You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deployment-attack-disrupt.md
+18-58Lines changed: 18 additions & 58 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,13 @@ title: Automatic attack disruption for SAP | Microsoft Sentinel
3
3
description: Learn about deploying automatic attack disruption for SAP with the unified security operations platform.
4
4
author: batamig
5
5
ms.author: bagol
6
-
ms.topic: how-to
7
-
ms.date: 04/01/2024
6
+
ms.topic: concept
7
+
ms.date: 04/07/2024
8
8
appliesto:
9
-
- Microsoft Sentinel in the Azure portal and the Microsoft Defender portal
9
+
- Microsoft Sentinel in the Azure portal
10
+
- Microsoft Sentinel in the Microsoft Defender portal
10
11
ms.collection: usx-security
11
-
#customerIntent: As a security engineer, I want to use automatic attack disruption for SAP in the Microsoft Defender portal.
12
+
#customerIntent: As a security engineer, I want to deploy automatic attack disruption for SAP with the unified security operations platform.
12
13
---
13
14
14
15
# Automatic attack disruption for SAP (Preview)
@@ -17,70 +18,29 @@ Microsoft Defender XDR correlates millions of individual signals to identify act
17
18
18
19
When you add a new SAP system to Microsoft Sentinel, your default configuration includes attack disruption functionality in the unified SOC platform. This article describes how to ensure that your SAP system is ready to support automatic attack disruption for SAP in the Microsoft Defender portal.
19
20
20
-
For more information, see [Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption).
## Attack disruption with the unified security operations platform
25
-
26
-
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant role is applied. However, attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
27
-
28
-
To use attack disruption for SAP, make sure that you configured the integration between Microsoft Sentinel and Microsoft Defender XDR. For more information, see [Connect Microsoft Sentinel to Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-sentinel-onboard) and [Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md).
23
+
## Attack disruption for SAP and the unified security operations platform
29
24
30
-
## Required SAP data connector agent version and role assignments
25
+
Attack disruption for SAP is configured by updating your data connector agent version and ensuring that the relevant roles are applied in Azure and your SAP system. However, automatic attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
31
26
32
-
Attack disruption for SAP requires that you have:
33
-
34
-
- A Microsoft Sentinel SAP data connector agent, version 90847355 or higher.
35
-
- The identity of your data connector agent VM must be assigned to the **Microsoft Sentinel Business Applications Agent Operator** Azure role.
36
-
- The **/MSFTSEN/SENTINEL_RESPONDER** SAP role, applied to your SAP system and assigned to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
37
-
38
-
**To use attack disruption for SAP**, deploy a new agent, or update your current agent to the latest version. For more information, see:
39
-
40
-
-[Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md)
41
-
-[Update Microsoft Sentinel's SAP data connector agent](update-sap-data-connector.md)
42
-
43
-
**To verify your current agent version**, run the following query from the Microsoft Sentinel **Logs** page:
44
-
45
-
```Kusto
46
-
SAP_HeartBeat_CL
47
-
| where sap_client_category_s !contains "AH"
48
-
| summarize arg_max(TimeGenerated, agent_ver_s), make_set(system_id_s) by agent_id_g
49
-
| project
50
-
TimeGenerated,
51
-
SAP_Data_Connector_Agent_guid = agent_id_g,
52
-
Connected_SAP_Systems_Ids = set_system_id_s,
53
-
Current_Agent_Version = agent_ver_s
54
-
```
55
-
56
-
If the identity of your data connector agent VM isn't yet assigned to the **Microsoft Sentinel Business Applications Agent Operator** role as part of the deployment process, assign the role manually. For more information, see [Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md#role).
57
-
58
-
## Apply and assign the /MSFTSEN/SENTINEL_RESPONDER SAP role to your SAP system
27
+
For more information, see [Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption).
59
28
60
-
Attack disruption is supported by the new **/MSFTSEN/SENTINEL_RESPONDER** SAP role, which you must apply to your SAP system and assign to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
29
+
## Minimum agent version and required roles
61
30
62
-
1. Upload role definitions from the [/MSFTSEN/SENTINEL_RESPONDER](https://aka.ms/SAP_Sentinel_Responder_Role) file in GitHub.
