Skip to content

Commit b201f82

Browse files
Merge pull request #238522 from cwatson-cat/5-17-23-ctn-hub-sol-inst
Sentinel - upd for content hub templt gallery chng
2 parents cc278f7 + eda236e commit b201f82

7 files changed

+64
-38
lines changed

articles/sentinel/connect-aws.md

Lines changed: 27 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -91,19 +91,25 @@ The script takes the following actions:
9191

9292
### Prerequisites
9393

94-
You must have PowerShell and the AWS CLI on your machine.
94+
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content (Public preview)](sentinel-solutions-deploy.md).
95+
96+
- You must have PowerShell and the AWS CLI on your machine.
97+
- [Installation instructions for PowerShell](/powershell/scripting/install/installing-powershell)
98+
- [Installation instructions for the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)
99+
95100

96-
- [Installation instructions for PowerShell](/powershell/scripting/install/installing-powershell)
97-
- [Installation instructions for the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)
98101

99102
### Instructions
100103

101104
To run the script to set up the connector, use the following steps:
102105

103106
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
104107

105-
1. Select **Amazon Web Services S3** from the data connectors gallery, and in the details pane, select **Open connector page**.
108+
1. Select **Amazon Web Services S3** from the data connectors gallery.
109+
110+
If you don't see the connector, install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel.
106111

112+
1. In the details pane for the connector, select **Open connector page**.
107113
1. In the **Configuration** section, under **1. Set up your AWS environment**, expand **Setup with PowerShell script (recommended)**.
108114

109115
1. Follow the on-screen instructions to download and extract the [AWS S3 Setup Script](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/ConfigAwsS3DataConnectorScripts.zip?raw=true) (link downloads a zip file containing the main setup script and helper scripts) from the connector page.
@@ -141,6 +147,8 @@ Microsoft recommends using the automatic setup script to deploy this connector.
141147

142148
- Create a [standard Simple Queue Service (SQS) queue](https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-configure-create-queue.html) in AWS.
143149

150+
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
151+
144152
### Instructions
145153

146154
The manual setup consists of the following steps:
@@ -152,8 +160,13 @@ The manual setup consists of the following steps:
152160

153161
#### Create an AWS assumed role and grant access to the AWS Sentinel account
154162

155-
1. In Microsoft Sentinel, select **Data connectors** and then select the **Amazon Web Services S3** line in the table and in the AWS pane to the right, select **Open connector page**.
163+
1. In Microsoft Sentinel, select **Data connectors**.
164+
165+
1. Select **Amazon Web Services S3** from the data connectors gallery.
156166

167+
If you don't see the connector, install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel.
168+
169+
1. In the details pane for the connector, select **Open connector page**.
157170
1. Under **Configuration**, copy the **External ID (Workspace ID)** and paste it aside.
158171

159172
1. In your AWS management console, under **Security, Identity & Compliance**, select **IAM**.
@@ -261,14 +274,21 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
261274
262275
## Prerequisites
263276

264-
You must have write permission on the Microsoft Sentinel workspace.
277+
- You must have write permission on the Microsoft Sentinel workspace.
278+
- Install the Amazon Web Services solution from the Content Hub in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
265279

266280
> [!NOTE]
267281
> Microsoft Sentinel collects CloudTrail management events from all regions. It is recommended that you do not stream events from one region to another.
268282
269283
## Connect AWS CloudTrail
270284

271-
1. In Microsoft Sentinel, select **Data connectors** and then select the **Amazon Web Services** line in the table and in the AWS pane to the right, select **Open connector page**.
285+
1. In Microsoft Sentinel, select **Data connectors**.
286+
287+
1. Select **Amazon Web Services** from the data connectors gallery.
288+
289+
If you don't see the connector, install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel.
290+
291+
1. In the details pane for the connector, select **Open connector page**.
272292

