You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+27-7Lines changed: 27 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,19 +91,25 @@ The script takes the following actions:
91
91
92
92
### Prerequisites
93
93
94
-
You must have PowerShell and the AWS CLI on your machine.
94
+
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content (Public preview)](sentinel-solutions-deploy.md).
95
+
96
+
- You must have PowerShell and the AWS CLI on your machine.
97
+
-[Installation instructions for PowerShell](/powershell/scripting/install/installing-powershell)
98
+
-[Installation instructions for the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)
99
+
95
100
96
-
-[Installation instructions for PowerShell](/powershell/scripting/install/installing-powershell)
97
-
-[Installation instructions for the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html)
98
101
99
102
### Instructions
100
103
101
104
To run the script to set up the connector, use the following steps:
102
105
103
106
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
104
107
105
-
1. Select **Amazon Web Services S3** from the data connectors gallery, and in the details pane, select **Open connector page**.
108
+
1. Select **Amazon Web Services S3** from the data connectors gallery.
109
+
110
+
If you don't see the connector, install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel.
106
111
112
+
1. In the details pane for the connector, select **Open connector page**.
107
113
1. In the **Configuration** section, under **1. Set up your AWS environment**, expand **Setup with PowerShell script (recommended)**.
108
114
109
115
1. Follow the on-screen instructions to download and extract the [AWS S3 Setup Script](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/AWS-S3/ConfigAwsS3DataConnectorScripts.zip?raw=true) (link downloads a zip file containing the main setup script and helper scripts) from the connector page.
@@ -141,6 +147,8 @@ Microsoft recommends using the automatic setup script to deploy this connector.
141
147
142
148
- Create a [standard Simple Queue Service (SQS) queue](https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-configure-create-queue.html) in AWS.
143
149
150
+
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
151
+
144
152
### Instructions
145
153
146
154
The manual setup consists of the following steps:
@@ -152,8 +160,13 @@ The manual setup consists of the following steps:
152
160
153
161
#### Create an AWS assumed role and grant access to the AWS Sentinel account
154
162
155
-
1. In Microsoft Sentinel, select **Data connectors** and then select the **Amazon Web Services S3** line in the table and in the AWS pane to the right, select **Open connector page**.
163
+
1. In Microsoft Sentinel, select **Data connectors**.
164
+
165
+
1. Select **Amazon Web Services S3** from the data connectors gallery.
156
166
167
+
If you don't see the connector, install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel.
168
+
169
+
1. In the details pane for the connector, select **Open connector page**.
157
170
1. Under **Configuration**, copy the **External ID (Workspace ID)** and paste it aside.
158
171
159
172
1. In your AWS management console, under **Security, Identity & Compliance**, select **IAM**.
@@ -261,14 +274,21 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
261
274
262
275
## Prerequisites
263
276
264
-
You must have write permission on the Microsoft Sentinel workspace.
277
+
- You must have write permission on the Microsoft Sentinel workspace.
278
+
- Install the Amazon Web Services solution from the Content Hub in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
265
279
266
280
> [!NOTE]
267
281
> Microsoft Sentinel collects CloudTrail management events from all regions. It is recommended that you do not stream events from one region to another.
268
282
269
283
## Connect AWS CloudTrail
270
284
271
-
1. In Microsoft Sentinel, select **Data connectors** and then select the **Amazon Web Services** line in the table and in the AWS pane to the right, select **Open connector page**.
285
+
1. In Microsoft Sentinel, select **Data connectors**.
286
+
287
+
1. Select **Amazon Web Services** from the data connectors gallery.
288
+
289
+
If you don't see the connector, install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel.
290
+
291
+
1. In the details pane for the connector, select **Open connector page**.
272
292
273
293
1. Follow the instructions under **Configuration** using the following steps.
Copy file name to clipboardExpand all lines: articles/sentinel/connect-azure-active-directory.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,11 +10,6 @@ ms.custom: ignite-fall-2021
10
10
11
11
# Connect Azure Active Directory (Azure AD) data to Microsoft Sentinel
12
12
13
-
> [!IMPORTANT]
14
-
> As indicated below, some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
You can use Microsoft Sentinel's built-in connector to collect data from [Azure Active Directory](../active-directory/fundamentals/active-directory-whatis.md) and stream it into Microsoft Sentinel. The connector allows you to stream the following log types:
19
14
20
15
-[**Sign-in logs**](../active-directory/reports-monitoring/concept-all-sign-ins.md), which contain information about interactive user sign-ins where a user provides an authentication factor.
@@ -31,6 +26,10 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Azure
31
26
32
27
-[**Provisioning logs**](../active-directory/reports-monitoring/concept-provisioning-logs.md) (also in **PREVIEW**), which contain system activity information about users, groups, and roles provisioned by the Azure AD provisioning service.
33
28
29
+
> [!IMPORTANT]
30
+
> Some of the available log types are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -41,6 +40,7 @@ You can use Microsoft Sentinel's built-in connector to collect data from [Azure
41
40
- Your user must be assigned the [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator) or [Security Administrator](../active-directory/roles/permissions-reference.md#security-administrator) roles on the tenant you want to stream the logs from.