31
+
Automatic attack disruption for SAP requires:
63
32
64
-
1. Assign the **/MSFTSEN/SENTINEL_RESPONDER** role to the SAP user account used by Microsoft Sentinel's SAP data connector agent. For more information, see [Deploy SAP Change Requests and configure authorization](preparing-sap.md).
33
+
- A data connector agent version 90847355 or higher.
34
+
- The identity of your data connector agent VM must be assigned to the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** Azure roles.
35
+
- The **/MSFTSEN/SENTINEL_RESPONDER** SAP role must be applied to your SAP system and assigned to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
65
36
66
-
Alternately, manually assign the following authorizations to the current role already assigned to the SAP user account used by Microsoft Sentinel's SAP data connector. These authorizations are included in the **/MSFTSEN/SENTINEL_RESPONDER** SAP role specifically for attack disruption response actions.
37
+
To use attack disruption for SAP, deploy a new agent, or update your current agent to the latest version. Make sure to assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** Azure roles and the **/MSFTSEN/SENTINEL_RESPONDER** SAP role as required.
67
38
68
-
| Authorization object | Field | Value |
69
-
| -------------------- | ----- | ----- |
70
-
|S_RFC |RFC_TYPE |Function Module |
71
-
|S_RFC |RFC_NAME |BAPI_USER_LOCK |
72
-
|S_RFC |RFC_NAME |BAPI_USER_UNLOCK |
73
-
|S_RFC |RFC_NAME |TH_DELETE_USER <br>In contrast to its name, this function doesn't delete users, but ends the active user session. |
74
-
|S_USER_GRP |CLASS |* <br>We recommend replacing S_USER_GRP CLASS with the relevant classes in your organization that represent dialog users. |
75
-
|S_USER_GRP |ACTVT |03 |
76
-
|S_USER_GRP |ACTVT |05 |
39
+
For more information, see:
77
40
78
-
For more information, see [Required ABAP authorizations](preparing-sap.md#required-abap-authorizations).
41
+
-[Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md)
42
+
-[Update Microsoft Sentinel's SAP data connector agent](update-sap-data-connector.md#), especially [Update your system for attack disruption](update-sap-data-connector.md#update-your-system-for-attack-disruption)
79
43
80
44
## Related content
81
45
82
-
-[Automatic attack disruption in Microsoft Defender XDR](/microsoft-365/security/defender/automatic-attack-disruption)
83
-
-[Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md)
84
-
-[Prerequisites for deploying Microsoft Sentinel solution for SAP applications](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
85
-
-[Deploy and configure the container hosting the SAP data connector agent](deploy-data-connector-agent-container.md)
86
-
-[Deploy Microsoft Sentinel solution for SAP applications](deployment-overview.md)
46
+
For more information, see [Microsoft Sentinel in the Microsoft Defender portal (preview)](../microsoft-sentinel-defender-portal.md).
Copy file name to clipboardExpand all lines: articles/sentinel/sap/update-sap-data-connector.md
+125-1Lines changed: 125 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,9 @@ author: batamig
5
5
ms.author: bagol
6
6
ms.topic: how-to
7
7
ms.date: 03/27/2024
8
-
8
+
appliesto:
9
+
- Microsoft Sentinel in the Azure portal
10
+
- Microsoft Sentinel in the Microsoft Defender portal
9
11
---
10
12
11
13
# Update Microsoft Sentinel's SAP data connector agent
@@ -16,6 +18,7 @@ To get the latest features, you can [enable automatic updates](#automatically-up
16
18
17
19
The automatic or manual updates described in this article are relevant to the SAP connector agent only, and not to the Microsoft Sentinel solution for SAP. To successfully update the solution, your agent needs to be up to date. The solution is updated separately.
@@ -76,6 +79,127 @@ Be sure to check for any other available updates, such as:
76
79
- Microsoft Sentinel solution for SAP® applications security content, in the **Microsoft Sentinel solution for SAP® applications** solution.
77
80
- Relevant watchlists, in the [Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/SAP/Analytics/Watchlists).
