Skip to content

Commit ca70fad

Browse files
committed
final edits
1 parent a31ca22 commit ca70fad

File tree

5 files changed

+48
-46
lines changed

5 files changed

+48
-46
lines changed

articles/sentinel/sap/configure-snc.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To associate the certificate with a user account:
9696

9797
![Screenshot that shows how to create a new entry in the USERACLEXT table.](./media/configure-snc/usraclext-new-entry.png)
9898

99-
1. For **User**, enter the user's username. For **SNC Name**, enter the user's certificate subject name prefixed with **p:**. Select **Save**.
99+
1. For **User**, enter the user's username. For **SNC Name**, enter the user's certificate subject name prefixed with **p:**, and then select **Save**.
100100

101101
![Screenshot that shows how to create a new user in USERACLEXT table.](./media/configure-snc/usraclext-new-user.png)
102102

@@ -132,11 +132,11 @@ To map ABAP service provider users to external user IDs:
132132

133133
1. In **Determine Work Area: Entry**, select the **DN** ID type for **Work Area**.
134134

135-
1. Enter these details:
135+
1. Enter the following values:
136136

137-
- **External ID**: **CN=Sentinel**, **C=US**
138-
- **Seq. No**: **000**
139-
- **User**: **SENTINEL**
137+
- For **External ID**, enter **CN=Sentinel**, **C=US**.
138+
- For **Seq. No**, enter **000**.
139+
- For **User**, enter **SENTINEL**.
140140

141141
1. Select **Save**, and then select **Enter**.
142142

@@ -149,17 +149,17 @@ To map ABAP service provider users to external user IDs:
149149
150150
To set up the container:
151151

152-
1. Transfer the *libsapcrypto.so* and *sapgenpse* files to the target system where the container will be created.
152+
1. Transfer the *libsapcrypto.so* and *sapgenpse* files to the system where the container will be created.
153153

154-
1. Transfer the client certificate (both private and public keys) to the target system where the container will be created.
154+
1. Transfer the client certificate (both private and public keys) to the system where the container will be created.
155155

156156
The client certificate and key can be in *.p12*, *.pfx*, or Base64 *.crt* and *.key* format.
157157

158-
1. Transfer the server certificate (public key only) to the target system where the container will be created.
158+
1. Transfer the server certificate (public key only) to the system where the container will be created.
159159

160160
The server certificate must be in Base64 *.crt* format.
161161

162-
1. If the client certificate was issued by an enterprise certification authority, transfer the issuing CA and root CA certificates to the target system where the container will be created.
162+
1. If the client certificate was issued by an enterprise certification authority, transfer the issuing CA and root CA certificates to the system where the container will be created.
163163

164164
1. Get the kickstart script from the Microsoft Sentinel GitHub repository:
165165

@@ -190,7 +190,7 @@ To set up the container:
190190
--client-key <path to client certificate private key> \
191191
```
192192
193-
If the client certificate is in *.pfx* or *.p12* format:
193+
If the client certificate is in *.pfx* or *.p12* format, use these switches:
194194
195195
```bash
196196
--client-pfx <pfx filename>

articles/sentinel/sap/cross-workspace.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -35,18 +35,19 @@ Your organization's SAP team has technical knowledge that's critical to successf
3535

3636
There are two possible scenarios for SOC and SAP team collaboration, depending on your organization's needs:
3737

38-
Scenario 1: **SAP data and SOC data reside in separate workspaces**. Both teams can see the SAP data by using [cross-workspace queries](#scenario-1-sap-data-and-soc-data-is-in-separate-workspaces).
39-
Scenario 2: **SAP data is kept in the SOC workspace**. The SAP team can query the data by using [resource context queries](#scenario-2-sap-data-is-kept-in-the-soc-workspace).
38+
- Scenario 1: **SAP data and SOC data maintained in separate workspaces**. Both teams can see the SAP data by using [cross-workspace queries](#scenario-1-sap-data-and-soc-data-maintained-in-separate-workspaces).
4039

41-
## Scenario 1: SAP data and SOC data is in separate workspaces
40+
- Scenario 2: **SAP data kept only in the SOC workspace**. The SAP team can query the data by using [resource context queries](#scenario-2-sap-data-kept-only-in-the-soc-workspace).
4241

43-
In this scenario, the SAP team and the SOC team have separate Microsoft Sentinel workspaces.
42+
## Scenario 1: SAP data and SOC data maintained in separate workspaces
43+
44+
In this scenario, the SAP team and the SOC team have separate Microsoft Sentinel workspaces where team data is kept.
4445

4546
:::image type="content" source="media/cross-workspace/sap-cross-workspace-separate.png" alt-text="Diagram that shows working with the Microsoft Sentinel solution for SAP applications in separate workspaces for SAP and SOC data." border="false":::
4647

