Skip to content

Commit cffd095

Browse files
committed
Updated files from source
1 parent ea25eaa commit cffd095

File tree

3 files changed

+31
-15
lines changed

3 files changed

+31
-15
lines changed

articles/sentinel/data-connectors/fortinet-fortindr-cloud.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ title: "Fortinet FortiNDR Cloud (using Azure Functions) connector for Microsoft
33
description: "Learn how to install the connector Fortinet FortiNDR Cloud (using Azure Functions) to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 05/30/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
1010
---
1111

1212
# Fortinet FortiNDR Cloud (using Azure Functions) connector for Microsoft Sentinel
1313

14-
The Fortinet FortiNDR Cloud data connector provides the capability to ingest [Fortinet FortiNDR Cloud](https://docs.fortinet.com/product/fortindr-cloud) events stored in Amazon S3 into Microsoft Sentinel using the Amazon S3 REST API.
14+
The Fortinet FortiNDR Cloud data connector provides the capability to ingest [Fortinet FortiNDR Cloud](https://docs.fortinet.com/product/fortindr-cloud) data into Microsoft Sentinel using the FortiNDR Cloud API
1515

1616
This is autogenerated content. For changes, contact the solution provider.
1717

@@ -58,14 +58,15 @@ FncEventsDetections_CL
5858
To integrate with Fortinet FortiNDR Cloud (using Azure Functions) make sure you have:
5959

6060
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
61-
- **MetaStream Credentials/permissions**: **AWS Access Key Id**, **AWS Secret Access Key**, **FortiNDR Cloud Account Code** are required to retrieve event data.
61+
- **MetaStream Credentials**: **AWS Access Key Id**, **AWS Secret Access Key**, **FortiNDR Cloud Account Code** are required to retrieve event data.
62+
- **API Credentials**: **FortiNDR Cloud API Token**, **FortiNDR Cloud Account UUID** are required to retrieve detection data.
6263

6364

6465
## Vendor installation instructions
6566

6667

6768
> [!NOTE]
68-
> This connector uses Azure Functions to connect to the Amazon S3 REST API to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
69+
> This connector uses Azure Functions to connect to the FortiNDR Cloud API to pull logs into Microsoft Sentinel. This might result in additional data ingestion costs. Check the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/) for details.
6970
7071

7172
>**(Optional Step)** Securely store workspace and API authorization key(s) or token(s) in Azure Key Vault. Azure Key Vault provides a secure mechanism to store and retrieve key values. [Follow these instructions](/azure/app-service/app-service-key-vault-references) to use Azure Key Vault with an Azure Function App.
@@ -82,7 +83,7 @@ The provider should provide or link to detailed steps to configure the 'PROVIDER
8283

8384
**STEP 2 - Choose ONE from the following two deployment options to deploy the connector and the associated Azure Function**
8485

85-
>**IMPORTANT:** Before deploying the Fortinet FortiNDR Cloud connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the as well as the MetaStream credentials (available in FortiNDR Cloud account management), readily available.
86+
>**IMPORTANT:** Before deploying the Fortinet FortiNDR Cloud connector, have the Workspace ID and Workspace Primary Key (can be copied from the following), as well as the as well as the FortiNDR Cloud API credentials (available in FortiNDR Cloud account management), readily available.
8687
8788

8889

articles/sentinel/data-connectors/github-enterprise-audit-log.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "GitHub Enterprise Audit Log connector for Microsoft Sentinel"
33
description: "Learn how to install the connector GitHub Enterprise Audit Log to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 05/30/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -13,7 +13,9 @@ ms.collection: sentinel-data-connector
1313

1414
The GitHub audit log connector provides the capability to ingest GitHub logs into Microsoft Sentinel. By connecting GitHub audit logs into Microsoft Sentinel, you can view this data in workbooks, use it to create custom alerts, and improve your investigation process.
1515

16-
**Note:** If you are intended to ingest GitHub subscribed events into Microsoft Sentinel , Please refer to GitHub (using Webhooks) Connector from "**Data Connectors**" gallery.
16+
**Note:** If you intended to ingest GitHub subscribed events into Microsoft Sentinel, please refer to GitHub (using Webhooks) Connector from "**Data Connectors**" gallery.
17+
18+
This is autogenerated content. For changes, contact the solution provider.
1719