273293
1. Follow the instructions under **Configuration** using the following steps.
274294

articles/sentinel/connect-azure-active-directory.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,6 @@ ms.custom: ignite-fall-2021
1010

1111
# Connect Azure Active Directory (Azure AD) data to Microsoft Sentinel
1212

13-
> [!IMPORTANT]
14-
> As indicated below, some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15-
16-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
17-
1813
You can use Microsoft Sentinel's built-in connector to collect data from [Azure Active Directory](../active-directory/fundamentals/active-directory-whatis.md) and stream it into Microsoft Sentinel. The connector allows you to stream the following log types:
1914

2015
- [**Sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md), which contain information about interactive user sign-ins where a user provides an authentication factor.
@@ -31,6 +26,10 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Azure
3126

3227
- [**Provisioning logs**](../active-directory/reports-monitoring/concept-provisioning-logs.md) (also in **PREVIEW**), which contain system activity information about users, groups, and roles provisioned by the Azure AD provisioning service.
3328

29+
> [!IMPORTANT]
30+
> Some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
31+
32+
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
3433

3534
## Prerequisites
3635

@@ -41,6 +40,7 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Azure
4140
- Your user must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
4241

4342
- Your user must have read and write permissions to the Azure AD diagnostic settings in order to be able to see the connection status.
43+
- Install the solution for **Azure Active Directory** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
4444

4545
## Connect to Azure Active Directory
4646

articles/sentinel/connect-data-sources.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,33 +9,36 @@ ms.author: yelevin
99

1010
# Microsoft Sentinel data connectors
1111

12-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
13-
1412
After you onboard Microsoft Sentinel into your workspace, you can use data connectors to start ingesting your data into Microsoft Sentinel. Microsoft Sentinel comes with many out of the box connectors for Microsoft services, which you can integrate in real time. For example, the Microsoft 365 Defender connector is a [service-to-service connector](#service-to-service-integration-for-data-connectors) that integrates data from Office 365, Azure Active Directory (Azure AD), Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps.
1513

1614
You can also enable built-in connectors to the broader security ecosystem for non-Microsoft products. For example, you can use [Syslog](#syslog), [Common Event Format (CEF)](#common-event-format-cef), or [REST APIs](#rest-api-integration-for-data-connectors) to connect your data sources with Microsoft Sentinel.
1715

18-
Learn about [types of Microsoft Sentinel data connectors](data-connectors-reference.md) or learn about the [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md).
19-
20-
The Microsoft Sentinel **Data connectors** page shows the full list of connectors and their status in your workspace.
16+
The Microsoft Sentinel **Data connectors** page shows the list of connectors installed in your workspace and their status.
2117

2218
:::image type="content" source="media/collect-data/collect-data-page.png" alt-text="Screenshot of the data connectors gallery." lightbox="media/collect-data/collect-data-page.png":::
2319

20+
For more data connectors, install the solution or standalone content items from the content hub. For more information, see the following articles:
21+
- [Find your Microsoft Sentinel data connector](data-connectors-reference.md)
22+
- [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md)
23+
- [Microsoft Sentinel content hub catalog](sentinel-solutions-catalog.md)
24+
2425
<a name="agent-options"></a>
2526
<a name="data-connection-methods"></a>
2627
<a name="map-data-types-with-microsoft-sentinel-connection-options"></a>
2728

29+
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
30+
2831
## Enable a data connector
2932

30-
Select the connector you want to connect, and then select **Open connector page**.
33+
From the **Data connectors** page, select the active or custom connector you want to connect, and then select **Open connector page**. If you don't see the data connector you want, install the solution or standalone content items from the **Content Hub**.
3134

32-
- Once you fulfill all the prerequisites listed in the **Instructions** tab, the connector page describes how to ingest the data to Microsoft Sentinel. It may take some time for data to start arriving. After you connect, you see a summary of the data in the **Data received** graph, and the connectivity status of the data types.
35+
Once you fulfill all the prerequisites listed in the **Instructions** tab, the connector page describes how to ingest the data to Microsoft Sentinel. It may take some time for data to start arriving. After you connect, you see a summary of the data in the **Data received** graph, and the connectivity status of the data types.
3336

