You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sap/collect-sap-hana-audit-logs.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.date: 03/02/2022
14
14
This article explains how to collect audit logs from your SAP HANA database.
15
15
16
16
> [!IMPORTANT]
17
-
> The Microsoft Sentinel SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
> The Microsoft Sentinel Threat Monitoring for SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
18
19
19
If you have SAP HANA database audit logs configured with Syslog, you'll also need to configure your Log Analytics agent to collect the Syslog files.
20
20
@@ -51,25 +51,25 @@ If you have SAP HANA database audit logs configured with Syslog, you'll also nee
51
51
52
52
## Next steps
53
53
54
-
Learn more about the Microsoft Sentinel SAP solutions:
54
+
Learn more about the Microsoft Sentinel Threat Monitoring for SAP solutions:
55
55
56
-
-[Deploy Continuous Threat Monitoring for SAP](deployment-overview.md)
57
-
-[Prerequisites for deploying SAP continuous threat monitoring](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
56
+
-[Deploy Threat Monitoring for SAP](deployment-overview.md)
57
+
-[Prerequisites for deploying Threat Monitoring for SAP](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
58
58
-[Deploy SAP Change Requests (CRs) and configure authorization](preparing-sap.md)
59
59
-[Deploy and configure the SAP data connector agent container](deploy-data-connector-agent-container.md)
60
60
-[Deploy SAP security content](deploy-sap-security-content.md)
61
-
-[Deploy the Microsoft Sentinel SAP data connector with SNC](configure-snc.md)
61
+
-[Deploy the Microsoft Sentinel Threat Monitoring for SAP data connector with SNC](configure-snc.md)
62
62
-[Enable and configure SAP auditing](configure-audit.md)
63
63
64
64
Troubleshooting:
65
65
66
-
-[Troubleshoot your Microsoft Sentinel SAP solution deployment](sap-deploy-troubleshoot.md)
66
+
-[Troubleshoot your Microsoft Sentinel Threat Monitoring for SAP solution deployment](sap-deploy-troubleshoot.md)
67
67
-[Configure SAP Transport Management System](configure-transport.md)
68
68
69
69
Reference files:
70
70
71
-
-[Microsoft Sentinel SAP solution data reference](sap-solution-log-reference.md)
72
-
-[Microsoft Sentinel SAP solution: security content reference](sap-solution-security-content.md)
71
+
-[Microsoft Sentinel Threat Monitoring for SAP solution data reference](sap-solution-log-reference.md)
72
+
-[Microsoft Sentinel Threat Monitoring for SAP solution: security content reference](sap-solution-security-content.md)
Copy file name to clipboardExpand all lines: articles/sentinel/sap/configure-audit.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Enable and configure SAP auditing for Microsoft Sentinel | Microsoft Docs
3
-
description: This article shows you how to enable and configure auditing for the Microsoft Sentinel Continuous Threat Monitoring solution for SAP, so that you can have complete visibility into your SAP solution.
3
+
description: This article shows you how to enable and configure auditing for the Microsoft Sentinel Threat Monitoring solution for SAP, so that you can have complete visibility into your SAP solution.
4
4
author: MSFTandrelom
5
5
ms.author: andrelom
6
6
ms.topic: how-to
@@ -11,16 +11,16 @@ ms.date: 04/27/2022
11
11
12
12
[!INCLUDE [Banner for top of topics](../includes/banner.md)]
13
13
14
-
This article shows you how to enable and configure auditing for the Microsoft Sentinel Continuous Threat Monitoring solution for SAP, so that you can have complete visibility into your SAP solution.
14
+
This article shows you how to enable and configure auditing for the Microsoft Sentinel Threat Monitoring solution for SAP, so that you can have complete visibility into your SAP solution.
15
15
16
16
> [!IMPORTANT]
17
-
> The Microsoft Sentinel SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
+
> The Microsoft Sentinel Threat Monitoring for SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
18
>
19
19
> We strongly recommend that any management of your SAP system is carried out by an experienced SAP system administrator.
20
20
>
21
21
> The steps in this article may vary, depending on your SAP sytem's version, and should be considered as a sample only.
22
22
23
-
Some installations of SAP systems may not have audit log enabled by default. For best results in evaluating the performance and efficacy of the Microsoft Sentinel Continuous Threat Monitoring solution for SAP, enable auditing of your SAP system and configure the audit parameters.
23
+
Some installations of SAP systems may not have audit log enabled by default. For best results in evaluating the performance and efficacy of the Microsoft Sentinel Threat Monitoring solution for SAP, enable auditing of your SAP system and configure the audit parameters.
24
24
25
25
## Check if auditing is enabled
26
26
@@ -73,7 +73,7 @@ Some installations of SAP systems may not have audit log enabled by default. For
73
73
74
74
### Recommended audit categories
75
75
76
-
The following table lists Message IDs used by the Continuous Threat Monitoring for SAP solution. In order for analytics rules to detect events properly, we strongly recommend configuring an audit policy that includes the message IDs listed below as a minimum.
