Skip to content

Commit c912279

Browse files
committed
fixes to address warnings
1 parent f7d59c6 commit c912279

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

articles/sentinel/sap/configure-snc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ This section explains how to import a certificate so that it's trusted by your A
153153
--client-pfx <pfx filename>
154154
--client-pfx-passwd <password>
155155
```
156-
# If client certificate issued by enterprise CA, add the switch for **each** CA in the trust chain
156+
If client certificate issued by enterprise CA, add the switch for **each** CA in the trust chain
157157
```bash
158158
--cacert <path to ca certificate> #
159159
```

articles/sentinel/sap/deploy-data-connector-agent-container.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Deployment of the SAP continuous threat monitoring solution is divided into the
3939

4040
For the Continuous Threat Monitoring solution for SAP to operate correctly, data must first be ingested from SAP system into Microsoft Sentinel. To accomplish this, you need to deploy the Continuous Threat Monitoring solution for SAP data connector agent.
4141

42-
The data connector agent runs as a container on a Linux virtual machine (VM). This VM can be hosted either in Azure, in a third-party cloud, or on-premises. The recommended way for you to install and configure this container is by using a *kickstart* script, however you can choose do deploy the container [manually](#deploy-the-sap-data-connector-manually)
42+
The data connector agent runs as a container on a Linux virtual machine (VM). This VM can be hosted either in Azure, in a third-party cloud, or on-premises. The recommended way for you to install and configure this container is by using a *kickstart* script, however you can choose do deploy the container [manually](#tab/deploy-manually)
4343

4444
The agent connects to your SAP system to pull logs and other data from it, then sends those logs to your Microsoft Sentinel. To do this, the agent has to authenticate to your SAP system - that's why you created a user and a role for the agent in your SAP system in the previous step.
4545

@@ -287,7 +287,7 @@ If not, then your SAP configuration and authentication secrets can and should be
287287
docker create -d --restart unless-stopped -v /opt/sapcon/$sid/:/sapcon-app/sapcon/config/system --name sapcon-$sid sapcon
288288
````
289289
290-
1. Run the following command (replacing <*SID*> with the name of the SAP instance and <sdkfilename> with full filename of the SAP NetWeaver SDK) to copy the SDK into the container.
290+
1. Run the following command (replacing <*SID*> with the name of the SAP instance and <*sdkfilename*> with full filename of the SAP NetWeaver SDK) to copy the SDK into the container.
291291
292292
````bash
293293
sdkfile=<sdkfilename>

articles/sentinel/sap/prerequisites-for-deploying-sap-continuous-threat-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To successfully deploy the SAP Continuous Threat Monitoring solution, you must m
5252
| **System architecture** | The data connector component of the SAP solution is deployed as a Docker container, and each SAP client requires its own container instance.<br>The container host can be either a physical machine or a virtual machine, can be located either on-premises or in any cloud. <br>The VM hosting the container ***does not*** have to be located in the same Azure subscription as your Microsoft Sentinel workspace, or even in the same Azure AD tenant. |
5353
| **Virtual machine sizing recommendations** | **Minimum specification**, such as for a lab environment:<br>*Standard_B2s* VM, with:<br>- 2 cores<br>- 4 GB RAM<br><br>**Standard connector** (default):<br>*Standard_D2as_v5* VM or<br>*Standard_D2_v5* VM, with: <br>- 2 cores<br>- 8 GB RAM<br><br>**Multiple connectors**:<br>*Standard_D4as_v5* or<br>*Standard_D4_v5* VM, with: <br>- 4 cores<br>- 16 GB RAM |
5454
| **Administrative privileges** | Administrative privileges (root) are required on the container host machine. |
55-
| **Supported Linux versions** | SAP Continuous Threat Monitoring data collection agent has been tested with the following Linux distributions:<br>- Ubuntu 18.04 or higher<br>- SLES version 15 or higher<br>- RHEL version 7.7 or higher<br><br>If you have a different operating system, you may need to [deploy and configure the container manually](deploy-data-connector-agent-container.md#deploy-the-sap-data-connector-manually) instead of using the kickstart script. |
55+
| **Supported Linux versions** | SAP Continuous Threat Monitoring data collection agent has been tested with the following Linux distributions:<br>- Ubuntu 18.04 or higher<br>- SLES version 15 or higher<br>- RHEL version 7.7 or higher<br><br>If you have a different operating system, you may need to [deploy and configure the container manually](deploy-data-connector-agent-container.md#tab/deploy-manually) instead of using the kickstart script. |
5656
| **Network connectivity** | Ensure that the container host has access to: <br>- Microsoft Sentinel <br>- Azure key vault (in deployment scenario where Azure key vault is used to store secrets<br>- SAP system via the following TCP ports: *32xx*, *5xx13*, *33xx*, *48xx* (when SNC is used), where *xx* is the SAP instance number. |
5757
| **Software utilities** | The [SAP data connector deployment script](reference-kickstart.md) installs the following required software on the container host VM (depending on the Linux distribution used, the list may vary slightly): <br>- [Unzip](http://infozip.sourceforge.net/UnZip.html)<br>- [NetCat](https://sectools.org/tool/netcat/)<br>- [Docker](https://www.docker.com/)<br>- [jq](https://stedolan.github.io/jq/)<br>- [curl](https://curl.se/)<br><br>
5858

0 commit comments

Comments
 (0)