34-
:::image type="content" source="media/collect-data/opened-connector-page.png" alt-text="Screenshot showing how to configure data connectors." border="false":::
37+
:::image type="content" source="media/collect-data/opened-connector-page.png" alt-text="Screenshot showing how to configure data connectors." border="false":::
3538

36-
- In the **Next steps** tab, you'll see more content for the specific data type: Sample queries, visualization workbooks, and analytics rule templates to help you detect and investigate threats.
39+
In the **Next steps** tab, you'll see more content for the specific data type: Sample queries, visualization workbooks, and analytics rule templates to help you detect and investigate threats.
3740

38-
:::image type="content" source="media/collect-data/data-insights.png" alt-text="Screenshot showing the data connecter Next steps tab." border="false":::
41+
:::image type="content" source="media/collect-data/data-insights.png" alt-text="Screenshot showing the data connecter Next steps tab." border="false":::
3942

4043
Learn about your specific data connector in the [data connectors reference](data-connectors-reference.md).
4144

articles/sentinel/connect-defender-for-cloud.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,29 +10,26 @@ ms.custom: ignite-fall-2021
1010

1111
# Connect Microsoft Defender for Cloud alerts to Microsoft Sentinel
1212

13-
## Background
14-
15-
> [!NOTE]
16-
> - Microsoft Defender for Cloud was formerly known as Azure Security Center.
17-
> - Defender for Cloud's enhanced security features were formerly known collectively as Azure Defender.
18-
1913
[Microsoft Defender for Cloud](../defender-for-cloud/index.yml)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multi-cloud workloads.
2014

2115
This connector allows you to stream [security alerts from Defender for Cloud](../defender-for-cloud/alerts-reference.md) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
2216

2317
As [Microsoft Defender for Cloud Defender plans](../defender-for-cloud/defender-for-cloud-introduction.md#protect-cloud-workloads) are enabled per subscription, this data connector is also enabled or disabled separately for each subscription.
2418

19+
Microsoft Defender for Cloud was formerly known as Azure Security Center. Defender for Cloud's enhanced security features were formerly known collectively as Azure Defender.
20+
21+
2522
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2623

27-
### Alert synchronization
24+
## Alert synchronization
2825

2926
- When you connect Microsoft Defender for Cloud to Microsoft Sentinel, the status of security alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert will display as closed in Microsoft Sentinel as well.
3027

3128
- Changing the status of an alert in Defender for Cloud will *not* affect the status of any Microsoft Sentinel **incidents** that contain the Microsoft Sentinel alert, only that of the alert itself.
3229

33-
### Bi-directional alert synchronization
30+
## Bi-directional alert synchronization
3431

35-
- Enabling **bi-directional sync** will automatically sync the status of original security alerts with that of the Microsoft Sentinel incidents that contain those alerts. So, for example, when a Microsoft Sentinel incident containing a security alerts is closed, the corresponding original alert will be closed in Microsoft Defender for Cloud automatically.
32+
Enabling **bi-directional sync** will automatically sync the status of original security alerts with that of the Microsoft Sentinel incidents that contain those alerts. So, for example, when a Microsoft Sentinel incident containing a security alerts is closed, the corresponding original alert will be closed in Microsoft Defender for Cloud automatically.
3633

3734
## Prerequisites
3835

@@ -45,6 +42,7 @@ As [Microsoft Defender for Cloud Defender plans](../defender-for-cloud/defender-
4542
- You will need the `SecurityInsights` resource provider to be registered for each subscription where you want to enable the connector. Review the guidance on the [resource provider registration status](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider) and the ways to register it.
4643

4744
- To enable bi-directional sync, you must have the **Contributor** or **Security Admin** role on the relevant subscription.
45+
- Install the solution for **Microsoft Defender for Cloud** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
4846

