Skip to content

Commit 9a448de

Browse files
committed
CEF Syslog AMA updates
1 parent f27a16a commit 9a448de

File tree

4 files changed

+11
-540
lines changed

4 files changed

+11
-540
lines changed

articles/sentinel/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -820,8 +820,6 @@
820820
href: cef-syslog-ama-overview.md
821821
- name: CEF and Syslog via AMA
822822
href: connect-cef-syslog-ama.md
823-
- name: Configure devices to forward logs
824-
href: unified-connectors-configure-devices.md
825823
- name: CEF over Syslog sources (legacy)
826824
href: connect-common-event-format.md
827825
- name: Deploy a log forwarder (legacy)

articles/sentinel/cef-syslog-ama-overview.md

Lines changed: 6 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
2-
title: Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel
3-
description: Learn how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent.
2+
title: Syslog and CEF AMA connectors - Microsoft Sentinel
3+
description: Learn how Microsoft Sentinel collects Syslog and Common Event Format (CEF) messages with the Azure Monitor Agent.
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: concept
77
ms.custom: linux-related-content
8-
ms.date: 04/22/2024
8+
ms.date: 05/13/2024
99
#Customer intent: As a security operator, I want to understand how Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent so that I can determine if this solution fits my organization's needs.
1010
---
1111

12-
# Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel
12+
# Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel
1313

1414
The Syslog via AMA and Common Event Format (CEF) via AMA data connectors for Microsoft Sentinel filter and ingest Syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. These connectors install the Azure Monitor Agent (AMA) on any Linux machine from which you want to collect Syslog and/or CEF messages. This machine could be the originator of the messages, or it could be a forwarder that collects messages from other machines, such as network or security devices and appliances. The connector sends the agents instructions based on [Data Collection Rules (DCRs)](../azure-monitor/essentials/data-collection-rule-overview.md) that you define. DCRs specify the systems to monitor and the types of logs or messages to collect. They define filters to apply to the messages before they're ingested, for better performance and more efficient querying and analysis.
1515

@@ -81,12 +81,9 @@ As part of the setup process, create a data collection rule and install the Azur
8181

8282
- Alternatively, send HTTP requests to the Logs Ingestion API. With this setup, you can create, manage, and delete DCRs. This option is more flexible than the portal. For example, with the API, you can filter by specific log levels. In the Azure or Defender portal, you can only select a minimum log level. The downside to using this method is that you have to manually install the Azure Monitor Agent on the log forwarder before creating a DCR.
8383

84-
After you create the DCR, and AMA is installed, run the "installation" script on the log forwarder. This script configures the Syslog daemon to listen for messages from other machines, and to open the necessary local ports. Then configure the security devices, or appliances as needed.
84+
After you create the DCR, and AMA is installed, run the "installation" script on the log forwarder. This script configures the Syslog daemon to listen for messages from other machines, and to open the necessary local ports. Then configure the security devices or appliances as needed.
8585

86-
For more information, see the following articles:
87-
88-
- [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md)
89-
- [Configure specific devices for Microsoft Sentinel syslog or CEF AMA data connectors](unified-connectors-configure-devices.md)
86+
For more information, see [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md).
9087

9188
## Data ingestion duplication avoidance
9289

@@ -105,8 +102,6 @@ To avoid this scenario, use one of these methods:
105102
where ProcessName !contains "CEF"
106103
```
107104
108-
109-
110105
## Next steps
111106
112107
> [!div class="nextstepaction"]

articles/sentinel/connect-cef-syslog-ama.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: yelevin
55
ms.author: yelevin
66
ms.topic: how-to
77
ms.custom: linux-related-content
8-
ms.date: 05/09/2024
8+
ms.date: 05/13/2024
99
#Customer intent: As a security operator, I want to ingest and filter Syslog and CEF messages from Linux machines and from network and security devices and appliances to my Microsoft Sentinel workspace, so that security analysts can monitor activity on these systems and detect security threats.
1010
---
1111

1212
# Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent
1313

14-
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest Syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
14+
This article describes how to use the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors to quickly filter and ingest Syslog messages, including messages in Common Event Format (CEF), from Linux machines and from network and security devices and appliances. To learn more about these data connectors, see [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md).
1515

1616
## Prerequisites
1717

@@ -110,7 +110,7 @@ In the **Resources** tab, select the machines on which you want to install the A
110110

111111
### Select facilities and severities
112112

113-
Be aware that using the same facility for both Syslog and CEF messages might result in data ingestion duplication. For more information, see [Data ingestion duplication](cef-syslog-ama-overview.md#data-ingestion-duplication-avoidance).
113+
Be aware that using the same facility for both Syslog and CEF messages might result in data ingestion duplication. For more information, see [Data ingestion duplication avoidance](cef-syslog-ama-overview.md#data-ingestion-duplication-avoidance).
114114

115115
1. In the **Collect** tab, select the minimum log level for each facility. When you select a log level, Microsoft Sentinel collects logs for the selected level and other levels with higher severity. For example, if you select **LOG_ERR**, Microsoft Sentinel collects logs for the **LOG_ERR**, **LOG_CRIT**, **LOG_ALERT**, and **LOG_EMERG** levels.
116116

@@ -347,10 +347,6 @@ If you're using a log forwarder, configure the Syslog daemon to listen for messa
347347
> To avoid [Full Disk scenarios](../azure-monitor/agents/azure-monitor-agent-troubleshoot-linux-vm-rsyslog.md) where the agent can't function, we recommend that you set the `syslog-ng` or `rsyslog` configuration not to store unneeded logs. A Full Disk scenario disrupts the function of the installed AMA.
348348
> For more information, see [RSyslog](https://www.rsyslog.com/doc/master/configuration/actions.html) or [Syslog-ng](https://www.syslog-ng.com/technical-documents/doc/syslog-ng-open-source-edition/3.26/administration-guide/34#TOPIC-1431029).
349349

350-
## Configure the security device or appliance
351-
352-
Go to [Configure specific devices for Microsoft Sentinel syslog or CEF AMA data connectors](unified-connectors-configure-devices.md) to get specific instructions to configure your security device or appliance. Contact the solution provider for more information or where information is unavailable.
353-
354350
## Test the connector
355351

356352
Verify that logs messages from your linux machine or security devices and appliances are ingested into Microsoft Sentinel.
@@ -403,6 +399,5 @@ Verify that logs messages from your linux machine or security devices and applia
403399

404400
## Related content
405401

406-
- [Syslog via AMA and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md)
407-
- [Data collection rules in Azure Monitor](../azure-monitor/essentials/data-collection-rule-overview.md)
408-
- [Configure specific devices for Microsoft Sentinel syslog or CEF AMA data connectors](unified-connectors-configure-devices.md)
402+
- [Syslog and Common Event Format (CEF) via AMA connectors for Microsoft Sentinel](cef-syslog-ama-overview.md)
403+
- [Data collection rules in Azure Monitor](../azure-monitor/essentials/data-collection-rule-overview.md)

0 commit comments

Comments
 (0)