Skip to content

Commit cff8393

Browse files
authored
Merge pull request #271203 from batamig/sap-attack-disrupt-imp
Sap attack disrupt imp
2 parents 12d7ffe + 8a11a48 commit cff8393

File tree

6 files changed

+181
-91
lines changed

6 files changed

+181
-91
lines changed

articles/sentinel/sap/deploy-data-connector-agent-container.md

Lines changed: 38 additions & 32 deletions
Large diffs are not rendered by default.

articles/sentinel/sap/deployment-attack-disrupt.md

Lines changed: 18 additions & 58 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,13 @@ title: Automatic attack disruption for SAP | Microsoft Sentinel
33
description: Learn about deploying automatic attack disruption for SAP with the unified security operations platform.
44
author: batamig
55
ms.author: bagol
6-
ms.topic: how-to
7-
ms.date: 04/01/2024
6+
ms.topic: concept
7+
ms.date: 04/07/2024
88
appliesto:
9-
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
1011
ms.collection: usx-security
11-
#customerIntent: As a security engineer, I want to use automatic attack disruption for SAP in the Microsoft Defender portal.
12+
#customerIntent: As a security engineer, I want to deploy automatic attack disruption for SAP with the unified security operations platform.
1213
---
1314

1415
# Automatic attack disruption for SAP (Preview)
@@ -17,70 +18,29 @@ Microsoft Defender XDR correlates millions of individual signals to identify act
1718

1819
When you add a new SAP system to Microsoft Sentinel, your default configuration includes attack disruption functionality in the unified SOC platform. This article describes how to ensure that your SAP system is ready to support automatic attack disruption for SAP in the Microsoft Defender portal.
1920

20-
For more information, see [Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption).
21-
2221
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
2322

24-
## Attack disruption with the unified security operations platform
25-
26-
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant role is applied. However, attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
27-
28-
To use attack disruption for SAP, make sure that you configured the integration between Microsoft Sentinel and Microsoft Defender XDR. For more information, see [Connect Microsoft Sentinel to Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-sentinel-onboard) and [Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md).
23+
## Attack disruption for SAP and the unified security operations platform
2924

30-
## Required SAP data connector agent version and role assignments
25+
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant roles are applied in Azure and your SAP system. However, automatic attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
3126

32-
Attack disruption for SAP requires that you have:
33-
34-
- A Microsoft Sentinel SAP data connector agent, version 90847355 or higher.
35-
- The identity of your data connector agent VM must be assigned to the **Microsoft Sentinel Business Applications Agent Operator** Azure role.
36-
- The **/MSFTSEN/SENTINEL_RESPONDER** SAP role, applied to your SAP system and assigned to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
37-
38-
**To use attack disruption for SAP**, deploy a new agent, or update your current agent to the latest version. For more information, see:
39-
40-
- [Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md)
41-
- [Update Microsoft Sentinel's SAP data connector agent](update-sap-data-connector.md)
42-
43-
**To verify your current agent version**, run the following query from the Microsoft Sentinel **Logs** page:
44-
45-
```Kusto
46-
SAP_HeartBeat_CL
47-
| where sap_client_category_s !contains "AH"
48-
| summarize arg_max(TimeGenerated, agent_ver_s), make_set(system_id_s) by agent_id_g
49-
| project
50-
TimeGenerated,
51-
SAP_Data_Connector_Agent_guid = agent_id_g,
52-
Connected_SAP_Systems_Ids = set_system_id_s,
53-
Current_Agent_Version = agent_ver_s
54-
```
55-
56-
If the identity of your data connector agent VM isn't yet assigned to the **Microsoft Sentinel Business Applications Agent Operator** role as part of the deployment process, assign the role manually. For more information, see [Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md#role).
57-
58-
## Apply and assign the /MSFTSEN/SENTINEL_RESPONDER SAP role to your SAP system
27+
For more information, see [Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption).
5928

60-
Attack disruption is supported by the new **/MSFTSEN/SENTINEL_RESPONDER** SAP role, which you must apply to your SAP system and assign to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
29+
## Minimum agent version and required roles
6130