4947
## Connect to Microsoft Defender for Cloud
5048

articles/sentinel/connect-log-forwarder.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ Using the link provided below, you will run a script on the designated machine t
3030

3131
[!INCLUDE [data-connector-prereq](includes/data-connector-prereq.md)]
3232

33+
Install the product solution from the **Content Hub** in Microsoft Sentinel. If the product isn't listed, install the solution for **Common Event Format**. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
34+
3335
Your machine must meet the following requirements:
3436

3537
- **Hardware (physical/virtual)**
@@ -78,8 +80,9 @@ If your devices are sending Syslog and CEF logs over TLS (because, for example,
7880

7981
## Run the deployment script
8082

81-
1. From the Microsoft Sentinel navigation menu, select **Data connectors**. Select the connector for your product from the connectors gallery (or the **Common Event Format (CEF)** if your product isn't listed), and then the **Open connector page** button on the lower right.
82-
83+
1. In Microsoft Sentinel, select **Data connectors**.
84+
1. Select the connector for your product from the connectors gallery. If your product isn't listed, select **Common Event Format (CEF)**.
85+
1. In the details pane for the connector, select **Open connector page**.
8386
1. On the connector page, in the instructions under **1.2 Install the CEF collector on the Linux machine**, copy the link provided under **Run the following script to install and apply the CEF collector**.
8487
If you don't have access to that page, copy the link from the text below (copying and pasting the **Workspace ID** and **Primary Key** from above in place of the placeholders):
8588

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,18 +9,15 @@ ms.date: 02/01/2023
99

1010
# Connect data from Microsoft 365 Defender to Microsoft Sentinel
1111

12-
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
13-
1412
Microsoft Sentinel's [Microsoft 365 Defender](/microsoft-365/security/mtp/microsoft-threat-protection) connector with incident integration allows you to stream all Microsoft 365 Defender incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft 365 Defender incidents include all their alerts, entities, and other relevant information, and they group together, and are enriched by, alerts from Microsoft 365 Defender's component services **Microsoft Defender for Endpoint**, **Microsoft Defender for Identity**, **Microsoft Defender for Office 365**, and **Microsoft Defender for Cloud Apps**, as well as alerts from other services such as **Microsoft Purview Data Loss Prevention (DLP)** and **Azure Active Directory Identity Protection (AADIP)**.
1513

1614
The connector also lets you stream **advanced hunting** events from *all* of the above Defender components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
1715

1816
For more information about incident integration and advanced hunting event collection, see [Microsoft 365 Defender integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
1917

20-
> [!IMPORTANT]
21-
>
22-
> The Microsoft 365 Defender connector is now generally available!
18+
The Microsoft 365 Defender connector is now generally available.
2319

20+
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2421
## Prerequisites
2522

2623
- You must have a valid license for Microsoft 365 Defender, as described in [Microsoft 365 Defender prerequisites](/microsoft-365/security/mtp/prerequisites).
@@ -30,6 +27,7 @@ For more information about incident integration and advanced hunting event colle
3027
- Your user must have read and write permissions on your Microsoft Sentinel workspace.
3128

3229
- To make any changes to the connector settings, your user must be a member of the same Azure Active Directory tenant with which your Microsoft Sentinel workspace is associated.
30+
- Install the solution for **Microsoft 365 Defender** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
3331

3432
### Prerequisites for Active Directory sync via MDI
3533

articles/sentinel/connect-syslog.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,10 @@ There are three steps to configuring Syslog collection:
4444

4545
- **Configure the Log Analytics agent itself**. This is done from within Microsoft Sentinel, and the configuration is sent to all installed agents.
4646

47+
## Prerequisites
48+
49+
Before you begin, install the solution for **Syslog** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
50+
4751
## Configure your Linux machine or appliance
4852

4953
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.

0 commit comments

Comments
 (0)