You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-capture-enable-through-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,12 @@ ms.custom: mode-ui
11
11
Azure [Event Hubs Capture][capture-overview] enables you to automatically deliver the streaming data in Event Hubs to an [Azure Blob storage](https://azure.microsoft.com/services/storage/blobs/) or [Azure Data Lake Storage Gen 2](https://azure.microsoft.com/services/data-lake-store/) account of your choice. You can configure capture settings using the [Azure portal](https://portal.azure.com) when creating an event hub or for an existing event hub. For conceptual information on this feature, see [Event Hubs Capture overview][capture-overview].
12
12
13
13
> [!IMPORTANT]
14
-
> Event Hubs doesn't support capturing events in a**premium**storage account.
14
+
> Event Hubs only supports **Premium** Storage account with**Block Blob**support.
15
15
16
16
17
17
## Enable Capture when you create an event hub
18
18
19
-
If you don't have an Event Hubs namespace to work with, create a **standard** tier namespace by following steps from the article: [Create an Event Hubs namespace](event-hubs-create.md#create-an-event-hubs-namespace). Make sure that you select **Standard**for the**pricing tier**. The basic tier doesn't support the Capture feature.
19
+
If you don't have an Event Hubs namespace to work with, create a namespace by following steps from the article: [Create an Event Hubs namespace](event-hubs-create.md#create-an-event-hubs-namespace). Make sure that you select **Standard**or higher**pricing tier**. The basic tier doesn't support the Capture feature.
20
20
21
21
To create an event hub within the namespace, follow these steps:
Copy file name to clipboardExpand all lines: articles/sentinel/notebooks-hunt.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -148,7 +148,7 @@ If you have multiple notebooks, make sure to select a default AML workspace to u
148
148
149
149
## Launch a notebook in your Azure Machine Learning workspace
150
150
151
-
After you create an Azure Machine Learning workspace, launch your notebook in that workspace from Microsoft Sentinel. Be aware that if you have private endpoints enabled in your Azure storage account, you can't launch notebooks in the Azure Machine Learning workspace from Microsoft Sentinel. You must copy the notebook template from Microsoft Sentinel and upload the notebook to the Azure Machine Learning studio.
151
+
After you create an Azure Machine Learning workspace, launch your notebook in that workspace from Microsoft Sentinel. Be aware that if you have private endpoints or restrictions on the public network access enabled in your Azure storage account, you can't launch notebooks in the Azure Machine Learning workspace from Microsoft Sentinel. You must copy the notebook template from Microsoft Sentinel and upload the notebook to the Azure Machine Learning studio.
152
152
153
153
To launch your Microsoft Sentinel notebook in your Azure Machine Learning workspace, complete the following steps.
Copy file name to clipboardExpand all lines: articles/sentinel/unified-connector-cef-device.md
+16Lines changed: 16 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -182,6 +182,22 @@ Set your security solution to send syslog messages in CEF format to the proxy ma
182
182
183
183
In ForgeRock, install and configure this Common Audit (CAUD) for Microsoft Sentinel per the documentation at https://github.com/javaservlets/SentinelAuditEventHandler. Next, in Azure, follow the steps to configure the CEF via AMA data connector.
184
184
185
+
## Fortinet
186
+
187
+
Set your Fortinet to send Syslog messages in CEF format to the proxy machine. Make sure you send the logs to port 514 TCP on the machine's IP address.<br/>
188
+
189
+
Copy the CLI commands below and:
190
+
191
+
- Replace \"server <ip address>\" with the Syslog agent's IP address.<br/>
192
+
- Set the \"<facility_name>\" to use the facility you configured in the Syslog agent (by default, the agent sets this to local4).<br/>
193
+
- Set the Syslog port to 514, the port your agent uses.<br/>
194
+
- To enable CEF format in early FortiOS versions, you may need to run the command \"set csv disable\".<br/>For more information, go to the [Fortinet Document Library](https://aka.ms/asi-syslog-fortinet-fortinetdocumentlibrary), choose your version, and use the \"Handbook\" and \"Log Message Reference\" PDFs.<br/>
195
+
196
+
[Learn more >](https://aka.ms/CEF-Fortinet)
197
+
198
+
Set up the connection using the CLI to run the following commands:
199
+
`config log syslogd setting/n set status enable/nset format cef/nset port 514/nset server <ip_address_of_Receiver>/nend`
200
+
185
201
## iboss
186
202
187
203
Set your Threat Console to send syslog messages in CEF format to your Azure workspace. Make note of your **Workspace ID** and **Primary Key** within your Log Analytics workspace. Select the workspace from the Log Analytics workspaces menu in the Azure portal. Then select **Agents management** in the **Settings** section.
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-troubleshooting-guide.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ To troubleshoot:
20
20
- Try using the Web Socket transport option, which connects using port 443. For details, see [configure the transport](https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/servicebus/Azure.Messaging.ServiceBus/samples/Sample13_AdvancedConfiguration.md#configuring-the-transport).
21
21
- See if your network is blocking specific IP addresses. For details, see [What IP addresses do I need to allow?](/azure/service-bus-messaging/service-bus-faq#what-ip-addresses-do-i-need-to-add-to-allowlist-)
22
22
- If applicable, verify the proxy configuration. For details, see: [Configuring the transport](https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/servicebus/Azure.Messaging.ServiceBus/samples/Sample13_AdvancedConfiguration.md#configuring-the-transport)
23
-
- For more information about troubleshooting network connectivity, see: [Connectivity, certificate, or timeout issues][#connectivity-certificate-or-timeout-issues].
23
+
- For more information about troubleshooting network connectivity, see: [Connectivity, certificate, or timeout issues](#connectivity-certificate-or-timeout-issues).
24
24
25
25
### Secure socket layer (SSL) handshake failures
26
26
This error can occur when an intercepting proxy is used. To verify, We recommend that you test the application in the host environment with the proxy disabled.
0 commit comments