62-
1. Upload role definitions from the [/MSFTSEN/SENTINEL_RESPONDER](https://aka.ms/SAP_Sentinel_Responder_Role) file in GitHub.
31+
Automatic attack disruption for SAP requires:
6332

64-
1. Assign the **/MSFTSEN/SENTINEL_RESPONDER** role to the SAP user account used by Microsoft Sentinel's SAP data connector agent. For more information, see [Deploy SAP Change Requests and configure authorization](preparing-sap.md).
33+
- A data connector agent version 90847355 or higher.
34+
- The identity of your data connector agent VM must be assigned to the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** Azure roles.
35+
- The **/MSFTSEN/SENTINEL_RESPONDER** SAP role must be applied to your SAP system and assigned to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
6536

66-
Alternately, manually assign the following authorizations to the current role already assigned to the SAP user account used by Microsoft Sentinel's SAP data connector. These authorizations are included in the **/MSFTSEN/SENTINEL_RESPONDER** SAP role specifically for attack disruption response actions.
37+
To use attack disruption for SAP, deploy a new agent, or update your current agent to the latest version. Make sure to assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** Azure roles and the **/MSFTSEN/SENTINEL_RESPONDER** SAP role as required.
6738

68-
| Authorization object | Field | Value |
69-
| -------------------- | ----- | ----- |
70-
|S_RFC |RFC_TYPE |Function Module |
71-
|S_RFC |RFC_NAME |BAPI_USER_LOCK |
72-
|S_RFC |RFC_NAME |BAPI_USER_UNLOCK |
73-
|S_RFC |RFC_NAME |TH_DELETE_USER <br>In contrast to its name, this function doesn't delete users, but ends the active user session. |
74-
|S_USER_GRP |CLASS |* <br>We recommend replacing S_USER_GRP CLASS with the relevant classes in your organization that represent dialog users. |
75-
|S_USER_GRP |ACTVT |03 |
76-
|S_USER_GRP |ACTVT |05 |
39+
For more information, see:
7740

78-
For more information, see [Required ABAP authorizations](preparing-sap.md#required-abap-authorizations).
41+
- [Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md)
42+
- [Update Microsoft Sentinel's SAP data connector agent](update-sap-data-connector.md#), especially [Update your system for attack disruption](update-sap-data-connector.md#update-your-system-for-attack-disruption)
7943

8044
## Related content
8145

82-
- [Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption)
83-
- [Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md)
84-
- [Prerequisites for deploying Microsoft Sentinel solution for SAP applications](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
85-
- [Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md)
86-
- [Deploy Microsoft Sentinel solution for SAP applications](deployment-overview.md)
46+
For more information, see [Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md).
1.76 KB
Loading
1.79 KB
Loading
-6 KB
Loading

articles/sentinel/sap/update-sap-data-connector.md

Lines changed: 125 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@ author: batamig
55
ms.author: bagol
66
ms.topic: how-to
77
ms.date: 03/27/2024
8-
8+
appliesto:
9+
- Microsoft Sentinel in the Azure portal
10+
- Microsoft Sentinel in the Microsoft Defender portal
911
---
1012

1113
# Update Microsoft Sentinel's SAP data connector agent
@@ -16,6 +18,7 @@ To get the latest features, you can [enable automatic updates](#automatically-up
1618

1719
The automatic or manual updates described in this article are relevant to the SAP connector agent only, and not to the Microsoft Sentinel solution for SAP. To successfully update the solution, your agent needs to be up to date. The solution is updated separately.
1820

21+
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
1922

2023
## Prerequisites
2124

@@ -76,6 +79,127 @@ Be sure to check for any other available updates, such as:
7679
- Microsoft Sentinel solution for SAP® applications security content, in the **Microsoft Sentinel solution for SAP® applications** solution.
7780
- Relevant watchlists, in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/SAP/Analytics/Watchlists).
7881