4748
When your organization [deploys the Microsoft Sentinel solution for SAP applications](deploy-sap-security-content.md#deploy-the-microsoft-sentinel-solution-for-sap-applications-from-the-content-hub), each team specifies its SAP workspace.
4849

49-
A common practice is to provide some or all SOC team members with the Sentinel Reader role on the SAP workspace.
50+
A common practice is to provide some or all SOC team members with the Sentinel Reader role for the SAP workspace.
5051

5152
Creating separate workspaces for the SAP and SOC data has these benefits:
5253

@@ -60,7 +61,7 @@ Creating separate workspaces for the SAP and SOC data has these benefits:
6061
- There's no additional charge for ingestion fees, because data is ingested only once into Microsoft Sentinel. However, each workspace has its own [pricing tier](../design-your-workspace-architecture.md#step-5-collecting-any-non-soc-data).
6162
- The SOC can see and investigate SAP incidents. If the SAP team faces an event that it can't explain by using existing data, the team can assign the incident to the SOC.
6263

63-
This table maps the access of data and features for the SAP and SOC teams in this scenario.
64+
The following table maps the access of data and features for the SAP and SOC teams in this scenario:
6465

6566
|Function |SOC team |SAP team |
6667
|---------|---------|---------|
@@ -70,11 +71,11 @@ This table maps the access of data and features for the SAP and SOC teams in thi
7071

7172
<sup>1</sup> The SOC team can see these functions in both workspaces. The SAP team can see these functions only in the SAP workspace.
7273

73-
## Scenario 2: SAP data is kept in the SOC workspace
74+
## Scenario 2: SAP data kept only in the SOC workspace
7475

7576
In this scenario, you want to keep all the data in one workspace and to apply access controls. You can do this by using Log Analytics in Azure Monitor to [manage access to data by resource](../resource-context-rbac.md). You can also associate SAP resources with an Azure resource ID by specifying the required `azure_resource_id` field in the [connector configuration section](reference-systemconfig.md#connector-configuration-section) on the data collector that you use to ingest data from the SAP system into Microsoft Sentinel.
7677

77-
:::image type="content" source="media/cross-workspace/sap-cross-workspace-combined.png" alt-text="Diagram that shows working with the Microsoft Sentinel solution for SAP applications by using the same workspace for the SAP and SOC data." border="false":::
78+
:::image type="content" source="media/cross-workspace/sap-cross-workspace-combined.png" alt-text="Diagram that shows how to work with the Microsoft Sentinel solution for SAP applications by using the same workspace for SAP and SOC data." border="false":::
7879

7980
After the data collector agent is configured with the correct resource ID, the SAP team can access the specific SAP data in the SOC workspace by using a resource-scoped query. The SAP team can't read any of the other, non-SAP data types.
8081

articles/sentinel/sap/deploy-sap-btp-solution.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Deploy Microsoft Sentinel Solution for SAP BTP
2+
title: Deploy Microsoft Sentinel solution for SAP BTP
33
description: Learn how to deploy the Microsoft Sentinel solution for SAP Business Technology Platform (BTP) system.
44
author: batamig
55
ms.author: bagol
@@ -9,12 +9,12 @@ ms.date: 03/30/2023
99
# customer intent: As an SAP admin, I want to know how to deploy the Microsoft Sentinel solution for SAP BTP so that I can plan a deployment.
1010
---
1111

12-
# Deploy the Microsoft Sentinel solution forSAP BTP
12+
# Deploy the Microsoft Sentinel solution for SAP BTP
1313

14-
This article describes how to deploy the Microsoft Sentinel solution forSAP Business Technology Platform (BTP) system. The Microsoft Sentinel solution forSAP BTP monitors and protects your SAP BTP system. It collects audit logs and activity logs from the BTP infrastructure and BTP-based apps, and then detects threats, suspicious activities, illegitimate activities, and more. [Read more about the solution](sap-btp-solution-overview.md).
14+
This article describes how to deploy the Microsoft Sentinel solution for SAP Business Technology Platform (BTP) system. The Microsoft Sentinel solution for SAP BTP monitors and protects your SAP BTP system. It collects audit logs and activity logs from the BTP infrastructure and BTP-based apps, and then detects threats, suspicious activities, illegitimate activities, and more. [Read more about the solution](sap-btp-solution-overview.md).
1515

1616
> [!IMPORTANT]
17-
> The Microsoft Sentinel solution forSAP BTP solution is currently in preview. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17+
> The Microsoft Sentinel solution for SAP BTP solution is currently in preview. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1818
1919
## Prerequisites
2020

