Skip to content

Commit ac4f80f

Browse files
authored
Merge pull request #88425 from cabailey/cabailey-azuredocs-syslog
Add new procedure to Syslog connector for anomalous SSH login detection
2 parents 5423527 + a869ff8 commit ac4f80f

File tree

2 files changed

+53
-19
lines changed

2 files changed

+53
-19
lines changed

articles/sentinel/connect-syslog.md

Lines changed: 53 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Connect Syslog data to Azure Sentinel| Microsoft Docs
2+
title: Connect Syslog data to Azure Sentinel | Microsoft Docs
33
description: Learn how to connect Syslog data to Azure Sentinel.
44
services: sentinel
55
documentationcenter: na
@@ -19,8 +19,6 @@ ms.author: rkarlin
1919
---
2020
# Connect your external solution using Syslog
2121

22-
23-
2422
You can connect any on-premises appliance that supports Syslog to Azure Sentinel. This is done by using an agent based on a Linux machine between the appliance and Azure Sentinel. If your Linux machine is in Azure, you can stream the logs from your appliance or application to a dedicated workspace you create in Azure and connect it. If your Linux machine is not in Azure, you can stream the logs from your appliance to a dedicated on premises VM or machine onto which you install the Agent for Linux.
2523

2624
> [!NOTE]
@@ -37,28 +35,64 @@ For more information, see [Syslog data sources in Azure Monitor](../azure-monito
3735
3836
## Connect your Syslog appliance
3937

40-
1. In the Azure Sentinel portal, select **Data connectors** and select the **Syslog** line in the table and in the Syslog pane to the right, click **Open connector page**.
41-
2. If your Linux machine is within Azure, select **Download and install agent on Azure Linux virtual machine**. In the Virtual machines window, select the machines on which you want to install the agent and click **Connect** at the top.
42-
1. If your Linux machine not within Azure, select **Download and install agent on Linux non-Azure machine**. In the **Direct agent** window, copy the command under **Download and onboard agent for Linux** and run it on your machine.
38+
1. In Azure Sentinel, select **Data connectors** and then select the **Syslog** connector.
39+
40+
2. On the **Syslog** blade, select **Open connector page**.
41+
42+
3. Install the Linux agent:
43+
44+
- If your Linux virtual machine is in Azure, select **Download and install agent on Azure Linux virtual machine**. In the **Virtual machines** blade, select the virtual machines to install the agent on, and then click **Connect**.
45+
- If your Linux machine isn't in Azure, select **Download and install agent on Linux non-Azure machine**. In the **Direct agent** blade, copy the command for **DOWNLOAD AND ONBOARD AGENT FOR LINUX** and run it on your computer.
46+
4347
> [!NOTE]
44-
> Make sure to configure the machine's security according to your organization's security policy. For example, you can configure your network to align with your corporate network security policy and change the ports and protocols in the daemon to align with your requirements.
48+
> Make sure you configure security settings for these computers according to your organization's security policy. For example, you can configure the network settings to align with your organization's network security policy, and change the ports and protocols in the daemon to align with the security requirements.
49+
50+
4. Select **Open your workspace advanced settings configuration**.
51+
52+
5. On the **Advanced settings** blade, select **Data** > **Syslog**. Then add the facilities for the connector to collect.
53+
54+
Add the facilities that your syslog appliance includes in its log headers. You can see this configuration in your Syslog appliance in **Syslog-d** in the `/etc/rsyslog.d/security-config-omsagent.conf` folder, and in **r-Syslog** from `/etc/syslog-ng/security-config-omsagent.conf`.
55+
56+
If you want to use anomalous SSH login detection with the data that you collect, add **auth** and **authpriv**. See the [following section](#configure-the-syslog-connector-for-anomalous-ssh-login-detection) for additional details.
57+
58+
6. When you have added all the facilities that you want to monitor, and adjusted any severity options for each one, select the checkbox **Apply below configuration to my machines**.
59+
60+
7. Select **Save**.
61+
62+
8. On your syslog appliance, make sure you're sending the facilities that you specified.
63+
64+
9. To use the relevant schema in Azure Monitor for the syslog logs, search for **Syslog**.
65+
66+
10. You can use the Kusto function described in [Using functions in Azure Monitor log queries](../azure-monitor/log-query/functions.md) to parse your Syslog messages. You can then save them as a new Log Analytics function to use as a new data type.
67+
68+
### Configure the Syslog connector for anomalous SSH login detection
4569

