Skip to content

Commit a81d916

Browse files
committed
Rmv > and minor edits
1 parent fd68a94 commit a81d916

11 files changed

+42
-120
lines changed

.openpublishing.redirection.sentinel.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1160,6 +1160,11 @@
11601160
"redirect_url": "/azure/sentinel/notebooks-hunt",
11611161
"redirect_document_id": false
11621162
},
1163+
{
1164+
"source_path_from_root": "/articles/sentinel/data-connectors/dns.md",
1165+
"redirect_url": "/azure/sentinel/data-connectors/windows-dns-events-via-ama",
1166+
"redirect_document_id": false
1167+
},
11631168
{
11641169
"source_path_from_root": "/articles/sentinel/data-connectors/ai-analyst-darktrace.md",
11651170
"redirect_url": "/azure/sentinel/data-connectors-reference",
@@ -1595,11 +1600,6 @@
15951600
"redirect_url": "/azure/sentinel/data-connectors/crowdstrike-falcon-data-replicator-v2",
15961601
"redirect_document_id": true
15971602
},
1598-
{
1599-
"source_path_from_root": "/articles/sentinel/data-connectors/dns.md",
1600-
"redirect_url": "/azure/sentinel/data-connectors/windows-dns-events-via-ama",
1601-
"redirect_document_id": false
1602-
},
16031603
{
16041604
"source_path_from_root": "/articles/sentinel/data-connectors/fortinet-fortiweb-web-application-firewall.md",
16051605
"redirect_url": "/azure/sentinel/data-connectors/deprecated-fortinet-fortiweb-web-application-firewall-via-legacy-agent",

articles/sentinel/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -320,8 +320,6 @@
320320
href: data-connectors/recommended-cisco-secure-email-gateway-via-ama.md
321321
- name: '[Recommended] Claroty via AMA'
322322
href: data-connectors/recommended-claroty-via-ama.md
323-
- name: '[Recommended] CrowdStrike Falcon Endpoint Protection via AMA'
324-
href: data-connectors/recommended-crowdstrike-falcon-endpoint-protection-via-ama.md
325323
- name: '[Recommended] FireEye Network Security (NX) via AMA'
326324
href: data-connectors/recommended-fireeye-network-security-nx-via-ama.md
327325
- name: '[Recommended] Forcepoint CASB via AMA'

articles/sentinel/data-connectors-reference.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Data connectors are available as part of the following offerings:
3636

3737
## Syslog and Common Event Format (CEF) connectors
3838

39-
Some Microsoft Sentinel solutions are supported by the data connectors Syslog via AMA or Common Event Format (CEF) via AMA in Microsoft Sentinel. To forward data to your Log Analytics workspace for Microsoft Sentinel, complete the steps in [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md). These steps include installing either the **Common Event Format** or **Syslog** solution from the **Content hub** in Microsoft Sentinel. Then, configure the related AMA connector that's installed with the solution. Complete the set up by configuring the appropriate devices or appliances. For more information, refer to the solution provider's installation instructions or contact the solution provider.
39+
Some Microsoft Sentinel solutions are supported by the data connectors Syslog via AMA or Common Event Format (CEF) via AMA in Microsoft Sentinel. To forward data to your Log Analytics workspace for Microsoft Sentinel, complete the steps in [Ingest Syslog and CEF messages to Microsoft Sentinel with the Azure Monitor Agent](connect-cef-syslog-ama.md). These steps include installing either the **Common Event Format** or **Syslog** solution from the **Content hub** in Microsoft Sentinel. Then, configure the related AMA connector that's installed with the solution. Complete the setup by configuring the appropriate devices or appliances. For more information, see the solution provider's installation instructions or contact the solution provider.
4040

4141
[comment]: <> (DataConnector includes start)
4242

@@ -187,7 +187,6 @@ Some Microsoft Sentinel solutions are supported by the data connectors Syslog vi
187187
## Crowdstrike
188188

189189
- [[Deprecated] CrowdStrike Falcon Endpoint Protection via Legacy Agent](data-connectors/deprecated-crowdstrike-falcon-endpoint-protection-via-legacy-agent.md)
190-
- [[Recommended] CrowdStrike Falcon Endpoint Protection via AMA](data-connectors/recommended-crowdstrike-falcon-endpoint-protection-via-ama.md)
191190
- [Crowdstrike Falcon Data Replicator (using Azure Functions)](data-connectors/crowdstrike-falcon-data-replicator.md)
192191
- [Crowdstrike Falcon Data Replicator V2 (using Azure Functions)](data-connectors/crowdstrike-falcon-data-replicator-v2.md)
193192

articles/sentinel/data-connectors/bitsight-data-connector.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ To integrate with Bitsight data connector (using Azure Functions) make sure you
131131
> This connector uses Azure Functions to connect to the BitSight API to pull its logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
132132
133133