@@ -64,12 +64,12 @@ To set up the BTP account and the solution:
6464

6565
1. Select **Create**.
6666

67-
:::image type="content" source="./media/deploy-sap-btp-solution/sap-btp-create-solution.png" alt-text="Screenshot that shows how to create the Microsoft Sentinel Solution for SAP BTP." lightbox="./media/deploy-sap-btp-solution/sap-btp-create-solution.png":::
67+
:::image type="content" source="./media/deploy-sap-btp-solution/sap-btp-create-solution.png" alt-text="Screenshot that shows how to create the Microsoft Sentinel solution for SAP BTP." lightbox="./media/deploy-sap-btp-solution/sap-btp-create-solution.png":::
6868

6969
1. Select the resource group and the Microsoft Sentinel workspace in which to deploy the solution.
7070
1. Select **Next** until you pass validation, and then select **Create**.
7171
1. When the solution deployment is finished, return to your Microsoft Sentinel workspace and select **Data connectors**.
72-
1. In the search bar, type *BTP*, and then select **SAP BTP (using Azure Function)**.
72+
1. In the search bar, enter **BTP**, and then select **SAP BTP (using Azure Function)**.
7373
1. Select **Open connector page**.
7474
1. On the connector page, make sure that you meet the required prerequisites and complete the configuration steps. In step 2 of the data connector configuration, specify the parameters that you defined in step 4 in this section.
7575

@@ -87,11 +87,11 @@ To set up the BTP account and the solution:
8787

8888
## Consider your account auditing configurations
8989

90-
Consider your global account and subaccount auditing configurations.
90+
The final step in the deployment process is to consider your global account and subaccount auditing configurations.
9191

9292
### Global account auditing configuration
9393

94-
When you enable audit log retrieval in the BTP cockpit for the global account: If the subaccount for which you want to entitle the Audit Log Management Service is under a directory, you must entitle the service at the directory level first. Only then can you can entitle the service at the subaccount level.
94+
When you enable audit log retrieval in the BTP cockpit for the global account: If the subaccount for which you want to entitle the Audit Log Management Service is under a directory, you must entitle the service at the directory level first. Only then can you entitle the service at the subaccount level.
9595

9696
### Subaccount auditing configuration
9797

@@ -101,7 +101,7 @@ The API documentation describes how to enable the audit log retrieval by using t
101101

102102
You also can retrieve the logs via the UI:
103103

104-
1. In your subaccount in Service Marketplace, create an instance of **Audit Log Management Service**.
104+
1. In your subaccount in SAP Service Marketplace, create an instance of **Audit Log Management Service**.
105105
1. In the new instance, create a service key.
106106
1. View the service key and retrieve the required parameters from step 4 of the configuration instructions in the data connector UI (**url**, **uaa.url**, **uaa.clientid**, and **uaa.clientsecret**).
107107

articles/sentinel/sap/deploy-sap-security-content.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -67,34 +67,35 @@ To deploy SAP solution security content:
6767

6868
1. To start the solution deployment wizard, select **Create**, and then enter the details of the Azure subscription and resource group.
6969

70-
1. For the **Deployment target workspace**, select the Log Analytics workspace (the one that Microsoft Sentinel uses) where you want to deploy the solution.
70+
1. For the **Deployment target workspace**, select the Log Analytics workspace (the one that Microsoft Sentinel uses) where you want to deploy the solution.<a id="multi-workspace"></a>
7171

72-
<a id="multi-workspace"></a>
72+
1. If you want to [work with the Microsoft Sentinel solution for SAP applications in multiple workspaces](cross-workspace.md) (preview), select **Some of the data is on a different workspace**, and then do the following steps:
7373

74-
1. If you want to [work with the Microsoft Sentinel solution for SAP applications across multiple workspaces](cross-workspace.md) (preview), select **Some of the data is on a different workspace**, and then do the following steps:
75-
1. Under **Configure the workspace where the SOC data resides in**, select the SOC subscription and workspace.
76-
1. Under **Configure the workspace where the SAP data resides in**, select the SAP subscription and workspace.
74+
1. Under **Configure the workspace where the SOC data resides in**, select the SOC subscription and workspace.
7775

78-
For example:
76+
1. Under **Configure the workspace where the SAP data resides in**, select the SAP subscription and workspace.
7977

80-
:::image type="content" source="./media/deploy-sap-security-content/sap-multi-workspace.png" alt-text="Screenshot that shows how to configure the Microsoft Sentinel solution for SAP applications to work across multiple workspaces.":::
78+
For example:
8179

