Skip to content

Commit c417e7b

Browse files
committed
removing attack disrupt for SAP
1 parent 3728fe9 commit c417e7b

9 files changed

+17
-199
lines changed

articles/sentinel/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -180,8 +180,6 @@
180180
href: sap/reference-systemconfig.md
181181
- name: Enable SAP detections and threat protection
182182
href: sap/deployment-solution-configuration.md
183-
- name: Automatic attack disruption for SAP
184-
href: sap/deployment-attack-disrupt.md
185183
- name: Integrate SAP across multiple workspaces
186184
href: sap/cross-workspace.md
187185
- name: Monitor SAP systems

articles/sentinel/feature-availability.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@ This article describes the features available in Microsoft Sentinel across diffe
2525

2626
Microsoft Sentinel is also available in the [Microsoft Defender portal](microsoft-sentinel-defender-portal.md) as Microsoft's unified security operations (SecOps) platform. In the Defender portal, all features in general availability are available in both commercial and GCC High and DoD clouds. Features still in preview are available only in the commercial cloud.
2727

28-
While [attack disruption in the Defender portal](/defender-xdr/automatic-attack-disruption) is generally available, [SAP support for attack disruption](/defender-xdr/automatic-attack-disruption#automated-response-actions-for-sap-with-microsoft-sentinel) with Microsoft's unified SecOps platform is available only in the commercial cloud.
29-
3028
For more information, see [Microsoft Defender XDR for US Government customers](/defender-xdr/usgov).
3129

3230
## Analytics

articles/sentinel/microsoft-sentinel-defender-portal.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the Microsoft Sentinel experience when you onboard Micr
44
author: cwatson-cat
55
ms.author: cwatson
66
ms.topic: conceptual
7-
ms.date: 11/21/2024
7+
ms.date: 12/11/2024
88
appliesto:
99
- Microsoft Sentinel in the Microsoft Defender portal
1010
ms.collection: usx-security
@@ -39,7 +39,6 @@ The following table describes the additional capabilities available in the Defen
3939

4040
| Capabilities | Description |
4141
| ----------------- | ------------------------ |
42-
| Attack disrupt | Deploy automatic attack disruption for SAP with both the Defender portal and the Microsoft Sentinel solution for SAP applications. For example, contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack. <br><br>Attack disruption capabilities for SAP are available in the Defender portal only. To use attack disruption for SAP, update your data connector agent version and ensure that the relevant Azure role is assigned to your agent's identity. <br><br> For more information, see [Automatic attack disruption for SAP](sap/deployment-attack-disrupt.md). |
4342
| Unified entities | Entity pages for devices, users, IP addresses, and Azure resources in the Defender portal display information from Microsoft Sentinel and Defender data sources. These entity pages give you an expanded context for your investigations of incidents and alerts in the Defender portal.<br><br>For more information, see [Investigate entities with entity pages in Microsoft Sentinel](/azure/sentinel/entity-pages). |
4443
| Unified incidents | Manage and investigate security incidents in a single location and from a single queue in the Defender portal. Use Security Copilot to summarize, respond, and report. Incidents include:<br>- Data from the breadth of sources<br>- AI analytics tools of security information and event management (SIEM)<br>- Context and mitigation tools offered by extended detection and response (XDR) <br><br> For more information, see the following articles:<br>- [Incident response in the Microsoft Defender portal](/microsoft-365/security/defender/incidents-overview)<br>- [Investigate Microsoft Sentinel incidents in Security Copilot](sentinel-security-copilot.md) |
4544
|Microsoft Copilot in Microsoft Defender| When investigating incidents with Microsoft Sentinel integrated with Defender XDR, <br>- [Triage and investigate incidents with guided responses](/defender-xdr/security-copilot-m365d-guided-response)<br>- [Summarize device information](/defender-xdr/copilot-in-defender-device-summary)<br>- [Summarize identity information](/defender-xdr/security-copilot-defender-identity-summary) <br><br>Summarize the relevant threats impacting your environment, to prioritize resolving threats based on your exposure levels, or to find threat actors that might be targeting your industry by using Security Copilot in threat intelligence. For more information, see [Using Microsoft Security Copilot for threat intelligence](/defender/threat-intelligence/using-copilot-threat-intelligence-defender-xdr). |
@@ -53,7 +52,6 @@ This section covers the Microsoft Sentinel capabilities or integrations that are
5352
| Capability |Availability |Description |
5453
| ------------ | ----------- |----------- |
5554
| Advanced hunting using bookmarks | Azure portal only |Bookmarks aren't supported in the advanced hunting experience in the Microsoft Defender portal. In the Defender portal, they're supported in the **Microsoft Sentinel > Threat management > Hunting**. <br><br> For more information, see [Keep track of data during hunting with Microsoft Sentinel](/azure/sentinel/bookmarks). |
56-
| Attack disruption for SAP | Defender portal only with Defender XDR| This functionality is unavailable in the Azure portal. <br><br>For more information, see [Automatic attack disruption in the Microsoft Defender portal](/microsoft-365/security/defender/automatic-attack-disruption). |
5755
| Automation |Some automation procedures are available only in the Azure portal.<br><br>Other automation procedures are the same in the Defender and Azure portals, but differ in the Azure portal between workspaces that are onboarded to the Defender portal and workspaces that aren't. | <br><br>For more information, see [Automation with the unified security operations platform](automation.md#automation-with-the-unified-security-operations-platform). |
5856
| Data connectors: visibility of connectors used by the unified security operations platform | Azure portal only|In the Defender portal, after you onboard Microsoft Sentinel, the following data connectors that are part of the unified security operations platform aren't shown in the **Data connectors** page:<li>Microsoft Defender for Cloud Apps<li>Microsoft Defender for Endpoint<li>Microsoft Defender for Identity<li>Microsoft Defender for Office 365 (Preview)<li>Microsoft Defender XDR<li>Subscription-based Microsoft Defender for Cloud (Legacy)<li>Tenant-based Microsoft Defender for Cloud (Preview)<br><br>In the Azure portal, these data connectors are still listed with the installed data connectors in Microsoft Sentinel. |
5957
| Entities: Add entities to threat intelligence from incidents |Azure portal only |This functionality is unavailable in the Defender portal. <Br><br>For more information, see [Add entity to threat indicators](add-entity-to-threat-intelligence.md). |

