You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+13-15Lines changed: 13 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,14 @@ title: Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service l
3
3
description: Use the AWS connector to delegate Microsoft Sentinel access to AWS resource logs, creating a trust relationship between Amazon Web Services and Microsoft Sentinel.
4
4
author: yelevin
5
5
ms.topic: how-to
6
-
ms.date: 11/18/2021
6
+
ms.date: 12/12/2022
7
7
ms.author: yelevin
8
+
---
8
9
9
10
---
10
11
11
12
# Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data
12
13
13
-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14
-
15
14
Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs.
16
15
17
16
This connector is available in two versions: the legacy connector for CloudTrail management and data logs, and the new version that can ingest logs from the following AWS services by pulling them from an S3 bucket:
@@ -28,7 +27,7 @@ This connector is available in two versions: the legacy connector for CloudTrail
28
27
29
28
This document explains how to configure the new AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side.
30
29
31
-
1. In your AWS environment:
30
+
- In your AWS environment:
32
31
33
32
- Configure your AWS service(s) to send logs to an **S3 bucket**.
34
33
@@ -38,7 +37,7 @@ This document explains how to configure the new AWS S3 connector. The process of
38
37
39
38
- Attach the appropriate **IAM permissions policies** to grant Microsoft Sentinel access to the appropriate resources (S3 bucket, SQS).
40
39
41
-
1. In Microsoft Sentinel:
40
+
- In Microsoft Sentinel:
42
41
43
42
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
44
43
@@ -48,7 +47,7 @@ We have made available, in our GitHub repository, a script that **automates the
48
47
49
48
## Architecture overview
50
49
51
-
This graphic and the following text shows how the parts of this connector solution interact.
50
+
This graphic and the following text show how the parts of this connector solution interact.
52
51
53
52
:::image type="content" source="media/connect-aws/s3-connector-architecture.png" alt-text="Screenshot of A W S S 3 connector architecture.":::
54
53
@@ -105,7 +104,7 @@ To run the script to set up the connector, use the following steps:
105
104
106
105
1. The script will prompt you to enter your Workspace ID. This ID appears on the connector page. Copy it and paste it at the prompt of the script.
107
106
108
-
:::image type="content" source="media/connect-aws/aws-run-script.png" alt-text="Screenshot of command to run setup script and workspace I D." lightbox="media/connect-aws/aws-run-script.png":::
107
+
:::image type="content" source="media/connect-aws/aws-run-script.png" alt-text="Screenshot of command to run setup script and workspace ID." lightbox="media/connect-aws/aws-run-script.png":::
109
108
110
109
1. When the script finishes running, copy the **Role ARN** and the **SQS URL** from the script's output (see example in first screenshot below) and paste them in their respective fields in the connector page under **2. Add connection** (see second screenshot below).
111
110
@@ -159,21 +158,19 @@ The manual setup consists of the following steps:
159
158
160
159
:::image type="content" source="media/connect-aws/aws-enter-account.png" alt-text="Screenshot of A W S role configuration screen.":::
161
160
162
-
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that you copied from the AWS connector page in the Microsoft Sentinel portal and pasted aside. Then select **Next: Permissions**.
161
+
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that you copied from the AWS connector page in the Microsoft Sentinel portal and pasted aside. Then select **Next**.
163
162
164
163
:::image type="content" source="media/connect-aws/aws-enter-external-id.png" alt-text="Screenshot of continuation of A W S role configuration screen.":::
165
164
166
-
1.Skip the next step, **Attach permissions policies**, for now. You'll come back to it later [when instructed](#apply-iam-permissions-policies). Select **Next: Tags**.
165
+
1.Enter a **Role name**.
167
166
168
-
:::image type="content" source="media/connect-aws/aws-skip-permissions.png" alt-text="Screenshot of Next: Tags.":::
167
+
:::image type="content" source="media/connect-aws/aws-create-role.png" alt-text="Screenshot of role naming screen.":::
169
168
170
-
1.Enter a **Tag** (optional). Then select **Next: Review**.
169
+
1.Add **Permissions** and enter a **Tag** (optional). Then select **Create Role**.
171
170
172
171
:::image type="content" source="media/connect-aws/aws-add-tags.png" alt-text="Screenshot of tags screen.":::
173
172
174
-
1. Enter a **Role name** and select **Create role**.
175
-
176
-
:::image type="content" source="media/connect-aws/aws-create-role.png" alt-text="Screenshot of role naming screen.":::
173
+
1.[Apply IAM permissions policies](/azure/sentinel/connect-aws?tabs=s3&branch=main). For information on these and additional policies that should be applied for ingesting the different types of AWS service logs, see the [AWS S3 connector permissions policies page](/azure/sentinel/connect-aws?tabs=s3) in our GitHub repo.
177
174
178
175
1. In the **Roles** list, select the new role you created.
179
176
@@ -275,7 +272,7 @@ You must have write permission on the Microsoft Sentinel workspace.
275
272
276
273
:::image type="content" source="media/connect-aws/aws-enter-account.png" alt-text="Screenshot of A W S role configuration screen.":::
277
274
278
-
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that can be found in the AWS connector page in Microsoft Sentinel. This identifies *your specific Microsoft Sentinel account* to AWS. Then select **Next: Permissions**.
275
+
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that can be found in the AWS connector page in Microsoft Sentinel. This identifies *your specific Microsoft Sentinel account* to AWS. Then select **Next**.
279
276
280
277
:::image type="content" source="media/connect-aws/aws-enter-external-id.png" alt-text="Screenshot of continuation of A W S role configuration screen.":::
281
278
@@ -316,3 +313,4 @@ In this document, you learned how to connect to AWS resources to ingest their lo
316
313
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
317
314
- Get started [detecting threats with Microsoft Sentinel](detect-threats-built-in.md).
318
315
-[Use workbooks](monitor-your-data.md) to monitor your data.
0 commit comments