134-
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
134+
**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
135135

136136

137137
**STEP 1 - Steps to Create/Get Bitsight API Token**
@@ -187,7 +187,7 @@ To integrate with Bitsight data connector (using Azure Functions) make sure you
187187

188188
**STEP 5 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
189189

190-
>**IMPORTANT:** Before deploying the BitSight data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following) readily available.., as well as the BitSight API Token.
190+
**IMPORTANT:** Before deploying the BitSight data connector, have the Workspace ID and Workspace Primary Key (can be copied from the following) readily available.., as well as the BitSight API Token.
191191

192192

193193

@@ -233,7 +233,7 @@ Use the following step-by-step instructions to deploy the BitSight data connecto
233233

234234
**1. Deploy a Function App**
235235

236-
> **NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
236+
**NOTE:** You will need to [prepare VS code](/azure/azure-functions/functions-create-first-function-python#prerequisites) for Azure function development.
237237

238238
1. Download the [Azure Function App](https://aka.ms/sentinel-BitSight-functionapp) file. Extract archive to your local development computer.
239239
2. Start VS Code. Choose File in the main menu and select Open Folder.

articles/sentinel/data-connectors/claroty-xdome.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,11 @@ CommonSecurityLog
3939

4040
## Vendor installation instructions
4141

42-
1. Linux Syslog agent configuration
42+
1.0 Linux Syslog agent configuration
4343

4444
Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
4545

46-
> Notice that the data from all regions will be stored in the selected workspace
46+
Notice that the data from all regions will be stored in the selected workspace
4747

4848
1.1 Select or create a Linux machine
4949

@@ -53,31 +53,31 @@ Select or create a Linux machine that Microsoft Sentinel will use as the proxy b
5353

5454
Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.
5555

56-
> 1. Make sure that you have Python on your machine using the following command: python --version.
56+
1. Make sure that you have Python on your machine using the following command: python --version.
5757

58-
> 2. You must have elevated permissions (sudo) on your machine.
58+
2. You must have elevated permissions (sudo) on your machine.
5959

6060
Run the following command to install and apply the CEF collector:
6161

6262
`sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}`
6363

6464
2. Forward Common Event Format (CEF) logs to Syslog agent
6565

66-
Configure the Claroty xDome - Microsoft Sentinel integration to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
66+
Configure the Claroty xDome - Microsoft Sentinel integration to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
6767

6868
3. Validate connection
6969

7070
Follow the instructions to validate your connectivity:
7171

7272
Open Log Analytics to check if the logs are received using the CommonSecurityLog schema.
7373

74-
>It may take about 20 minutes until the connection streams data to your workspace.
74+
It may take about 20 minutes until the connection streams data to your workspace.
7575

7676
If the logs are not received, run the following connectivity validation script:
7777

78-
> 1. Make sure that you have Python on your machine using the following command: python --version
78+
1. Make sure that you have Python on your machine using the following command: python --version
7979

80-
>2. You must have elevated permissions (sudo) on your machine
80+
2. You must have elevated permissions (sudo) on your machine
8181

8282
Run the following command to validate your connectivity:
8383

@@ -88,7 +88,7 @@ If the logs are not received, run the following connectivity validation script:
8888
Make sure to configure the machine's security according to your organization's security policy
8989

9090

91-
[Learn more >](https://aka.ms/SecureCEF)
91+
[Learn more](https://aka.ms/SecureCEF)
9292

9393

9494

articles/sentinel/data-connectors/deprecated-crowdstrike-falcon-endpoint-protection-via-legacy-agent.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,11 @@ CrowdStrikeFalconEventStream
5656

5757
**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected which is deployed as part of the solution. To view the function code in Log Analytics, open Log Analytics/Microsoft Sentinel Logs blade, click Functions and search for the alias Crowd Strike Falcon Endpoint Protection and load the function code or click [here](https://aka.ms/sentinel-crowdstrikefalconendpointprotection-parser), on the second line of the query, enter the hostname(s) of your CrowdStrikeFalcon device(s) and any other unique identifiers for the logstream. The function usually takes 10-15 minutes to activate after solution installation/update.
5858

59-
1. Linux Syslog agent configuration
59+
1.0 Linux Syslog agent configuration
6060

6161
Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
6262

63-
> Notice that the data from all regions will be stored in the selected workspace
63+
Notice that the data from all regions will be stored in the selected workspace
6464

6565
1.1 Select or create a Linux machine
6666

@@ -70,9 +70,9 @@ Select or create a Linux machine that Microsoft Sentinel will use as the proxy b
7070

7171
Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.
7272

73-
> 1. Make sure that you have Python on your machine using the following command: python -version.
73+
1. Make sure that you have Python on your machine using the following command: python -version.
7474