42
41
43
42
- Your user must have read and write permissions to the Azure AD diagnostic settings in order to be able to see the connection status.
43
+
- Install the solution for **Azure Active Directory** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
After you onboard Microsoft Sentinel into your workspace, you can use data connectors to start ingesting your data into Microsoft Sentinel. Microsoft Sentinel comes with many out of the box connectors for Microsoft services, which you can integrate in real time. For example, the Microsoft 365 Defender connector is a [service-to-service connector](#service-to-service-integration-for-data-connectors) that integrates data from Office 365, Azure Active Directory (Azure AD), Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps.
15
13
16
14
You can also enable built-in connectors to the broader security ecosystem for non-Microsoft products. For example, you can use [Syslog](#syslog), [Common Event Format (CEF)](#common-event-format-cef), or [REST APIs](#rest-api-integration-for-data-connectors) to connect your data sources with Microsoft Sentinel.
17
15
18
-
Learn about [types of Microsoft Sentinel data connectors](data-connectors-reference.md) or learn about the [Microsoft Sentinel solutions catalog](sentinel-solutions-catalog.md).
19
-
20
-
The Microsoft Sentinel **Data connectors** page shows the full list of connectors and their status in your workspace.
16
+
The Microsoft Sentinel **Data connectors** page shows the list of connectors installed in your workspace and their status.
21
17
22
18
:::image type="content" source="media/collect-data/collect-data-page.png" alt-text="Screenshot of the data connectors gallery." lightbox="media/collect-data/collect-data-page.png":::
23
19
20
+
For more data connectors, install the solution or standalone content items from the content hub. For more information, see the following articles:
21
+
-[Find your Microsoft Sentinel data connector](data-connectors-reference.md)
22
+
-[Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md)
Select the connector you want to connect, and then select **Open connector page**.
33
+
From the **Data connectors** page, select the active or custom connector you want to connect, and then select **Open connector page**. If you don't see the data connector you want, install the solution or standalone content items from the **Content Hub**.
31
34
32
-
-Once you fulfill all the prerequisites listed in the **Instructions** tab, the connector page describes how to ingest the data to Microsoft Sentinel. It may take some time for data to start arriving. After you connect, you see a summary of the data in the **Data received** graph, and the connectivity status of the data types.
35
+
Once you fulfill all the prerequisites listed in the **Instructions** tab, the connector page describes how to ingest the data to Microsoft Sentinel. It may take some time for data to start arriving. After you connect, you see a summary of the data in the **Data received** graph, and the connectivity status of the data types.
33
36
34
-
:::image type="content" source="media/collect-data/opened-connector-page.png" alt-text="Screenshot showing how to configure data connectors." border="false":::
37
+
:::image type="content" source="media/collect-data/opened-connector-page.png" alt-text="Screenshot showing how to configure data connectors." border="false":::
35
38
36
-
-In the **Next steps** tab, you'll see more content for the specific data type: Sample queries, visualization workbooks, and analytics rule templates to help you detect and investigate threats.
39
+
In the **Next steps** tab, you'll see more content for the specific data type: Sample queries, visualization workbooks, and analytics rule templates to help you detect and investigate threats.
37
40
38
-
:::image type="content" source="media/collect-data/data-insights.png" alt-text="Screenshot showing the data connecter Next steps tab." border="false":::
41
+
:::image type="content" source="media/collect-data/data-insights.png" alt-text="Screenshot showing the data connecter Next steps tab." border="false":::
39
42
40
43
Learn about your specific data connector in the [data connectors reference](data-connectors-reference.md).
Copy file name to clipboardExpand all lines: articles/sentinel/connect-defender-for-cloud.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,29 +10,26 @@ ms.custom: ignite-fall-2021
10
10
11
11
# Connect Microsoft Defender for Cloud alerts to Microsoft Sentinel
12
12
13
-
## Background
14
-
15
-
> [!NOTE]
16
-
> - Microsoft Defender for Cloud was formerly known as Azure Security Center.
17
-
> - Defender for Cloud's enhanced security features were formerly known collectively as Azure Defender.
18
-
19
13
[Microsoft Defender for Cloud](../defender-for-cloud/index.yml)'s integrated cloud workload protections allow you to detect and quickly respond to threats across hybrid and multi-cloud workloads.
20
14
21
15
This connector allows you to stream [security alerts from Defender for Cloud](../defender-for-cloud/alerts-reference.md) into Microsoft Sentinel, so you can view, analyze, and respond to Defender alerts, and the incidents they generate, in a broader organizational threat context.
22
16
23
17
As [Microsoft Defender for Cloud Defender plans](../defender-for-cloud/defender-for-cloud-introduction.md#protect-cloud-workloads) are enabled per subscription, this data connector is also enabled or disabled separately for each subscription.
24
18
19
+
Microsoft Defender for Cloud was formerly known as Azure Security Center. Defender for Cloud's enhanced security features were formerly known collectively as Azure Defender.
- When you connect Microsoft Defender for Cloud to Microsoft Sentinel, the status of security alerts that get ingested into Microsoft Sentinel is synchronized between the two services. So, for example, when an alert is closed in Defender for Cloud, that alert will display as closed in Microsoft Sentinel as well.