articles/sentinel/sap/deployment-attack-disrupt.md

Lines changed: 0 additions & 51 deletions
This file was deleted.

articles/sentinel/sap/deployment-solution-configuration.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article shows you how to configure initial security content fo
44
author: batamig
55
ms.author: bagol
66
ms.topic: how-to
7-
ms.date: 09/15/2024
7+
ms.date: 12/11/2024
88
appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
@@ -83,6 +83,5 @@ For more information, see:
8383

8484
For more information, see:
8585

86-
- [Automatic attack disruption for SAP (Preview)](deployment-attack-disrupt.md)
8786
- [Monitor the health of your SAP system](../monitor-sap-system-health.md)
8887
- [Update Microsoft Sentinel's SAP data connector agent](update-sap-data-connector.md)

articles/sentinel/sap/preparing-sap.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,13 @@ The procedures in this article are typically performed by your **SAP BASIS** tea
3232

3333
To allow the SAP data connector to connect to your SAP system, you must create an SAP system role specifically for this purpose.
3434

35-
- **To include both log retrieval and [attack disruption response actions](https://aka.ms/attack-disrupt-defender)**, we recommend creating this role by loading role authorizations from the [**/MSFTSEN/SENTINEL_RESPONDER**](https://aka.ms/SAP_Sentinel_Responder_Role) file.
35+
We recommend creating this role by deploying the *NPLK900271* SAP change request (CR): [K900271.NPL](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/SAP/CR/K900271.NPL) | [R900271.NPL](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/SAP/CR/R900271.NPL)
3636

37-
- **To include log retrieval only**, we recommend creating this role by deploying the *NPLK900271* SAP change request (CR): [K900271.NPL](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/SAP/CR/K900271.NPL) | [R900271.NPL](https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/SAP/CR/R900271.NPL)
37+
Deploy the CRs on your SAP system as needed just as you'd deploy other CRs. We strongly recommend that deploying SAP CRs is done by an experienced SAP system administrator. For more information, see the [SAP documentation](https://help.sap.com/docs/ABAP_PLATFORM_NEW/4a368c163b08418890a406d413933ba7/e15d9acae75c11d2b451006094b9ea64.html?locale=en-US&version=LATEST).
3838

39-
Deploy the CRs on your SAP system as needed just as you'd deploy other CRs. We strongly recommend that deploying SAP CRs is done by an experienced SAP system administrator. For more information, see the [SAP documentation](https://help.sap.com/docs/ABAP_PLATFORM_NEW/4a368c163b08418890a406d413933ba7/e15d9acae75c11d2b451006094b9ea64.html?locale=en-US&version=LATEST).
40-
41-
Alternately, load the role authorizations from the [**MSFTSEN_SENTINEL_CONNECTOR**](https://aka.ms/SAP_Sentinel_Connector_Role) file, which includes all the basic permissions for the data connector to operate.
39+
Alternately, load the role authorizations from the [**MSFTSEN_SENTINEL_CONNECTOR**](https://aka.ms/SAP_Sentinel_Connector_Role) file, which includes all the basic permissions for the data connector to operate.
4240