46-
1. Under **Configure the logs to be connected** in the Syslog connector setup window, follow the instructions:
47-
1. Click the link to **Open your workspace advanced settings configuration**.
48-
1. Select **Data**, followed by **Syslog**.
49-
1. Then, in the table set which facilities you want Syslog to collect. You should either add or select the facilities that your Syslog appliance includes in its log headers. You can see this configuration in your Syslog appliance in Syslog-d in the folder: /etc/rsyslog.d/security-config-omsagent.conf, and in r-Syslog under /etc/syslog-ng/security-config-omsagent.conf.
50-
> [!NOTE]
51-
> If you select the checkbox to **Apply below configuration to my machines**, then this configuration will apply to all the Linux machines connected to this workspace. You can see this configuration in your Syslog machine under
52-
1. Click **Press here to open the configuration blade**.
53-
1. Select **Data** and then **Syslog**.
54-
- Make sure each facility that you're sending by Syslog is in the table. For each facility, you are going to monitor, set a severity. Click **Apply**.
55-
1. In your Syslog machine, make sure you're sending those facilities.
70+
> [!IMPORTANT]
71+
> Anomalous SSH login detection is currently in public preview.
72+
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
73+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
5674
57-
1. To use the relevant schema in Log Analytics for the Syslog logs, search for **Syslog**.
58-
1. You can use the Kusto function described in [Using functions in Azure Monitor log queries](../azure-monitor/log-query/functions.md) to parse your Syslog messages and then save them as a new Log Analytics function and then use the function as a new data type.
75+
The syslog data that you collect can be used with machine learning (ML) to identify anomalous Secure Shell (SSH) login activity. Scenarios include:
5976

77+
- Impossible travel – when two successful login events occur from two locations that are impossible to reach within the timeframe of the two login events.
78+
- Unexpected location – the location from where a successful login event occurred is suspicious. For example, the location has not been seen recently.
79+
80+
This detection requires a specific configuration of the Syslog data connector:
6081

82+
1. For step 5 in the previous procedure, make sure that both **auth** and **authpriv** are selected as facilities to monitor. Keep the default settings for the severity options, so that they are all selected. For example:
83+
84+
> [!div class="mx-imgBorder"]
85+
> ![Facilities required for anomalous SSH login detection](./media/connect-syslog/facilities-ssh-detection.png)
6186
87+
2. Allow sufficient time for syslog information to be collected. Then, navigate to **Azure Sentinel - Logs**, and copy and paste the following query:
88+
89+
Syslog |  where Facility in ("authpriv","auth")| extend c = extract( "Accepted\\s(publickey|password|keyboard-interactive/pam)\\sfor ([^\\s]+)",1,SyslogMessage)| where isnotempty(c) | count
90+
91+
Change the **Time range** if required, and select **Run**.
92+
93+
If the resulting count is zero, confirm the configuration of the connector and that the monitored computers do have successful login activity for the time period you specified for your query.
94+
95+
If the resulting count is greater than zero, your syslog data is suitable for anomalous SSH login detection. You enable this detection from **Analytics** > **Rule templates** > **(Preview) Anomalous SSH Login Detection**.
6296

6397
## Next steps
6498
In this document, you learned how to connect Syslog on-premises appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
10.1 KB
Loading

0 commit comments

Comments
 (0)