You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/configure-snc.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ To associate the certificate with a user account:
96
96
97
97

98
98
99
-
1. For **User**, enter the user's username. For **SNC Name**, enter the user's certificate subject name prefixed with **p:**. Select**Save**.
99
+
1. For **User**, enter the user's username. For **SNC Name**, enter the user's certificate subject name prefixed with **p:**, and then select**Save**.
100
100
101
101

102
102
@@ -132,11 +132,11 @@ To map ABAP service provider users to external user IDs:
132
132
133
133
1. In **Determine Work Area: Entry**, select the **DN** ID type for **Work Area**.
134
134
135
-
1. Enter these details:
135
+
1. Enter the following values:
136
136
137
-
-**External ID**: **CN=Sentinel**, **C=US**
138
-
-**Seq. No**: **000**
139
-
-**User**: **SENTINEL**
137
+
-For **External ID**, enter **CN=Sentinel**, **C=US**.
138
+
-For **Seq. No**, enter **000**.
139
+
-For **User**, enter **SENTINEL**.
140
140
141
141
1. Select **Save**, and then select **Enter**.
142
142
@@ -149,17 +149,17 @@ To map ABAP service provider users to external user IDs:
149
149
150
150
To set up the container:
151
151
152
-
1. Transfer the *libsapcrypto.so* and *sapgenpse* files to the target system where the container will be created.
152
+
1. Transfer the *libsapcrypto.so* and *sapgenpse* files to the system where the container will be created.
153
153
154
-
1. Transfer the client certificate (both private and public keys) to the target system where the container will be created.
154
+
1. Transfer the client certificate (both private and public keys) to the system where the container will be created.
155
155
156
156
The client certificate and key can be in *.p12*, *.pfx*, or Base64 *.crt* and *.key* format.
157
157
158
-
1. Transfer the server certificate (public key only) to the target system where the container will be created.
158
+
1. Transfer the server certificate (public key only) to the system where the container will be created.
159
159
160
160
The server certificate must be in Base64 *.crt* format.
161
161
162
-
1. If the client certificate was issued by an enterprise certification authority, transfer the issuing CA and root CA certificates to the target system where the container will be created.
162
+
1. If the client certificate was issued by an enterprise certification authority, transfer the issuing CA and root CA certificates to the system where the container will be created.
163
163
164
164
1. Get the kickstart script from the Microsoft Sentinel GitHub repository:
165
165
@@ -190,7 +190,7 @@ To set up the container:
190
190
--client-key <path to client certificate private key> \
191
191
```
192
192
193
-
If the client certificate is in *.pfx* or *.p12* format:
193
+
If the client certificate is in *.pfx* or *.p12* format, use these switches:
Copy file name to clipboardExpand all lines: articles/sentinel/sap/cross-workspace.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,18 +35,19 @@ Your organization's SAP team has technical knowledge that's critical to successf
35
35
36
36
There are two possible scenarios for SOC and SAP team collaboration, depending on your organization's needs:
37
37
38
-
Scenario 1: **SAP data and SOC data reside in separate workspaces**. Both teams can see the SAP data by using [cross-workspace queries](#scenario-1-sap-data-and-soc-data-is-in-separate-workspaces).
39
-
Scenario 2: **SAP data is kept in the SOC workspace**. The SAP team can query the data by using [resource context queries](#scenario-2-sap-data-is-kept-in-the-soc-workspace).
38
+
- Scenario 1: **SAP data and SOC data maintained in separate workspaces**. Both teams can see the SAP data by using [cross-workspace queries](#scenario-1-sap-data-and-soc-data-maintained-in-separate-workspaces).
40
39
41
-
##Scenario 1: SAP data and SOC data is in separate workspaces
40
+
- Scenario 2: **SAP data kept only in the SOC workspace**. The SAP team can query the data by using [resource context queries](#scenario-2-sap-data-kept-only-in-the-soc-workspace).
42
41
43
-
In this scenario, the SAP team and the SOC team have separate Microsoft Sentinel workspaces.
42
+
## Scenario 1: SAP data and SOC data maintained in separate workspaces
43
+
44
+
In this scenario, the SAP team and the SOC team have separate Microsoft Sentinel workspaces where team data is kept.
44
45
45
46
:::image type="content" source="media/cross-workspace/sap-cross-workspace-separate.png" alt-text="Diagram that shows working with the Microsoft Sentinel solution for SAP applications in separate workspaces for SAP and SOC data." border="false":::
46
47
47
48
When your organization [deploys the Microsoft Sentinel solution for SAP applications](deploy-sap-security-content.md#deploy-the-microsoft-sentinel-solution-for-sap-applications-from-the-content-hub), each team specifies its SAP workspace.
