You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-syslog.md
+53-19Lines changed: 53 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Connect Syslog data to Azure Sentinel| Microsoft Docs
2
+
title: Connect Syslog data to Azure Sentinel| Microsoft Docs
3
3
description: Learn how to connect Syslog data to Azure Sentinel.
4
4
services: sentinel
5
5
documentationcenter: na
@@ -19,8 +19,6 @@ ms.author: rkarlin
19
19
---
20
20
# Connect your external solution using Syslog
21
21
22
-
23
-
24
22
You can connect any on-premises appliance that supports Syslog to Azure Sentinel. This is done by using an agent based on a Linux machine between the appliance and Azure Sentinel. If your Linux machine is in Azure, you can stream the logs from your appliance or application to a dedicated workspace you create in Azure and connect it. If your Linux machine is not in Azure, you can stream the logs from your appliance to a dedicated on premises VM or machine onto which you install the Agent for Linux.
25
23
26
24
> [!NOTE]
@@ -37,28 +35,64 @@ For more information, see [Syslog data sources in Azure Monitor](../azure-monito
37
35
38
36
## Connect your Syslog appliance
39
37
40
-
1. In the Azure Sentinel portal, select **Data connectors** and select the **Syslog** line in the table and in the Syslog pane to the right, click **Open connector page**.
41
-
2. If your Linux machine is within Azure, select **Download and install agent on Azure Linux virtual machine**. In the Virtual machines window, select the machines on which you want to install the agent and click **Connect** at the top.
42
-
1. If your Linux machine not within Azure, select **Download and install agent on Linux non-Azure machine**. In the **Direct agent** window, copy the command under **Download and onboard agent for Linux** and run it on your machine.
38
+
1. In Azure Sentinel, select **Data connectors** and then select the **Syslog** connector.
39
+
40
+
2. On the **Syslog** blade, select **Open connector page**.
41
+
42
+
3. Install the Linux agent:
43
+
44
+
- If your Linux virtual machine is in Azure, select **Download and install agent on Azure Linux virtual machine**. In the **Virtual machines** blade, select the virtual machines to install the agent on, and then click **Connect**.
45
+
- If your Linux machine isn't in Azure, select **Download and install agent on Linux non-Azure machine**. In the **Direct agent** blade, copy the command for **DOWNLOAD AND ONBOARD AGENT FOR LINUX** and run it on your computer.
46
+
43
47
> [!NOTE]
44
-
> Make sure to configure the machine's security according to your organization's security policy. For example, you can configure your network to align with your corporate network security policy and change the ports and protocols in the daemon to align with your requirements.
48
+
> Make sure you configure security settings for these computers according to your organization's security policy. For example, you can configure the network settings to align with your organization's network security policy, and change the ports and protocols in the daemon to align with the security requirements.
49
+
50
+
4. Select **Open your workspace advanced settings configuration**.
51
+
52
+
5. On the **Advanced settings** blade, select **Data** > **Syslog**. Then add the facilities for the connector to collect.
53
+
54
+
Add the facilities that your syslog appliance includes in its log headers. You can see this configuration in your Syslog appliance in **Syslog-d** in the `/etc/rsyslog.d/security-config-omsagent.conf` folder, and in **r-Syslog** from `/etc/syslog-ng/security-config-omsagent.conf`.
55
+
56
+
If you want to use anomalous SSH login detection with the data that you collect, add **auth** and **authpriv**. See the [following section](#configure-the-syslog-connector-for-anomalous-ssh-login-detection) for additional details.
57
+
58
+
6. When you have added all the facilities that you want to monitor, and adjusted any severity options for each one, select the checkbox **Apply below configuration to my machines**.
59
+
60
+
7. Select **Save**.
61
+
62
+
8. On your syslog appliance, make sure you're sending the facilities that you specified.
63
+
64
+
9. To use the relevant schema in Azure Monitor for the syslog logs, search for **Syslog**.
65
+
66
+
10. You can use the Kusto function described in [Using functions in Azure Monitor log queries](../azure-monitor/log-query/functions.md) to parse your Syslog messages. You can then save them as a new Log Analytics function to use as a new data type.
67
+
68
+
### Configure the Syslog connector for anomalous SSH login detection
45
69
46
-
1. Under **Configure the logs to be connected** in the Syslog connector setup window, follow the instructions:
47
-
1. Click the link to **Open your workspace advanced settings configuration**.
48
-
1. Select **Data**, followed by **Syslog**.
49
-
1. Then, in the table set which facilities you want Syslog to collect. You should either add or select the facilities that your Syslog appliance includes in its log headers. You can see this configuration in your Syslog appliance in Syslog-d in the folder: /etc/rsyslog.d/security-config-omsagent.conf, and in r-Syslog under /etc/syslog-ng/security-config-omsagent.conf.
50
-
> [!NOTE]
51
-
> If you select the checkbox to **Apply below configuration to my machines**, then this configuration will apply to all the Linux machines connected to this workspace. You can see this configuration in your Syslog machine under
52
-
1. Click **Press here to open the configuration blade**.
53
-
1. Select **Data** and then **Syslog**.
54
-
- Make sure each facility that you're sending by Syslog is in the table. For each facility, you are going to monitor, set a severity. Click **Apply**.
55
-
1. In your Syslog machine, make sure you're sending those facilities.
70
+
> [!IMPORTANT]
71
+
> Anomalous SSH login detection is currently in public preview.
72
+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
73
+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
56
74
57
-
1. To use the relevant schema in Log Analytics for the Syslog logs, search for **Syslog**.
58
-
1. You can use the Kusto function described in [Using functions in Azure Monitor log queries](../azure-monitor/log-query/functions.md) to parse your Syslog messages and then save them as a new Log Analytics function and then use the function as a new data type.
75
+
The syslog data that you collect can be used with machine learning (ML) to identify anomalous Secure Shell (SSH) login activity. Scenarios include:
59
76
77
+
- Impossible travel – when two successful login events occur from two locations that are impossible to reach within the timeframe of the two login events.
78
+
- Unexpected location – the location from where a successful login event occurred is suspicious. For example, the location has not been seen recently.
79
+
80
+
This detection requires a specific configuration of the Syslog data connector:
60
81
82
+
1. For step 5 in the previous procedure, make sure that both **auth** and **authpriv** are selected as facilities to monitor. Keep the default settings for the severity options, so that they are all selected. For example:
83
+
84
+
> [!div class="mx-imgBorder"]
85
+
> 
61
86
87
+
2. Allow sufficient time for syslog information to be collected. Then, navigate to **Azure Sentinel - Logs**, and copy and paste the following query:
88
+
89
+
Syslog | where Facility in ("authpriv","auth")| extend c = extract( "Accepted\\s(publickey|password|keyboard-interactive/pam)\\sfor ([^\\s]+)",1,SyslogMessage)| where isnotempty(c) | count
90
+
91
+
Change the **Time range** if required, and select **Run**.
92
+
93
+
If the resulting count is zero, confirm the configuration of the connector and that the monitored computers do have successful login activity for the time period you specified for your query.
94
+
95
+
If the resulting count is greater than zero, your syslog data is suitable for anomalous SSH login detection. You enable this detection from **Analytics** > **Rule templates** > **(Preview) Anomalous SSH Login Detection**.
62
96
63
97
## Next steps
64
98
In this document, you learned how to connect Syslog on-premises appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
0 commit comments