78
81
82
+
## Update your system for attack disruption
83
+
84
+
Automatic attack disruption for SAP is supported with the unified security operations platform in the Microsoft Defender portal, and requires:
85
+
86
+
- A workspace [onboarded to the unified security operations platform](../microsoft-sentinel-defender-portal.md).
87
+
88
+
- A Microsoft Sentinel SAP data connector agent, version 90847355 or higher. [Check your current agent version](#verify-your-current-data-connector-agent-version) and update it if you need to.
89
+
90
+
- The identity of your data connector agent VM assigned to the **Microsoft Sentinel Business Applications Agent Operator** Azure role. If this role isn't assigned, make sure to [assign these roles manually](#assign-required-azure-roles-manually).
91
+
92
+
- The **/MSFTSEN/SENTINEL_RESPONDER** SAP role [applied to your SAP system and assigned to the SAP user account](#apply-and-assign-the-sentinel_responder-sap-role-to-your-sap-system) used by Microsoft Sentinel's SAP data connector agent.
93
+
94
+
### Verify your current data connector agent version
95
+
96
+
To verify your current agent version, run the following query from the Microsoft Sentinel **Logs** page:
97
+
98
+
```Kusto
99
+
SAP_HeartBeat_CL
100
+
| where sap_client_category_s !contains "AH"
101
+
| summarize arg_max(TimeGenerated, agent_ver_s), make_set(system_id_s) by agent_id_g
102
+
| project
103
+
TimeGenerated,
104
+
SAP_Data_Connector_Agent_guid = agent_id_g,
105
+
Connected_SAP_Systems_Ids = set_system_id_s,
106
+
Current_Agent_Version = agent_ver_s
107
+
```
108
+
### Check for required Azure roles
109
+
110
+
Attack disruption for SAP requires that you grant your agent's VM identity with specific permissions to the Microsoft Sentinel workspace, using the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles.
111
+
112
+
First check to see if your roles are already assigned:
113
+
114
+
1. Find your VM identity object ID in Azure:
115
+
116
+
1. Go to **Enterprise application** > **All applications**, and select your VM or registered application name, depending on the type of identity you're using to access your key vault.
117
+
1. Copy the value of the **Object ID** field to use with your copied command.
118
+
119
+
1. Run the following command to verify whether these roles are already assigned, replacing the placeholder values as needed.
120
+
121
+
```bash
122
+
az role assignment list --assignee <Object_ID> --query "[].roleDefinitionName" --scope <scope>
123
+
```
124
+
125
+
The output shows a list of the roles assigned to the object ID.
126
+
127
+
### Assign required Azure roles manually
128
+
129
+
If the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles aren't yet assigned to your agent's VM identity, use the following steps to assign them manually. Select the tab forthe Azure portal or the command line, depending on how your agent is deployed. Agents deployed from the command line aren't shownin the Azure portal, and you must use the command line to assign the roles.
130
+
131
+
To perform this procedure, you must be a resource group owner on your Microsoft Sentinel workspace.
132
+
133
+
#### [Azure portal](#tab/azure)
134
+
135
+
1. In Microsoft Sentinel, on the **Configuration > Data connectors** page, go to your **Microsoft Sentinel for SAP** data connector and select**Open the connector page**.
136
+
137
+
1. In the **Configuration** area, under step **1. Add an API based collector agent**, locate the agent that you're updating and select the **Show commands** button.
138
+
139
+
1. Copy the **Role assignment commands** displayed. Run them on your agent VM, replacing the `Object_ID` placeholders with your VM identity object ID.
140
+
141
+
These commands assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** Azure roles to your VM's managed identity, including only the scope of the specified agent's data in the workspace.
142
+
143
+
> [!IMPORTANT]
144
+
> Assigning the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles via the CLI assigns the roles only on the scope of the specified agent's data in the workspace. This is the most secure, and therefore recommended option.
145
+
>
146
+
> If you must assign the roles [via the Azure portal](/azure/role-based-access-control/role-assignments-portal?tabs=delegate-condition), we recommend assigning the roles on a small scope, such as only on the Microsoft Sentinel workspace.