48
49
49
-
A common practice is to provide some or all SOC team members with the Sentinel Reader role on the SAP workspace.
50
+
A common practice is to provide some or all SOC team members with the Sentinel Reader role for the SAP workspace.
50
51
51
52
Creating separate workspaces for the SAP and SOC data has these benefits:
52
53
@@ -60,7 +61,7 @@ Creating separate workspaces for the SAP and SOC data has these benefits:
60
61
- There's no additional charge for ingestion fees, because data is ingested only once into Microsoft Sentinel. However, each workspace has its own [pricing tier](../design-your-workspace-architecture.md#step-5-collecting-any-non-soc-data).
61
62
- The SOC can see and investigate SAP incidents. If the SAP team faces an event that it can't explain by using existing data, the team can assign the incident to the SOC.
62
63
63
-
This table maps the access of data and features for the SAP and SOC teams in this scenario.
64
+
The following table maps the access of data and features for the SAP and SOC teams in this scenario:
64
65
65
66
|Function |SOC team |SAP team |
66
67
|---------|---------|---------|
@@ -70,11 +71,11 @@ This table maps the access of data and features for the SAP and SOC teams in thi
70
71
71
72
<sup>1</sup> The SOC team can see these functions in both workspaces. The SAP team can see these functions only in the SAP workspace.
72
73
73
-
## Scenario 2: SAP data is kept in the SOC workspace
74
+
## Scenario 2: SAP data kept only in the SOC workspace
74
75
75
76
In this scenario, you want to keep all the data in one workspace and to apply access controls. You can do this by using Log Analytics in Azure Monitor to [manage access to data by resource](../resource-context-rbac.md). You can also associate SAP resources with an Azure resource ID by specifying the required `azure_resource_id` field in the [connector configuration section](reference-systemconfig.md#connector-configuration-section) on the data collector that you use to ingest data from the SAP system into Microsoft Sentinel.
76
77
77
-
:::image type="content" source="media/cross-workspace/sap-cross-workspace-combined.png" alt-text="Diagram that shows working with the Microsoft Sentinel solution for SAP applications by using the same workspace for the SAP and SOC data." border="false":::
78
+
:::image type="content" source="media/cross-workspace/sap-cross-workspace-combined.png" alt-text="Diagram that shows how to work with the Microsoft Sentinel solution for SAP applications by using the same workspace for SAP and SOC data." border="false":::
78
79
79
80
After the data collector agent is configured with the correct resource ID, the SAP team can access the specific SAP data in the SOC workspace by using a resource-scoped query. The SAP team can't read any of the other, non-SAP data types.
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-sap-btp-solution.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Deploy Microsoft Sentinel Solution for SAP BTP
2
+
title: Deploy Microsoft Sentinel solution for SAP BTP
3
3
description: Learn how to deploy the Microsoft Sentinel solution for SAP Business Technology Platform (BTP) system.
4
4
author: batamig
5
5
ms.author: bagol
@@ -9,12 +9,12 @@ ms.date: 03/30/2023
9
9
# customer intent: As an SAP admin, I want to know how to deploy the Microsoft Sentinel solution for SAP BTP so that I can plan a deployment.
10
10
---
11
11
12
-
# Deploy the Microsoft Sentinel solution forSAP BTP
12
+
# Deploy the Microsoft Sentinel solution for SAP BTP
13
13
14
-
This article describes how to deploy the Microsoft Sentinel solution forSAP Business Technology Platform (BTP) system. The Microsoft Sentinel solution forSAP BTP monitors and protects your SAP BTP system. It collects audit logs and activity logs from the BTP infrastructure and BTP-based apps, and then detects threats, suspicious activities, illegitimate activities, and more. [Read more about the solution](sap-btp-solution-overview.md).
14
+
This article describes how to deploy the Microsoft Sentinel solution for SAP Business Technology Platform (BTP) system. The Microsoft Sentinel solution for SAP BTP monitors and protects your SAP BTP system. It collects audit logs and activity logs from the BTP infrastructure and BTP-based apps, and then detects threats, suspicious activities, illegitimate activities, and more. [Read more about the solution](sap-btp-solution-overview.md).