30
27
31
28
- Changing the status of an alert in Defender for Cloud will *not* affect the status of any Microsoft Sentinel **incidents** that contain the Microsoft Sentinel alert, only that of the alert itself.
32
29
33
-
###Bi-directional alert synchronization
30
+
## Bi-directional alert synchronization
34
31
35
-
-Enabling **bi-directional sync** will automatically sync the status of original security alerts with that of the Microsoft Sentinel incidents that contain those alerts. So, for example, when a Microsoft Sentinel incident containing a security alerts is closed, the corresponding original alert will be closed in Microsoft Defender for Cloud automatically.
32
+
Enabling **bi-directional sync** will automatically sync the status of original security alerts with that of the Microsoft Sentinel incidents that contain those alerts. So, for example, when a Microsoft Sentinel incident containing a security alerts is closed, the corresponding original alert will be closed in Microsoft Defender for Cloud automatically.
36
33
37
34
## Prerequisites
38
35
@@ -45,6 +42,7 @@ As [Microsoft Defender for Cloud Defender plans](../defender-for-cloud/defender-
45
42
- You will need the `SecurityInsights` resource provider to be registered for each subscription where you want to enable the connector. Review the guidance on the [resource provider registration status](../azure-resource-manager/management/resource-providers-and-types.md#register-resource-provider) and the ways to register it.
46
43
47
44
- To enable bi-directional sync, you must have the **Contributor** or **Security Admin** role on the relevant subscription.
45
+
- Install the solution for **Microsoft Defender for Cloud** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
Install the product solution from the **Content Hub** in Microsoft Sentinel. If the product isn't listed, install the solution for **Common Event Format**. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
34
+
33
35
Your machine must meet the following requirements:
34
36
35
37
-**Hardware (physical/virtual)**
@@ -78,8 +80,9 @@ If your devices are sending Syslog and CEF logs over TLS (because, for example,
78
80
79
81
## Run the deployment script
80
82
81
-
1. From the Microsoft Sentinel navigation menu, select **Data connectors**. Select the connector for your product from the connectors gallery (or the **Common Event Format (CEF)** if your product isn't listed), and then the **Open connector page** button on the lower right.
82
-
83
+
1. In Microsoft Sentinel, select **Data connectors**.
84
+
1. Select the connector for your product from the connectors gallery. If your product isn't listed, select **Common Event Format (CEF)**.
85
+
1. In the details pane for the connector, select **Open connector page**.
83
86
1. On the connector page, in the instructions under **1.2 Install the CEF collector on the Linux machine**, copy the link provided under **Run the following script to install and apply the CEF collector**.
84
87
If you don't have access to that page, copy the link from the text below (copying and pasting the **Workspace ID** and **Primary Key** from above in place of the placeholders):
Microsoft Sentinel's [Microsoft 365 Defender](/microsoft-365/security/mtp/microsoft-threat-protection) connector with incident integration allows you to stream all Microsoft 365 Defender incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals. Microsoft 365 Defender incidents include all their alerts, entities, and other relevant information, and they group together, and are enriched by, alerts from Microsoft 365 Defender's component services **Microsoft Defender for Endpoint**, **Microsoft Defender for Identity**, **Microsoft Defender for Office 365**, and **Microsoft Defender for Cloud Apps**, as well as alerts from other services such as **Microsoft Purview Data Loss Prevention (DLP)** and **Azure Active Directory Identity Protection (AADIP)**.
15
13
16
14
The connector also lets you stream **advanced hunting** events from *all* of the above Defender components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
17
15
18
16
For more information about incident integration and advanced hunting event collection, see [Microsoft 365 Defender integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md#advanced-hunting-event-collection).
19
17
20
-
> [!IMPORTANT]
21
-
>
22
-
> The Microsoft 365 Defender connector is now generally available!
18
+
The Microsoft 365 Defender connector is now generally available.
- You must have a valid license for Microsoft 365 Defender, as described in [Microsoft 365 Defender prerequisites](/microsoft-365/security/mtp/prerequisites).
@@ -30,6 +27,7 @@ For more information about incident integration and advanced hunting event colle
30
27
- Your user must have read and write permissions on your Microsoft Sentinel workspace.
31
28
32
29
- To make any changes to the connector settings, your user must be a member of the same Azure Active Directory tenant with which your Microsoft Sentinel workspace is associated.
30
+
- Install the solution for **Microsoft 365 Defender** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
33
31
34
32
### Prerequisites for Active Directory sync via MDI
Copy file name to clipboardExpand all lines: articles/sentinel/connect-syslog.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,10 @@ There are three steps to configuring Syslog collection:
44
44
45
45
-**Configure the Log Analytics agent itself**. This is done from within Microsoft Sentinel, and the configuration is sent to all installed agents.
46
46
47
+
## Prerequisites
48
+
49
+
Before you begin, install the solution for **Syslog** from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
50
+
47
51
## Configure your Linux machine or appliance
48
52
49
53
1. From the Microsoft Sentinel navigation menu, select **Data connectors**.
0 commit comments