82+
## Update your system for attack disruption
83+
84+
Automatic attack disruption for SAP is supported with the unified security operations platform in the Microsoft Defender portal, and requires:
85+
86+
- A workspace [onboarded to the unified security operations platform](../microsoft-sentinel-defender-portal.md).
87+
88+
- A Microsoft Sentinel SAP data connector agent, version 90847355 or higher. [Check your current agent version](#verify-your-current-data-connector-agent-version) and update it if you need to.
89+
90+
- The identity of your data connector agent VM assigned to the **Microsoft Sentinel Business Applications Agent Operator** Azure role. If this role isn't assigned, make sure to [assign these roles manually](#assign-required-azure-roles-manually).
91+
92+
- The **/MSFTSEN/SENTINEL_RESPONDER** SAP role [applied to your SAP system and assigned to the SAP user account](#apply-and-assign-the-sentinel_responder-sap-role-to-your-sap-system) used by Microsoft Sentinel's SAP data connector agent.
93+
94+
### Verify your current data connector agent version
95+
96+
To verify your current agent version, run the following query from the Microsoft Sentinel **Logs** page:
97+
98+
```Kusto
99+
SAP_HeartBeat_CL
100+
| where sap_client_category_s !contains "AH"
101+
| summarize arg_max(TimeGenerated, agent_ver_s), make_set(system_id_s) by agent_id_g
102+
| project
103+
TimeGenerated,
104+
SAP_Data_Connector_Agent_guid = agent_id_g,
105+
Connected_SAP_Systems_Ids = set_system_id_s,
106+
Current_Agent_Version = agent_ver_s
107+
```
108+
### Check for required Azure roles
109+
110+
Attack disruption for SAP requires that you grant your agent's VM identity with specific permissions to the Microsoft Sentinel workspace, using the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles.
111+
112+
First check to see if your roles are already assigned:
113+
114+
1. Find your VM identity object ID in Azure:
115+
116+
1. Go to **Enterprise application** > **All applications**, and select your VM or registered application name, depending on the type of identity you're using to access your key vault.
117+
1. Copy the value of the **Object ID** field to use with your copied command.
118+
119+
1. Run the following command to verify whether these roles are already assigned, replacing the placeholder values as needed.
120+
121+
```bash
122+
az role assignment list --assignee <Object_ID> --query "[].roleDefinitionName" --scope <scope>
123+
```
124+
125+
The output shows a list of the roles assigned to the object ID.
126+
127+
### Assign required Azure roles manually
128+
129+
If the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles aren't yet assigned to your agent's VM identity, use the following steps to assign them manually. Select the tab for the Azure portal or the command line, depending on how your agent is deployed. Agents deployed from the command line aren't shown in the Azure portal, and you must use the command line to assign the roles.
130+
131+
To perform this procedure, you must be a resource group owner on your Microsoft Sentinel workspace.
132+
133+
#### [Azure portal](#tab/azure)
134+
135+
1. In Microsoft Sentinel, on the **Configuration > Data connectors** page, go to your **Microsoft Sentinel for SAP** data connector and select **Open the connector page**.
136+
137+
1. In the **Configuration** area, under step **1. Add an API based collector agent**, locate the agent that you're updating and select the **Show commands** button.
138+
139+
1. Copy the **Role assignment commands** displayed. Run them on your agent VM, replacing the `Object_ID` placeholders with your VM identity object ID.
140+
141+
These commands assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** Azure roles to your VM's managed identity, including only the scope of the specified agent's data in the workspace.
142+
143+
> [!IMPORTANT]
144+
