installation" script on the log forwarder. This script configures the Syslog daemon to listen for messages from other machines, and to open the necessary local ports. Then configure the security devices or appliances as needed.
85
85
86
-
For more information, see the following articles:
87
-
88
-
-[Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md)
89
-
-[Configure specific devices for Microsoft Sentinel syslog or CEF AMA data connectors](unified-connectors-configure-devices.md)
86
+
For more information, see [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md).
90
87
91
88
## Data ingestion duplication avoidance
92
89
@@ -105,8 +102,6 @@ To avoid this scenario, use one of these methods:
Copy file name to clipboardExpand all lines: articles/sentinel/connect-cef-syslog-ama.md
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: yelevin
5
5
ms.author: yelevin
6
6
ms.topic: how-to
7
7
ms.custom: linux-related-content
8
-
ms.date: 05/09/2024
8
+
ms.date: 05/13/2024
9
9
#Customer intent: As a security operator, I want to ingest and filter Syslog and CEF messages from Linux machines and from network and security devices and appliances to my Microsoft Sentinel workspace, so that security analysts can monitor activity on these systems and detect security threats.
10
10
---
11
11
12
12
# Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent
13
13
14
-
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest Syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
14
+
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest Syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
15
15
16
16
## Prerequisites
17
17
@@ -110,7 +110,7 @@ In the **Resources** tab, select the machines on which you want to install the A
110
110
111
111
### Select facilities and severities
112
112
113
-
Be aware that using the same facility for both Syslog and CEF messages might result in data ingestion duplication. For more information, see [Data ingestion duplication](cef-syslog-ama-overview.md#data-ingestion-duplication-avoidance).
113
+
Be aware that using the same facility for both Syslog and CEF messages might result in data ingestion duplication. For more information, see [Data ingestion duplication avoidance](cef-syslog-ama-overview.md#data-ingestion-duplication-avoidance).
114
114
115
115
1. In the **Collect** tab, select the minimum log level for each facility. When you select a log level, Microsoft Sentinel collects logs for the selected level and other levels with higher severity. For example, if you select **LOG_ERR**, Microsoft Sentinel collects logs for the **LOG_ERR**, **LOG_CRIT**, **LOG_ALERT**, and **LOG_EMERG** levels.
116
116
@@ -347,10 +347,6 @@ If you're using a log forwarder, configure the Syslog daemon to listen for messa
347
347
> To avoid [Full Disk scenarios](../azure-monitor/agents/azure-monitor-agent-troubleshoot-linux-vm-rsyslog.md) where the agent can't function, we recommend that you set the `syslog-ng` or `rsyslog` configuration not to store unneeded logs. A Full Disk scenario disrupts the function of the installed AMA.
348
348
> For more information, see [RSyslog](https://www.rsyslog.com/doc/master/configuration/actions.html) or [Syslog-ng](https://www.syslog-ng.com/technical-documents/doc/syslog-ng-open-source-edition/3.26/administration-guide/34#TOPIC-1431029).
349
349
350
-
## Configure the security device or appliance
351
-
352
-
Go to [Configure specific devices for Microsoft Sentinel syslog orCEFAMA data connectors](unified-connectors-configure-devices.md) to get specific instructions to configure your security device or appliance. Contact the solution provider for more information or where information is unavailable.
353
-
354
350
## Test the connector
355
351
356
352
Verify that logs messages from your linux machine or security devices and appliances are ingested into Microsoft Sentinel.
@@ -403,6 +399,5 @@ Verify that logs messages from your linux machine or security devices and applia
403
399
404
400
## Related content
405
401
406
-
- [Syslog via AMAand Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md)
407
-
- [Data collection rules in Azure Monitor](../azure-monitor/essentials/data-collection-rule-overview.md)
408
-
- [Configure specific devices for Microsoft Sentinel syslog orCEFAMA data connectors](unified-connectors-configure-devices.md)
402
+
- [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md)
403
+
- [Data collection rules in Azure Monitor](../azure-monitor/essentials/data-collection-rule-overview.md)
0 commit comments