15
15
16
16
> [!IMPORTANT]
17
-
> The Microsoft Sentinel solution forSAP BTP solution is currently in preview. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
> The Microsoft Sentinel solution for SAP BTP solution is currently in preview. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
18
19
19
## Prerequisites
20
20
@@ -64,12 +64,12 @@ To set up the BTP account and the solution:
64
64
65
65
1. Select **Create**.
66
66
67
-
:::image type="content" source="./media/deploy-sap-btp-solution/sap-btp-create-solution.png" alt-text="Screenshot that shows how to create the Microsoft Sentinel Solution for SAP BTP." lightbox="./media/deploy-sap-btp-solution/sap-btp-create-solution.png":::
67
+
:::image type="content" source="./media/deploy-sap-btp-solution/sap-btp-create-solution.png" alt-text="Screenshot that shows how to create the Microsoft Sentinel solution for SAP BTP." lightbox="./media/deploy-sap-btp-solution/sap-btp-create-solution.png":::
68
68
69
69
1. Select the resource group and the Microsoft Sentinel workspace in which to deploy the solution.
70
70
1. Select **Next** until you pass validation, and then select **Create**.
71
71
1. When the solution deployment is finished, return to your Microsoft Sentinel workspace and select **Data connectors**.
72
-
1. In the search bar, type *BTP*, and then select **SAP BTP (using Azure Function)**.
72
+
1. In the search bar, enter **BTP**, and then select **SAP BTP (using Azure Function)**.
73
73
1. Select **Open connector page**.
74
74
1. On the connector page, make sure that you meet the required prerequisites and complete the configuration steps. In step 2 of the data connector configuration, specify the parameters that you defined in step 4 in this section.
75
75
@@ -87,11 +87,11 @@ To set up the BTP account and the solution:
87
87
88
88
## Consider your account auditing configurations
89
89
90
-
Consider your global account and subaccount auditing configurations.
90
+
The final step in the deployment process is to consider your global account and subaccount auditing configurations.
91
91
92
92
### Global account auditing configuration
93
93
94
-
When you enable audit log retrieval in the BTP cockpit for the global account: If the subaccount for which you want to entitle the Audit Log Management Service is under a directory, you must entitle the service at the directory level first. Only then can you can entitle the service at the subaccount level.
94
+
When you enable audit log retrieval in the BTP cockpit for the global account: If the subaccount for which you want to entitle the Audit Log Management Service is under a directory, you must entitle the service at the directory level first. Only then can you entitle the service at the subaccount level.
95
95
96
96
### Subaccount auditing configuration
97
97
@@ -101,7 +101,7 @@ The API documentation describes how to enable the audit log retrieval by using t
101
101
102
102
You also can retrieve the logs via the UI:
103
103
104
-
1. In your subaccount in Service Marketplace, create an instance of **Audit Log Management Service**.
104
+
1. In your subaccount in SAP Service Marketplace, create an instance of **Audit Log Management Service**.
105
105
1. In the new instance, create a service key.
106
106
1. View the service key and retrieve the required parameters from step 4 of the configuration instructions in the data connector UI (**url**, **uaa.url**, **uaa.clientid**, and **uaa.clientsecret**).
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-sap-security-content.md
+17-16Lines changed: 17 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,34 +67,35 @@ To deploy SAP solution security content:
67
67
68
68
1. To start the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription and resource group.
69
69
70
-
1. For the **Deployment target workspace**, select the Log Analytics workspace (the one that Microsoft Sentinel uses) where you want to deploy the solution.
70
+
1. For the **Deployment target workspace**, select the Log Analytics workspace (the one that Microsoft Sentinel uses) where you want to deploy the solution.<aid="multi-workspace"></a>
71
71
72
-
<aid="multi-workspace"></a>
72
+
1. If you want to [work with the Microsoft Sentinel solution for SAP applications in multiple workspaces](cross-workspace.md) (preview), select **Some of the data is on a different workspace**, and then do the following steps:
73
73
74
-
1. If you want to [work with the Microsoft Sentinel solution for SAP applications across multiple workspaces](cross-workspace.md) (preview), select **Some of the data is on a different workspace**, and then do the following steps:
75
-
1. Under **Configure the workspace where the SOC data resides in**, select the SOC subscription and workspace.
76
-
1. Under **Configure the workspace where the SAP data resides in**, select the SAP subscription and workspace.
74
+
1. Under **Configure the workspace where the SOC data resides in**, select the SOC subscription and workspace.
77
75
78
-
For example:
76
+
1. Under **Configure the workspace where the SAP data resides in**, select the SAP subscription and workspace.
79
77
80
-
:::image type="content" source="./media/deploy-sap-security-content/sap-multi-workspace.png" alt-text="Screenshot that shows how to configure the Microsoft Sentinel solution for SAP applications to work across multiple workspaces.":::
78
+
For example:
81
79
82
-
> [!Note]
83
-
> If you want the SAP and SOC data to be kept on the same workspace with no additional access controls, do not select **Some of the data is on a different workspace**. If you want the SOC and SAP data to be kept on the same workspace, but to apply additional access controls, review [this scenario](cross-workspace.md#scenario-2-sap-data-is-kept-in-the-soc-workspace).