> Assigning the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles via the CLI assigns the roles only on the scope of the specified agent's data in the workspace. This is the most secure, and therefore recommended option.
145+
>
146+
> If you must assign the roles [via the Azure portal](/azure/role-based-access-control/role-assignments-portal?tabs=delegate-condition), we recommend assigning the roles on a small scope, such as only on the Microsoft Sentinel workspace.
147+
148+
#### [Command line](#tab/cli)
149+
150+
1. <a name="step1"></a>Get the agent ID by running the following command, replacing the `<container_name>` placeholder with the name of your Docker container:
151+
152+
```bash
153+
docker inspect <container_name> | grep -oP '"SENTINEL_AGENT_GUID=\K[^"]+
154+
```
155+
156+
For example, an agent ID returned might be `234fba02-3b34-4c55-8c0e-e6423ceb405b`.
157+
158+
159+
1. Assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles by running the following commands:
160+
161+
```bash
162+
az role assignment create --assignee-object-id <Object_ID> --role --assignee-principal-type ServicePrincipal "Microsoft Sentinel Business Applications Agent Operator" --scope /subscriptions/<SUB_ID>/resourcegroups/<RESOURCE_GROUP_NAME>/providers/microsoft.operationalinsights/workspaces/<WS_NAME>/providers/Microsoft.SecurityInsights/BusinessApplicationAgents/<AGENT_IDENTIFIER>
163+
164+
az role assignment create --assignee-object-id <Object_ID> --role --assignee-principal-type ServicePrincipal "Reader" --scope /subscriptions/<SUB_ID>/resourcegroups/<RESOURCE_GROUP_NAME>/providers/microsoft.operationalinsights/workspaces/<WS_NAME>/providers/Microsoft.SecurityInsights/BusinessApplicationAgents/<AGENT_IDENTIFIER>
165+
```
166+
167+
Replace placeholder values as follows:
168+
169+
|Placeholder |Value |
170+
|---------|---------|
171+
|`<OBJ_ID>` | Your VM identity object ID. |
172+
|`<SUB_ID>` | Your Microsoft Sentinel workspace subscription ID |
173+
|`<RESOURCE_GROUP_NAME>` | Your Microsoft Sentinel workspace resource group name |
174+
|`<WS_NAME>` | Your Microsoft Sentinel workspace name |
175+
|`<AGENT_IDENTIFIER>` | The agent ID displayed after running the command in the [previous step](#step1). |
176+
177+
---
178+
179+
### Apply and assign the SENTINEL_RESPONDER SAP role to your SAP system
180+
181+
Apply **/MSFTSEN/SENTINEL_RESPONDER** SAP role to your SAP system and assign it to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
182+
183+
To apply and assign the **/MSFTSEN/SENTINEL_RESPONDER** SAP role:
184+
185+
1. Upload role definitions from the [/MSFTSEN/SENTINEL_RESPONDER](https://aka.ms/SAP_Sentinel_Responder_Role) file in GitHub.
186+
187+
1. Assign the **/MSFTSEN/SENTINEL_RESPONDER** role to the SAP user account used by Microsoft Sentinel's SAP data connector agent. For more information, see [Deploy SAP Change Requests and configure authorization](preparing-sap.md).
188+
189+
Alternately, manually assign the following authorizations to the current role already assigned to the SAP user account used by Microsoft Sentinel's SAP data connector. These authorizations are included in the **/MSFTSEN/SENTINEL_RESPONDER** SAP role specifically for attack disruption response actions.
190+
191+
| Authorization object | Field | Value |
192+
| -------------------- | ----- | ----- |
193+
|S_RFC |RFC_TYPE |Function Module |
194+
|S_RFC |RFC_NAME |BAPI_USER_LOCK |
195+
|S_RFC |RFC_NAME |BAPI_USER_UNLOCK |
196+
|S_RFC |RFC_NAME |TH_DELETE_USER <br>In contrast to its name, this function doesn't delete users, but ends the active user session. |
197+
|S_USER_GRP |CLASS |* <br>We recommend replacing S_USER_GRP CLASS with the relevant classes in your organization that represent dialog users. |
198+
|S_USER_GRP |ACTVT |03 |
199+
|S_USER_GRP |ACTVT |05 |
200+
201+
For more information, see [Required ABAP authorizations](preparing-sap.md#required-abap-authorizations).
202+
79203
## Next steps
80204
81205
Learn more about the Microsoft Sentinel solution for SAP® applications:

0 commit comments

Comments
 (0)