You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws-s3-waf.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Connect Microsoft Sentinel to Amazon Web Services to ingest AWS WAF logs
3
3
description: Use the Amazon Web Services (AWS) S3-based Web Application Firewall (WAF) connector to ingest AWS WAF logs, collected in AWS S3 buckets, to Microsoft Sentinel.
4
-
author: yelevin
5
-
ms.author: yelevin
4
+
author: guywi-ms
5
+
ms.author: guywild
6
6
ms.topic: how-to
7
-
ms.date: 11/26/2024
7
+
ms.date: 04/06/2025
8
8
appliesto:
9
9
- Microsoft Sentinel in the Microsoft Defender portal
10
10
- Microsoft Sentinel in the Azure portal
@@ -63,7 +63,7 @@ The process of enabling and configuring the connector consists of the following
63
63
64
64
## Set up the AWS environment
65
65
66
-
To simplify the onboarding process, the **Amazon Web Services S3 WAF** connector page in Microsoft Sentinel contains downloadable templates for you to use with the AWS CloudFormation service. The CloudFormation service uses these templates to automatically create resource stacks in AWS. These stacks include the resources themselves as described in this article, as well as credentials, permissions, and policies.
66
+
To simplify the onboarding process, the **Amazon Web Services S3 WAF** connector page in Microsoft Sentinel contains downloadable templates for you to use with the AWS CloudFormation service. The CloudFormation service uses these templates to automatically create resource stacks in AWS. These stacks include the resources themselves as described in this article, and credentials, permissions, and policies.
67
67
68
68
> [!NOTE]
69
69
> We strongly recommend using the automatic setup process. For special cases, see the [manual setup instructions](connect-aws-configure-environment.md#manual-setup).
@@ -72,7 +72,7 @@ To simplify the onboarding process, the **Amazon Web Services S3 WAF** connector
72
72
73
73
To run the script to set up the AWS environment, use the following steps:
74
74
75
-
1. In the Azure portal, from the Microsoft Sentinel navigation menu, expand **Configuration** and select **Data connectors**.
75
+
1. In the Azure portal, from the Microsoft Sentinel navigation menu, expand **Configuration**, and select **Data connectors**.
76
76
77
77
In the Defender portal, from the quick launch menu, expand **Microsoft Sentinel > Configuration** and select **Data connectors**.
78
78
@@ -99,7 +99,7 @@ To run the script to set up the AWS environment, use the following steps:
99
99
100
100
Return to the AWS Console browser tab, which is open to the AWS CloudFormation page for creating a stack.
101
101
102
-
If you're not already logged in to AWS, log in now, and you are redirected to the AWS CloudFormation page.
102
+
If you're not already logged in to AWS, log in now, and you're redirected to the AWS CloudFormation page.
103
103
104
104
#### Create the OIDC web identity provider
105
105
@@ -157,4 +157,4 @@ When the resource stacks are all created, return to the browser tab open to the
157
157
| take 10
158
158
```
159
159
160
-
1. If you haven't already done so, we recommend that you implement **data connector health monitoring** so that you can know when connectors are not receiving data or any other issues with connectors. For more information, see [Monitor the health of your data connectors](monitor-data-connector-health.md).
160
+
1. If you haven't already done so, we recommend that you implement **data connector health monitoring** so that you can know when connectors aren't receiving data or any other issues with connectors. For more information, see [Monitor the health of your data connectors](monitor-data-connector-health.md).
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ To run the script to set up the connector, use the following steps:
84
84
85
85
1. Now run the script. Copy the command from the connector page (under "Run script to set up the environment") and paste it in your command line.
86
86
87
-
1. The script will prompt you to enter your Workspace ID. This ID appears on the connector page. Copy it and paste it at the prompt of the script.
87
+
1. The script prompts you to enter your Workspace ID. This ID appears on the connector page. Copy it and paste it at the prompt of the script.
88
88
89
89
:::image type="content" source="media/connect-aws/aws-run-script.png" alt-text="Screenshot of command to run setup script and workspace ID." lightbox="media/connect-aws/aws-run-script.png":::
90
90
@@ -94,14 +94,14 @@ To run the script to set up the connector, use the following steps:
94
94
95
95
:::image type="content" source="media/connect-aws/aws-add-connection.png" alt-text="Screenshot of pasting the A W S role information from the script, to the S3 connector." lightbox="media/connect-aws/aws-add-connection.png":::
96
96
97
-
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it will store the ingested data. Then select **Add connection**.
97
+
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it stores the ingested data. Then select **Add connection**.
98
98
99
99
> [!NOTE]
100
100
> The script may take up to 30 minutes to finish running.
101
101
102
102
## Manual setup
103
103
104
-
We recommend using the automatic setup script to deploy this connector. If for whatever reason you do not want to take advantage of this convenience, follow the steps below to set up the connector manually.
104
+
We recommend using the automatic setup script to deploy this connector. If for whatever reason you don't want to take advantage of this convenience, follow the steps below to set up the connector manually.
105
105
106
106
1. Set up your AWS environment as described in [Set up your Amazon Web Services environment to collect AWS logs to Microsoft Sentinel](connect-aws-configure-environment.md#manual-setup).
107
107
@@ -124,7 +124,7 @@ We recommend using the automatic setup script to deploy this connector. If for w
124
124
1. Under **2. Add connection**:
125
125
1. Paste the IAM role ARN you copied two steps ago into the **Role to add** field.
126
126
1. Paste the URL of the SQS queue you copied in the last step into the **SQS URL** field.
127
-
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it will store the ingested data.
127
+
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it stores the ingested data.
128
128
1. Select **Add connection**.
129
129
130
130
:::image type="content" source="media/connect-aws/aws-add-connection.png" alt-text="Screenshot of adding an A W S role connection to the S3 connector." lightbox="media/connect-aws/aws-add-connection.png":::
@@ -133,11 +133,11 @@ We recommend using the automatic setup script to deploy this connector. If for w
133
133
134
134
### Known issues
135
135
136
-
- Different types of logs can be stored in the same S3 bucket, but should not be stored in the same path.
136
+
- Different types of logs can be stored in the same S3 bucket, but shouldn't be stored in the same path.
137
137
138
-
- Each SQS queue should point to one type of message, so if you want to ingest GuardDuty findings *and* VPC flow logs, you should set up separate queues for each type.
138
+
- Each SQS queue should point to one type of message. If you want to ingest GuardDuty findings *and* VPC flow logs, set up separate queues for each type.
139
139
140
-
-Similarly, a single SQS queue can serve only one path in an S3 bucket, so if for any reason you are storing logs in multiple paths, each path requires its own dedicated SQS queue.
140
+
-A single SQS queue can serve only one path in an S3 bucket. If you're storing logs in multiple paths, each path requires its own dedicated SQS queue.
141
141
142
142
### Troubleshooting
143
143
@@ -158,7 +158,7 @@ This tab explains how to configure the AWS CloudTrail connector. The process of
158
158
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
159
159
160
160
> [!NOTE]
161
-
> Microsoft Sentinel collects CloudTrail management events from all regions. It is recommended that you do not stream events from one region to another.
161
+
> Microsoft Sentinel collects CloudTrail management events from all regions. We recommend that you don't stream events from one region to another.
0 commit comments