43-
Experienced SAP administrators might choose to create the role manually and assign it the appropriate permissions. In such cases, create a role manually with the relevant authorizations required for the logs you want to ingest. For more information, see [Required ABAP authorizations](required-abap-authorizations.md). Examples in our documentation use the **/MSFTSEN/SENTINEL_RESPONDER** name.
41+
Experienced SAP administrators might choose to create the role manually and assign it the appropriate permissions. In such cases, create a role manually with the relevant authorizations required for the logs you want to ingest. For more information, see [Required ABAP authorizations](required-abap-authorizations.md). Examples in our documentation use the **/MSFTSEN/SENTINEL_RESPONDER** name.
4442

4543
When configuring the role, we recommend that you:
4644

articles/sentinel/sap/required-abap-authorizations.md

Lines changed: 5 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Understand the ABAP authorizations required if you want to manually
44
author: batamig
55
ms.author: bagol
66
ms.topic: how-to
7-
ms.date: 09/16/2024
7+
ms.date: 12/11/2024
88
appliesto:
99
- Microsoft Sentinel in the Azure portal
1010
- Microsoft Sentinel in the Microsoft Defender portal
@@ -15,16 +15,12 @@ ms.collection: usx-security
1515

1616
# Required ABAP authorizations
1717

18-
This article lists the ABAP authorizations required to ensure that the SAP user account used by Microsoft Sentinel's SAP data connector can correctly retrieve logs from the SAP systems and [run attack disruption response actions](/defender-xdr/automatic-attack-disruption).
18+
This article lists the ABAP authorizations required to ensure that the SAP user account used by Microsoft Sentinel's SAP data connector can correctly retrieve logs from the SAP systems.
1919

20-
The required authorizations are listed here by their purpose. You only need the authorizations that are listed for the kinds of logs you want to bring into Microsoft Sentinel and the attack disruption response actions you want to apply.
20+
The required authorizations are listed here by their purpose. You only need the authorizations that are listed for the kinds of logs you want to bring into Microsoft Sentinel.
2121

22-
> [!TIP]
23-
> To create a role with all the required authorizations, load the role authorizations from the [**/MSFTSEN/SENTINEL_RESPONDER**](https://aka.ms/SAP_Sentinel_Responder_Role) file.
24-
>
25-
> Alternately, to enable only log retrieval, without attack disruption response actions, deploy the SAP *NPLK900271* CR on the SAP system to create the **/MSFTSEN/SENTINEL_CONNECTOR** role, or load the role authorizations from the [**/MSFTSEN/SENTINEL_CONNECTOR**](https://aka.ms/SAP_Sentinel_Connector_Role) file.
26-
27-
If needed, you can [remove the user role and any optional CR installed on your ABAP system](stop-collection.md#remove-the-user-role-and-any-optional-cr-installed-on-your-abap-system).
22+
- To create a role with all the required authorizations, load the role authorizations from the [**/MSFTSEN/SENTINEL_RESPONDER**](https://aka.ms/SAP_Sentinel_Responder_Role) file.
23+
- If needed, you can [remove the user role and any optional CR installed on your ABAP system](stop-collection.md#remove-the-user-role-and-any-optional-cr-installed-on-your-abap-system).
2824

2925
## ABAP application log
3026

@@ -140,20 +136,6 @@ If needed, you can [remove the user role and any optional CR installed on your A
140136
| S_TABU_NAM | ACTVT | Display |
141137
| S_TABU_NAM | TABLE | T000 |
142138

143-
## Attack disruption response actions
144-
145-
<a name=attack-disrupt></a>
146-
147-
| Authorization object | Field | Value |
148-
| -------------------- | ----- | ----- |
149-
|S_RFC |RFC_TYPE |Function Module |
150-
|S_RFC |RFC_NAME |BAPI_USER_LOCK |
151-
|S_RFC |RFC_NAME |BAPI_USER_UNLOCK |
152-
|S_RFC |RFC_NAME |TH_DELETE_USER <br>In contrast to its name, this function doesn't delete users, but ends the active user session. |
153-
|S_USER_GRP |CLASS |* <br>We recommend replacing S_USER_GRP CLASS with the relevant classes in your organization that represent dialog users. |
154-
|S_USER_GRP |ACTVT |03 |
155-
|S_USER_GRP |ACTVT |05 |
156-
157139
## Configuration history
158140

159141
| Authorization object | Field | Value |

0 commit comments

Comments
 (0)