80
+
:::image type="content" source="./media/deploy-sap-security-content/sap-multi-workspace.png" alt-text="Screenshot that shows how to configure the Microsoft Sentinel solution for SAP applications to work across multiple workspaces.":::
81
+
82
+
> [!NOTE]
83
+
> If you want the SAP and SOC data to be kept on the same workspace with no additional access controls, do not select **Some of the data is on a different workspace**. If you want the SOC and SAP data to be kept on the same workspace, but to apply additional access controls, review [this scenario](cross-workspace.md#scenario-2-sap-data-is-kept-in-the-soc-workspace).
84
84
85
85
1. Select **Next** to cycle through the **Data Connectors**, **Analytics**, and **Workbooks** tabs, where you can learn about the components that are deployed with this solution.
86
86
87
-
For more information, see [Microsoft Sentinel solution for SAP applications: security content reference](sap-solution-security-content.md).
87
+
For more information, see [Microsoft Sentinel solution for SAP applications: security content reference](sap-solution-security-content.md).
88
88
89
89
1. On the **Review + create tab** pane, wait for the **Validation Passed** message, and then select **Create** to deploy the solution.
90
90
91
-
> [!TIP]
92
-
> You can also select **Download a template** for a link to deploy the solution as code.
91
+
> [!TIP]
92
+
> You can also select **Download a template** for a link to deploy the solution as code.
93
+
94
+
1. When deployment is finished, to display the newly deployed content:
93
95
94
-
1. When deployment is finished, to display the newly deployed content, go to:
96
+
- For the [built-in SAP workbooks](sap-solution-security-content.md#built-in-workbooks), go to**Threat Management** > **Workbooks** > **My workbooks**.
95
97
96
-
-**Threat Management** > **Workbooks** > **My workbooks**, to find the [built-in SAP workbooks](sap-solution-security-content.md#built-in-workbooks).
97
-
-**Configuration** > **Analytics** to find a series of [SAP-related analytics rules](sap-solution-security-content.md#built-in-analytics-rules).
98
+
- For a series of [SAP-related analytics rules](sap-solution-security-content.md#built-in-analytics-rules), go to **Configuration** > **Analytics**.
98
99
99
100
1. In Microsoft Sentinel, go to the **Microsoft Sentinel for SAP** data connector to confirm the connection:
100
101
@@ -104,7 +105,7 @@ To deploy SAP solution security content:
104
105
105
106
:::image type="content" source="./media/deploy-sap-security-content/sap-logs-in-sentinel.png" alt-text="Screenshot that shows the SAP ABAP logs in the Custom Logs area in Microsoft Sentinel." lightbox="media/deploy-sap-security-content/sap-logs-in-sentinel.png":::
106
107
107
-
For more information, see [Microsoft Sentinel solution for SAP® applications solution logs reference](sap-solution-log-reference.md).
108
+
For more information, see [Microsoft Sentinel solution for SAP applications solution logs reference](sap-solution-log-reference.md).
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deployment-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ ms.author: bagol
6
6
ms.topic: conceptual
7
7
ms.date: 06/19/2023
8
8
9
-
# customer intent: As a business user or decision maker, I want to get an overview of how to deploy the Microsoft Sentinel solution for SAP applications so that I know the extent of what information I need and how to access it.
9
+
# customer intent: As a business user or decision maker, I want to get an overview of how to deploy the Microsoft Sentinel solution for SAP applications so that I know the scope of the information I need and how to access it.
10
10
---
11
11
12
12
# Deploy Microsoft Sentinel solution for SAP applications
13
13
14
-
This article introduces you to the process of deploying the Microsoft Sentinel solution for SAP® applications. The full process is detailed in a set of articles linked under [Deployment milestones](#deployment-milestones).
14
+
This article introduces you to the process of deploying the Microsoft Sentinel solution for SAP applications. The full process is detailed in a set of articles linked under [Deployment milestones](#deployment-milestones).
15
15
16
16
> [!TIP]
17
17
> Learn how to [monitor the health and role of your SAP systems](../monitor-sap-system-health.md).
@@ -55,7 +55,7 @@ Follow your deployment journey through this series of articles, in which you lea
55
55
56
56
| Milestone | Article |
57
57
| --------- | ------- |
58
-
|**1. Deployment overview**|**YOU ARE HERE**|
58
+
|**1. Deployment overview**|*YOU ARE HERE*|
59
59
|**2. Plan your architecture**| Learn how to [work with the solution in multiple workspaces](cross-workspace.md) (preview) |
60
60
|**3. Deployment prerequisites**|[Prerequisites for deploying the Microsoft Sentinel solution for SAP](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)|
61
61
|**4. Prepare your SAP environment**|[Deploy SAP change requests and configure authorization](preparing-sap.md)|
0 commit comments