147
+
148
+
#### [Command line](#tab/cli)
149
+
150
+
1. <a name="step1"></a>Get the agent ID by running the following command, replacing the `<container_name>` placeholder with the name of your Docker container:
For example, an agent ID returned might be `234fba02-3b34-4c55-8c0e-e6423ceb405b`.
157
+
158
+
159
+
1. Assign the **Microsoft Sentinel Business Applications Agent Operator** and **Reader** roles by running the following commands:
160
+
161
+
```bash
162
+
az role assignment create --assignee-object-id <Object_ID> --role --assignee-principal-type ServicePrincipal "Microsoft Sentinel Business Applications Agent Operator" --scope /subscriptions/<SUB_ID>/resourcegroups/<RESOURCE_GROUP_NAME>/providers/microsoft.operationalinsights/workspaces/<WS_NAME>/providers/Microsoft.SecurityInsights/BusinessApplicationAgents/<AGENT_IDENTIFIER>
163
+
164
+
az role assignment create --assignee-object-id <Object_ID> --role --assignee-principal-type ServicePrincipal "Reader" --scope /subscriptions/<SUB_ID>/resourcegroups/<RESOURCE_GROUP_NAME>/providers/microsoft.operationalinsights/workspaces/<WS_NAME>/providers/Microsoft.SecurityInsights/BusinessApplicationAgents/<AGENT_IDENTIFIER>
165
+
```
166
+
167
+
Replace placeholder values as follows:
168
+
169
+
|Placeholder |Value |
170
+
|---------|---------|
171
+
|`<OBJ_ID>` | Your VM identity object ID. |
172
+
|`<SUB_ID>` | Your Microsoft Sentinel workspace subscription ID |
173
+
|`<RESOURCE_GROUP_NAME>` | Your Microsoft Sentinel workspace resource group name |
174
+
|`<WS_NAME>` | Your Microsoft Sentinel workspace name |
175
+
|`<AGENT_IDENTIFIER>` | The agent ID displayed after running the command in the [previous step](#step1). |
176
+
177
+
---
178
+
179
+
### Apply and assign the SENTINEL_RESPONDER SAP role to your SAP system
180
+
181
+
Apply **/MSFTSEN/SENTINEL_RESPONDER** SAP role to your SAP system and assign it to the SAP user account used by Microsoft Sentinel's SAP data connector agent.
182
+
183
+
To apply and assign the **/MSFTSEN/SENTINEL_RESPONDER** SAP role:
184
+
185
+
1. Upload role definitions from the [/MSFTSEN/SENTINEL_RESPONDER](https://aka.ms/SAP_Sentinel_Responder_Role) file in GitHub.
186
+
187
+
1. Assign the **/MSFTSEN/SENTINEL_RESPONDER** role to the SAP user account used by Microsoft Sentinel's SAP data connector agent. For more information, see [Deploy SAP Change Requests and configure authorization](preparing-sap.md).
188
+
189
+
Alternately, manually assign the following authorizations to the current role already assigned to the SAP user account used by Microsoft Sentinel's SAP data connector. These authorizations are included in the **/MSFTSEN/SENTINEL_RESPONDER** SAP role specifically for attack disruption response actions.
190
+
191
+
| Authorization object | Field | Value |
192
+
| -------------------- | ----- | ----- |
193
+
|S_RFC |RFC_TYPE |Function Module |
194
+
|S_RFC |RFC_NAME |BAPI_USER_LOCK |
195
+
|S_RFC |RFC_NAME |BAPI_USER_UNLOCK |
196
+
|S_RFC |RFC_NAME |TH_DELETE_USER <br>In contrast to its name, this functiondoesn't delete users, but ends the active user session. |
197
+
|S_USER_GRP |CLASS |*<br>We recommend replacing S_USER_GRP CLASS with the relevant classes in your organization that represent dialog users. |
198
+
|S_USER_GRP |ACTVT |03 |
199
+
|S_USER_GRP |ACTVT |05 |
200
+
201
+
For more information, see [Required ABAP authorizations](preparing-sap.md#required-abap-authorizations).
202
+
79
203
## Next steps
80
204
81
205
Learn more about the Microsoft Sentinel solution for SAP® applications:
0 commit comments