75-
> 2. You must have elevated permissions (sudo) on your machine.
75+
2. You must have elevated permissions (sudo) on your machine.
7676

7777
Run the following command to install and apply the CEF collector:
7878

@@ -90,13 +90,13 @@ Follow the instructions to validate your connectivity:
9090

9191
Open Log Analytics to check if the logs are received using the CommonSecurityLog schema.
9292

93-
>It may take about 20 minutes until the connection streams data to your workspace.
93+
It may take about 20 minutes until the connection streams data to your workspace.
9494

9595
If the logs are not received, run the following connectivity validation script:
9696

97-
> 1. Make sure that you have Python on your machine using the following command: python -version.
97+
1. Make sure that you have Python on your machine using the following command: python -version.
9898

99-
> 2. You must have elevated permissions (sudo) on your machine
99+
2. You must have elevated permissions (sudo) on your machine
100100

101101
Run the following command to validate your connectivity:
102102

@@ -107,7 +107,7 @@ If the logs are not received, run the following connectivity validation script:
107107
Make sure to configure the machine's security according to your organization's security policy
108108

109109

110-
[Learn more >](https://aka.ms/SecureCEF)
110+
[Learn more](https://aka.ms/SecureCEF)
111111

112112

113113

articles/sentinel/data-connectors/deprecated-fortinet-fortiweb-web-application-firewall-via-legacy-agent.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,11 +41,11 @@ Fortiweb
4141

4242
## Vendor installation instructions
4343

44-
1. Linux Syslog agent configuration
44+
1.0 Linux Syslog agent configuration
4545

4646
Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
4747

48-
> Notice that the data from all regions will be stored in the selected workspace
48+
Notice that the data from all regions will be stored in the selected workspace
4949

5050
1.1 Select or create a Linux machine
5151

@@ -90,7 +90,7 @@ If the logs are not received, run the following connectivity validation script:
9090
Make sure to configure the machine's security according to your organization's security policy
9191

9292

93-
[Learn more >](https://aka.ms/SecureCEF)
93+
[Learn more](https://aka.ms/SecureCEF)
9494

9595

9696

articles/sentinel/data-connectors/deprecated-fortinet-via-legacy-agent.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,11 @@ CommonSecurityLog
5959

6060
## Vendor installation instructions
6161

62-
1. Linux Syslog agent configuration
62+
1.0 Linux Syslog agent configuration
6363

6464
Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.
6565

66-
> Notice that the data from all regions will be stored in the selected workspace
66+
Notice that the data from all regions will be stored in the selected workspace
6767

6868
1.1 Select or create a Linux machine
6969

@@ -94,16 +94,20 @@ Copy the CLI commands below and:
9494

9595
For more information, go to the [Fortinet Document Library](https://aka.ms/asi-syslog-fortinet-fortinetdocumentlibrary), choose your version, and use the "Handbook" and "Log Message Reference" PDFs.
9696

97-
[Learn more >](https://aka.ms/CEF-Fortinet)
97+
[Learn more](https://aka.ms/CEF-Fortinet)
9898

9999
Set up the connection using the CLI to run the following commands:
100100

101-
config log syslogd setting
101+
102+
```bash
103+
config log syslogd setting
102104
set status enable
103105
set format cef
104106
set port 514
105107
set server <ip_address_of_Receiver>
106108
end
109+
```
110+
107111

108112
3. Validate connection
109113

@@ -128,7 +132,7 @@ If the logs are not received, run the following connectivity validation script:
128132
Make sure to configure the machine's security according to your organization's security policy
129133

130134

131-
[Learn more >](https://aka.ms/SecureCEF)
135+
[Learn more](https://aka.ms/SecureCEF)
132136

133137

134138

articles/sentinel/data-connectors/netskope-data-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ To integrate with Netskope Data Connector (using Azure Functions) make sure you
218218
5. Select **Add**.
219219
6. *Record the secret's value for use in your client application code. This secret value is never displayed again after you leave this page.* The secret value is required as configuration parameter for the execution of TriggersSync playbook.
220220

221-
> **Reference link:** [/azure/active-directory/develop/quickstart-register-app#add-a-client-secret](/azure/active-directory/develop/quickstart-register-app#add-a-client-secret)
221+
**Reference link:** [/azure/active-directory/develop/quickstart-register-app#add-a-client-secret](/azure/active-directory/develop/quickstart-register-app#add-a-client-secret)
222222

223223

224224
**STEP 3 - Assign role of Contributor to application in Microsoft Entra ID**

articles/sentinel/data-connectors/recommended-crowdstrike-falcon-endpoint-protection-via-ama.md

Lines changed: 0 additions & 79 deletions
This file was deleted.

0 commit comments

Comments
 (0)