Skip to content

Commit aa0d2bb

Browse files
authored
Merge pull request #221124 from yelevin/docs-editor/connect-aws-1670837429
Redo of YB's edit
2 parents ce50549 + 80c6f1e commit aa0d2bb

File tree

7 files changed

+13
-15
lines changed

7 files changed

+13
-15
lines changed

articles/sentinel/connect-aws.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,14 @@ title: Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service l
33
description: Use the AWS connector to delegate Microsoft Sentinel access to AWS resource logs, creating a trust relationship between Amazon Web Services and Microsoft Sentinel.
44
author: yelevin
55
ms.topic: how-to
6-
ms.date: 11/18/2021
6+
ms.date: 12/12/2022
77
ms.author: yelevin
8+
---
89

910
---
1011

1112
# Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data
1213

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1514
Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs.
1615

1716
This connector is available in two versions: the legacy connector for CloudTrail management and data logs, and the new version that can ingest logs from the following AWS services by pulling them from an S3 bucket:
@@ -28,7 +27,7 @@ This connector is available in two versions: the legacy connector for CloudTrail
2827

2928
This document explains how to configure the new AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side.
3029

31-
1. In your AWS environment:
30+
- In your AWS environment:
3231

3332
- Configure your AWS service(s) to send logs to an **S3 bucket**.
3433

@@ -38,7 +37,7 @@ This document explains how to configure the new AWS S3 connector. The process of
3837

3938
- Attach the appropriate **IAM permissions policies** to grant Microsoft Sentinel access to the appropriate resources (S3 bucket, SQS).
4039

41-
1. In Microsoft Sentinel:
40+
- In Microsoft Sentinel:
4241

4342
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
4443

@@ -48,7 +47,7 @@ We have made available, in our GitHub repository, a script that **automates the
4847

4948
## Architecture overview
5049

51-
This graphic and the following text shows how the parts of this connector solution interact.
50+
This graphic and the following text show how the parts of this connector solution interact.
5251

5352
:::image type="content" source="media/connect-aws/s3-connector-architecture.png" alt-text="Screenshot of A W S S 3 connector architecture.":::
5453

@@ -105,7 +104,7 @@ To run the script to set up the connector, use the following steps:
105104

106105
1. The script will prompt you to enter your Workspace ID. This ID appears on the connector page. Copy it and paste it at the prompt of the script.
107106

108-
:::image type="content" source="media/connect-aws/aws-run-script.png" alt-text="Screenshot of command to run setup script and workspace I D." lightbox="media/connect-aws/aws-run-script.png":::
107+
:::image type="content" source="media/connect-aws/aws-run-script.png" alt-text="Screenshot of command to run setup script and workspace ID." lightbox="media/connect-aws/aws-run-script.png":::
109108

110109
1. When the script finishes running, copy the **Role ARN** and the **SQS URL** from the script's output (see example in first screenshot below) and paste them in their respective fields in the connector page under **2. Add connection** (see second screenshot below).
111110

@@ -159,21 +158,19 @@ The manual setup consists of the following steps:
159158

160159
:::image type="content" source="media/connect-aws/aws-enter-account.png" alt-text="Screenshot of A W S role configuration screen.":::
161160

162-
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that you copied from the AWS connector page in the Microsoft Sentinel portal and pasted aside. Then select **Next: Permissions**.
161+
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that you copied from the AWS connector page in the Microsoft Sentinel portal and pasted aside. Then select **Next**.
163162

164163
:::image type="content" source="media/connect-aws/aws-enter-external-id.png" alt-text="Screenshot of continuation of A W S role configuration screen.":::
165164

166-
1. Skip the next step, **Attach permissions policies**, for now. You'll come back to it later [when instructed](#apply-iam-permissions-policies). Select **Next: Tags**.
165+
1. Enter a **Role name**.
167166

168-
:::image type="content" source="media/connect-aws/aws-skip-permissions.png" alt-text="Screenshot of Next: Tags.":::
167+
:::image type="content" source="media/connect-aws/aws-create-role.png" alt-text="Screenshot of role naming screen.":::
169168

170-
1. Enter a **Tag** (optional). Then select **Next: Review**.
169+
1. Add **Permissions** and enter a **Tag** (optional). Then select **Create Role**.
171170

172171
:::image type="content" source="media/connect-aws/aws-add-tags.png" alt-text="Screenshot of tags screen.":::
173172

174-
1. Enter a **Role name** and select **Create role**.
175-
176-
:::image type="content" source="media/connect-aws/aws-create-role.png" alt-text="Screenshot of role naming screen.":::
173+
1. [Apply IAM permissions policies](/azure/sentinel/connect-aws?tabs=s3&branch=main). For information on these and additional policies that should be applied for ingesting the different types of AWS service logs, see the [AWS S3 connector permissions policies page](/azure/sentinel/connect-aws?tabs=s3) in our GitHub repo.
177174

178175
1. In the **Roles** list, select the new role you created.
179176

@@ -275,7 +272,7 @@ You must have write permission on the Microsoft Sentinel workspace.
275272

276273
:::image type="content" source="media/connect-aws/aws-enter-account.png" alt-text="Screenshot of A W S role configuration screen.":::
277274

278-
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that can be found in the AWS connector page in Microsoft Sentinel. This identifies *your specific Microsoft Sentinel account* to AWS. Then select **Next: Permissions**.
275+
1. Select the **Require External ID** check box, and then enter the **External ID (Workspace ID)** that can be found in the AWS connector page in Microsoft Sentinel. This identifies *your specific Microsoft Sentinel account* to AWS. Then select **Next**.
279276

280277
:::image type="content" source="media/connect-aws/aws-enter-external-id.png" alt-text="Screenshot of continuation of A W S role configuration screen.":::
281278

@@ -316,3 +313,4 @@ In this document, you learned how to connect to AWS resources to ingest their lo
316313
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
317314
- Get started [detecting threats with Microsoft Sentinel](detect-threats-built-in.md).
318315
- [Use workbooks](monitor-your-data.md) to monitor your data.
316+
23.8 KB
Loading
11.4 KB
Loading
79.6 KB
Loading
118 KB
Loading
95.2 KB
Loading
220 KB
Loading

0 commit comments

Comments
 (0)