You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/monitor-key-vault-honeytokens.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,13 +109,13 @@ The following steps describe specific actions required for the **Azure Sentinel
109
109
110
110
1. On the **Azure Functions** tab, define the following values:
111
111
112
-
**Key vault configuration**: The following fields define values for the key vault where you'll store your AAD app's ID and secret. These fields do not *not* define the the key vault where you'll be deploying honeytokens.
112
+
**Key vault configuration**: The following fields define values for the key vault where you'll store your AAD app's secret. These fields do not *not* define the the key vault where you'll be deploying honeytokens.
113
113
114
114
|Field |Description |
115
115
|---------|---------|
116
116
| **Service plan** | Select whether you want to use a **Premium** or **Consumption** plan for your function app. For more information, see [Azure Functions Consumption plan hosting](/azure/azure-functions/consumption-plan) and [Azure Functions Premium plan](/azure/azure-functions/functions-premium-plan). |
117
-
| **Should a new KeyVault be created** | Select **new** to create a new key vault for your application key, or **existing** to use an already existing key vault. |
118
-
| **KeyVault name** | Displayed only when you've selected to create a new key vault. <br><br>Enter the name of the key vault you want to use to store your client ID and secret. This name must be globally unique. |
117
+
| **Should a new KeyVault be created** | Select **new** to create a new key vault for your app's secret, or **existing** to use an already existing key vault. |
118
+
|**KeyVault name**| Displayed only when you've selected to create a new key vault. <br><br>Enter the name of the key vault you want to use to store your app's secret. This name must be globally unique. |
119
119
|**KeyVault resource group**|Displayed only when you've selected to create a new key vault. <br><br> Select the name of the resource group where you want to store the key vault for your application key. |
120
120
| **Existing key vaults** | Displayed only when you've selected to use an existing key vault. Select the key vault you want to use. |
121
121
|**KeyVault secret name**| Enter the name of the secret used to store the client secret. |
@@ -204,10 +204,14 @@ We recommend that you share the **SOCHTManagement** workbook with key vault owne
204
204
205
205
- Select **Click to validate the key-vault is audited**. In Azure Key Vault, verify that your key vault diagnostic settings are set to send audit events to Log Analytics.
206
206
- Select **Enable your user in the key-vault's policy if missing**. In Azure Key Vault, make sure that your user has access to deploy honeytokens to your required locations. Select **Save** to save any changes.
207
-
- Select **Click to add a honey token to the key-vault** to deploy your configured honeytokento your selected key vault.
208
-
- Select **Click to add monitoring in the SOC**. If successful, a confirmation message is displayed on a new tab: `Honey-token was successfully added to monitored list`.
207
+
- Select **Click to add a honey token to the key-vault** to open Azure Key Vault. Add a new honeytoken, like a new secret, to the configured key vault.
208
+
- Select **Click to add monitoring in the SOC**. If successful, a confirmation message is displayed on a new tab: `Honey-token was successfully added to monitored list`.
209
209
210
-
Make sure to selectthe**Disable back your user in the key-vault's policy if needed** link to remove the access policy created grant rights to create the honeytokens.
210
+
For more information, see the [Azure Key Vault documentation](/azure/key-vault/secrets/about-secrets).
211
+
212
+
> [!NOTE]
213
+
> Make sure to selectthe**Disable back your user in the key-vault's policy if needed** link to remove the access policy created grant rights to create the honeytokens.
0 commit comments