1820
## Connector attributes
1921

@@ -47,8 +49,8 @@ To integrate with GitHub Enterprise Audit Log make sure you have:
4749

4850
Connect the GitHub Enterprise Organization-level Audit Log to Microsoft Sentinel
4951

50-
Enable GitHub audit Logs.
51-
Follow [this](https://docs.github.com/en/github/authenticating-to-github/keeping-your-account-and-data-secure/creating-a-personal-access-token) to create or find your personal key
52+
Enable GitHub audit logs.
53+
Follow [this guide](https://docs.github.com/en/github/authenticating-to-github/keeping-your-account-and-data-secure/creating-a-personal-access-token) to create or find your personal access token.
5254

5355

5456

articles/sentinel/data-connectors/vmware-vcenter.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "VMware vCenter connector for Microsoft Sentinel"
33
description: "Learn how to install the connector VMware vCenter to connect your data source to Microsoft Sentinel."
44
author: cwatson-cat
55
ms.topic: how-to
6-
ms.date: 04/26/2024
6+
ms.date: 05/30/2024
77
ms.service: microsoft-sentinel
88
ms.author: cwatson
99
ms.collection: sentinel-data-connector
@@ -19,7 +19,7 @@ This is autogenerated content. For changes, contact the solution provider.
1919

2020
| Connector attribute | Description |
2121
| --- | --- |
22-
| **Log Analytics table(s)** | vCenter_CL<br/> |
22+
| **Log Analytics table(s)** | vcenter_CL<br/> |
2323
| **Data collection rules support** | Not currently supported |
2424
| **Supported by** | [Microsoft Corporation](https://support.microsoft.com) |
2525

@@ -47,6 +47,13 @@ vCenter
4747

4848

4949

50+
## Prerequisites
51+
52+
To integrate with VMware vCenter make sure you have:
53+
54+
- **Include custom pre-requisites if the connectivity requires - else delete customs**: Description for any custom pre-requisite
55+
56+
5057
## Vendor installation instructions
5158

5259

@@ -64,9 +71,9 @@ Typically, you should install the agent on a different computer from the one on
6471

6572
Follow the configuration steps below to get vCenter server logs into Microsoft Sentinel. Refer to the [Azure Monitor Documentation](/azure/azure-monitor/agents/data-sources-json) for more details on these steps.
6673
For vCenter Server logs, we have issues while parsing the data by OMS agent data using default settings.
67-
So we advice to capture the logs into custom table **vCenter_CL** using below instructions.
74+
So we advice to capture the logs into custom table **vcenter_CL** using below instructions.
6875
1. Login to the server where you have installed OMS agent.
69-
2. Download config file [vCenter.conf](https://aka.ms/sentinel-vcenter-conf)
76+
2. Download config file vCenter.conf
7077
wget -v https://aka.ms/sentinel-vcenteroms-conf -O vcenter.conf
7178
3. Copy vcenter.conf to the /etc/opt/microsoft/omsagent/**workspace_id**/conf/omsagent.d/ folder.
7279
cp vcenter.conf /etc/opt/microsoft/omsagent/<<workspace_id>>/conf/omsagent.d/
@@ -80,8 +87,14 @@ So we advice to capture the logs into custom table **vCenter_CL** using below in
8087
5. Save changes and restart the Azure Log Analytics agent for Linux service with the following command:
8188
sudo /opt/microsoft/omsagent/bin/service_control restart
8289
6. Modify /etc/rsyslog.conf file - add below template preferably at the beginning / before directives section
83-
$template vcenter,"%timestamp% %hostname% %msg%\n"
84-
7. Create a custom conf file in /etc/rsyslog.d/ for example 10-vcenter.conf and add following filter conditions.
90+
91+
$template vcenter,"%timestamp% %hostname% %msg%\ n"
92+
93+
**Note - There is no space between slash(\\) and character 'n' in above command.**
94+
95+
7. Create a custom conf file in /etc/rsyslog.d/ for example 10-vcenter.conf and add following filter conditions.
96+
97+
Download config file [10-vCenter.conf](https://aka.ms/sentinel-vcenter-conf)
8598

8699
With an added statement you will need to create a filter which will specify the logs coming from the vcenter server to be forwarded to the custom table.
87100

0 commit comments

Comments
 (0)