Skip to content

Commit b33012a

Browse files
committed
updates
1 parent f2cc3e4 commit b33012a

File tree

2 files changed

+15
-15
lines changed

2 files changed

+15
-15
lines changed

articles/sentinel/connect-aws-s3-waf.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Connect Microsoft Sentinel to Amazon Web Services to ingest AWS WAF logs
33
description: Use the Amazon Web Services (AWS) S3-based Web Application Firewall (WAF) connector to ingest AWS WAF logs, collected in AWS S3 buckets, to Microsoft Sentinel.
4-
author: yelevin
5-
ms.author: yelevin
4+
author: guywi-ms
5+
ms.author: guywild
66
ms.topic: how-to
7-
ms.date: 11/26/2024
7+
ms.date: 04/06/2025
88
appliesto:
99
- Microsoft Sentinel in the Microsoft Defender portal
1010
- Microsoft Sentinel in the Azure portal
@@ -63,7 +63,7 @@ The process of enabling and configuring the connector consists of the following
6363

6464
## Set up the AWS environment
6565

66-
To simplify the onboarding process, the **Amazon Web Services S3 WAF** connector page in Microsoft Sentinel contains downloadable templates for you to use with the AWS CloudFormation service. The CloudFormation service uses these templates to automatically create resource stacks in AWS. These stacks include the resources themselves as described in this article, as well as credentials, permissions, and policies.
66+
To simplify the onboarding process, the **Amazon Web Services S3 WAF** connector page in Microsoft Sentinel contains downloadable templates for you to use with the AWS CloudFormation service. The CloudFormation service uses these templates to automatically create resource stacks in AWS. These stacks include the resources themselves as described in this article, and credentials, permissions, and policies.
6767

6868
> [!NOTE]
6969
> We strongly recommend using the automatic setup process. For special cases, see the [manual setup instructions](connect-aws-configure-environment.md#manual-setup).
@@ -72,7 +72,7 @@ To simplify the onboarding process, the **Amazon Web Services S3 WAF** connector
7272

7373
To run the script to set up the AWS environment, use the following steps:
7474

75-
1. In the Azure portal, from the Microsoft Sentinel navigation menu, expand **Configuration** and select **Data connectors**.
75+
1. In the Azure portal, from the Microsoft Sentinel navigation menu, expand **Configuration**, and select **Data connectors**.
7676

7777
In the Defender portal, from the quick launch menu, expand **Microsoft Sentinel > Configuration** and select **Data connectors**.
7878

@@ -99,7 +99,7 @@ To run the script to set up the AWS environment, use the following steps:
9999

100100
Return to the AWS Console browser tab, which is open to the AWS CloudFormation page for creating a stack.
101101

102-
If you're not already logged in to AWS, log in now, and you are redirected to the AWS CloudFormation page.
102+
If you're not already logged in to AWS, log in now, and you're redirected to the AWS CloudFormation page.
103103

104104
#### Create the OIDC web identity provider
105105

@@ -157,4 +157,4 @@ When the resource stacks are all created, return to the browser tab open to the
157157
| take 10
158158
```
159159
160-
1. If you haven't already done so, we recommend that you implement **data connector health monitoring** so that you can know when connectors are not receiving data or any other issues with connectors. For more information, see [Monitor the health of your data connectors](monitor-data-connector-health.md).
160+
1. If you haven't already done so, we recommend that you implement **data connector health monitoring** so that you can know when connectors aren't receiving data or any other issues with connectors. For more information, see [Monitor the health of your data connectors](monitor-data-connector-health.md).

articles/sentinel/connect-aws.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ To run the script to set up the connector, use the following steps:
8484

8585
1. Now run the script. Copy the command from the connector page (under "Run script to set up the environment") and paste it in your command line.
8686

87-
1. The script will prompt you to enter your Workspace ID. This ID appears on the connector page. Copy it and paste it at the prompt of the script.
87+
1. The script prompts you to enter your Workspace ID. This ID appears on the connector page. Copy it and paste it at the prompt of the script.
8888

8989
:::image type="content" source="media/connect-aws/aws-run-script.png" alt-text="Screenshot of command to run setup script and workspace ID." lightbox="media/connect-aws/aws-run-script.png":::
9090

@@ -94,14 +94,14 @@ To run the script to set up the connector, use the following steps:
9494

9595
:::image type="content" source="media/connect-aws/aws-add-connection.png" alt-text="Screenshot of pasting the A W S role information from the script, to the S3 connector." lightbox="media/connect-aws/aws-add-connection.png":::
9696

97-
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it will store the ingested data. Then select **Add connection**.
97+
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it stores the ingested data. Then select **Add connection**.
9898

9999
> [!NOTE]
100100
> The script may take up to 30 minutes to finish running.
101101
102102
## Manual setup
103103

104-
We recommend using the automatic setup script to deploy this connector. If for whatever reason you do not want to take advantage of this convenience, follow the steps below to set up the connector manually.
104+
We recommend using the automatic setup script to deploy this connector. If for whatever reason you don't want to take advantage of this convenience, follow the steps below to set up the connector manually.
105105

106106
1. Set up your AWS environment as described in [Set up your Amazon Web Services environment to collect AWS logs to Microsoft Sentinel](connect-aws-configure-environment.md#manual-setup).
107107

@@ -124,7 +124,7 @@ We recommend using the automatic setup script to deploy this connector. If for w
124124
1. Under **2. Add connection**:
125125
1. Paste the IAM role ARN you copied two steps ago into the **Role to add** field.
126126
1. Paste the URL of the SQS queue you copied in the last step into the **SQS URL** field.
127-
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it will store the ingested data.
127+
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it stores the ingested data.
128128
1. Select **Add connection**.
129129

130130
:::image type="content" source="media/connect-aws/aws-add-connection.png" alt-text="Screenshot of adding an A W S role connection to the S3 connector." lightbox="media/connect-aws/aws-add-connection.png":::
@@ -133,11 +133,11 @@ We recommend using the automatic setup script to deploy this connector. If for w
133133

134134
### Known issues
135135

136-
- Different types of logs can be stored in the same S3 bucket, but should not be stored in the same path.
136+
- Different types of logs can be stored in the same S3 bucket, but shouldn't be stored in the same path.
137137

138-
- Each SQS queue should point to one type of message, so if you want to ingest GuardDuty findings *and* VPC flow logs, you should set up separate queues for each type.
138+
- Each SQS queue should point to one type of message. If you want to ingest GuardDuty findings *and* VPC flow logs, set up separate queues for each type.
139139

140-
- Similarly, a single SQS queue can serve only one path in an S3 bucket, so if for any reason you are storing logs in multiple paths, each path requires its own dedicated SQS queue.
140+
- A single SQS queue can serve only one path in an S3 bucket. If you're storing logs in multiple paths, each path requires its own dedicated SQS queue.
141141

142142
### Troubleshooting
143143

@@ -158,7 +158,7 @@ This tab explains how to configure the AWS CloudTrail connector. The process of
158158
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
159159

160160
> [!NOTE]
161-
> Microsoft Sentinel collects CloudTrail management events from all regions. It is recommended that you do not stream events from one region to another.
161+
> Microsoft Sentinel collects CloudTrail management events from all regions. We recommend that you don't stream events from one region to another.
162162
163163
## Connect AWS CloudTrail
164164

0 commit comments

Comments
 (0)