82-
> [!Note]
83-
> If you want the SAP and SOC data to be kept on the same workspace with no additional access controls, do not select **Some of the data is on a different workspace**. If you want the SOC and SAP data to be kept on the same workspace, but to apply additional access controls, review [this scenario](cross-workspace.md#scenario-2-sap-data-is-kept-in-the-soc-workspace).
80+
:::image type="content" source="./media/deploy-sap-security-content/sap-multi-workspace.png" alt-text="Screenshot that shows how to configure the Microsoft Sentinel solution for SAP applications to work across multiple workspaces.":::
81+
82+
> [!NOTE]
83+
> If you want the SAP and SOC data to be kept on the same workspace with no additional access controls, do not select **Some of the data is on a different workspace**. If you want the SOC and SAP data to be kept on the same workspace, but to apply additional access controls, review [this scenario](cross-workspace.md#scenario-2-sap-data-is-kept-in-the-soc-workspace).
8484
8585
1. Select **Next** to cycle through the **Data Connectors**, **Analytics**, and **Workbooks** tabs, where you can learn about the components that are deployed with this solution.
8686

87-
For more information, see [Microsoft Sentinel solution for SAP applications: security content reference](sap-solution-security-content.md).
87+
For more information, see [Microsoft Sentinel solution for SAP applications: security content reference](sap-solution-security-content.md).
8888

8989
1. On the **Review + create tab** pane, wait for the **Validation Passed** message, and then select **Create** to deploy the solution.
9090

91-
> [!TIP]
92-
> You can also select **Download a template** for a link to deploy the solution as code.
91+
> [!TIP]
92+
> You can also select **Download a template** for a link to deploy the solution as code.
93+
94+
1. When deployment is finished, to display the newly deployed content:
9395

94-
1. When deployment is finished, to display the newly deployed content, go to:
96+
- For the [built-in SAP workbooks](sap-solution-security-content.md#built-in-workbooks), go to **Threat Management** > **Workbooks** > **My workbooks**.
9597

96-
- **Threat Management** > **Workbooks** > **My workbooks**, to find the [built-in SAP workbooks](sap-solution-security-content.md#built-in-workbooks).
97-
- **Configuration** > **Analytics** to find a series of [SAP-related analytics rules](sap-solution-security-content.md#built-in-analytics-rules).
98+
- For a series of [SAP-related analytics rules](sap-solution-security-content.md#built-in-analytics-rules), go to **Configuration** > **Analytics**.
9899

99100
1. In Microsoft Sentinel, go to the **Microsoft Sentinel for SAP** data connector to confirm the connection:
100101

@@ -104,7 +105,7 @@ To deploy SAP solution security content:
104105

105106
:::image type="content" source="./media/deploy-sap-security-content/sap-logs-in-sentinel.png" alt-text="Screenshot that shows the SAP ABAP logs in the Custom Logs area in Microsoft Sentinel." lightbox="media/deploy-sap-security-content/sap-logs-in-sentinel.png":::
106107

107-
For more information, see [Microsoft Sentinel solution for SAP® applications solution logs reference](sap-solution-log-reference.md).
108+
For more information, see [Microsoft Sentinel solution for SAP applications solution logs reference](sap-solution-log-reference.md).
108109

109110
## Troubleshoot
110111

articles/sentinel/sap/deployment-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ ms.author: bagol
66
ms.topic: conceptual
77
ms.date: 06/19/2023
88

9-
# customer intent: As a business user or decision maker, I want to get an overview of how to deploy the Microsoft Sentinel solution for SAP applications so that I know the extent of what information I need and how to access it.
9+
# customer intent: As a business user or decision maker, I want to get an overview of how to deploy the Microsoft Sentinel solution for SAP applications so that I know the scope of the information I need and how to access it.
1010
---
1111

1212
# Deploy Microsoft Sentinel solution for SAP applications
1313

14-
This article introduces you to the process of deploying the Microsoft Sentinel solution for SAP® applications. The full process is detailed in a set of articles linked under [Deployment milestones](#deployment-milestones).
14+
This article introduces you to the process of deploying the Microsoft Sentinel solution for SAP applications. The full process is detailed in a set of articles linked under [Deployment milestones](#deployment-milestones).
1515

1616
> [!TIP]
1717
> Learn how to [monitor the health and role of your SAP systems](../monitor-sap-system-health.md).
@@ -55,7 +55,7 @@ Follow your deployment journey through this series of articles, in which you lea
5555
5656
| Milestone | Article |
5757
| --------- | ------- |
58-
| **1. Deployment overview** | **YOU ARE HERE** |
58+
| **1. Deployment overview** | *YOU ARE HERE* |
5959
| **2. Plan your architecture** | Learn how to [work with the solution in multiple workspaces](cross-workspace.md) (preview) |
6060
| **3. Deployment prerequisites** | [Prerequisites for deploying the Microsoft Sentinel solution for SAP](prerequisites-for-deploying-sap-continuous-threat-monitoring.md) |
6161
| **4. Prepare your SAP environment** | [Deploy SAP change requests and configure authorization](preparing-sap.md) |

0 commit comments

Comments
 (0)