76
+
The following table lists Message IDs used by the Threat Monitoring for SAP solution. In order for analytics rules to detect events properly, we strongly recommend configuring an audit policy that includes the message IDs listed below as a minimum.
77
77
78
78
| Message ID | Message text | Category name | Event Weighting | Class Used in Rules |
79
79
| - | - | - | - | - |
@@ -129,25 +129,25 @@ The following table lists Message IDs used by the Continuous Threat Monitoring f
129
129
130
130
## Next steps
131
131
132
-
Learn more about the Microsoft Sentinel SAP solutions:
132
+
Learn more about the Microsoft Sentinel Threat Monitoring for SAP solutions:
133
133
134
-
-[Deploy Continuous Threat Monitoring for SAP](deployment-overview.md)
135
-
-[Prerequisites for deploying SAP continuous threat monitoring](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
134
+
-[Deploy Threat Monitoring for SAP](deployment-overview.md)
135
+
-[Prerequisites for deploying Threat Monitoring for SAP](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
136
136
-[Deploy SAP Change Requests (CRs) and configure authorization](preparing-sap.md)
137
137
-[Deploy and configure the SAP data connector agent container](deploy-data-connector-agent-container.md)
138
138
-[Deploy SAP security content](deploy-sap-security-content.md)
139
-
-[Deploy the Microsoft Sentinel SAP data connector with SNC](configure-snc.md)
139
+
-[Deploy the Microsoft Sentinel Threat Monitoring for SAP data connector with SNC](configure-snc.md)
140
140
-[Collect SAP HANA audit logs](collect-sap-hana-audit-logs.md)
141
141
142
142
Troubleshooting:
143
143
144
-
-[Troubleshoot your Microsoft Sentinel SAP solution deployment](sap-deploy-troubleshoot.md)
144
+
-[Troubleshoot your Microsoft Sentinel Threat Monitoring for SAP solution deployment](sap-deploy-troubleshoot.md)
145
145
-[Configure SAP Transport Management System](configure-transport.md)
146
146
147
147
Reference files:
148
148
149
-
-[Microsoft Sentinel SAP solution data reference](sap-solution-log-reference.md)
150
-
-[Microsoft Sentinel SAP solution: security content reference](sap-solution-security-content.md)
149
+
-[Microsoft Sentinel Threat Monitoring for SAP solution data reference](sap-solution-log-reference.md)
150
+
-[Microsoft Sentinel Threat Monitoring for SAP solution: security content reference](sap-solution-security-content.md)
Copy file name to clipboardExpand all lines: articles/sentinel/sap/configure-snc.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Deploy the Microsoft Sentinel SAP data connector with Secure Network Communications (SNC) | Microsoft Docs
2
+
title: Deploy the Microsoft Sentinel Threat Monitoring for SAP data connector with Secure Network Communications (SNC) | Microsoft Docs
3
3
description: This article shows you how to deploy the **Microsoft Sentinel data connector for SAP** to ingest NetWeaver/ABAP logs over a secure connection using Secure Network Communications.
# Deploy the Microsoft Sentinel SAP data connector with SNC
11
+
# Deploy the Microsoft Sentinel Threat Monitoring for SAP data connector with SNC
12
12
13
13
[!INCLUDE [Banner for top of topics](../includes/banner.md)]
14
14
15
15
This article shows you how to deploy the **Microsoft Sentinel data connector for SAP** to ingest NetWeaver/ABAP logs over a secure connection using Secure Network Communications (SNC).
16
16
17
17
> [!IMPORTANT]
18
-
> The Microsoft Sentinel SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
18
+
> The Microsoft Sentinel Threat Monitoring for SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19
19
20
-
The Continuous Threat Monitoring for SAP data connector agent typically connects to an SAP ABAP server using an RFC connection, and a user's username and password for authentication.
20
+
The Threat Monitoring for SAP data connector agent typically connects to an SAP ABAP server using an RFC connection, and a user's username and password for authentication.
21
21
22
22
However, some environments may require the connection be over an encrypted channel, and client certificates be used for authentication. In these cases you can use SAP Secure Network Communication for this purpose, and you'll have to take the appropriate steps as outlined in this article.
23
23
@@ -182,26 +182,26 @@ For additional information on options available in the kickstart script, review
182
182
183
183
## Next steps
184
184
185
-
Learn more about the Microsoft Sentinel SAP solutions:
185
+
Learn more about the Microsoft Sentinel Threat Monitoring for SAP solutions:
186
186
187
-
- [Deploy Continuous Threat Monitoring for SAP](deployment-overview.md)
188
-
- [Prerequisites for deploying SAP continuous threat monitoring](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
187
+
- [Deploy Threat Monitoring for SAP](deployment-overview.md)
188
+
- [Prerequisites for deploying Threat Monitoring for SAP](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
189
189
- [Deploy SAP Change Requests (CRs) and configure authorization](preparing-sap.md)
190
190
- [Deploy and configure the SAP data connector agent container](deploy-data-connector-agent-container.md)
191
191
- [Deploy SAP security content](deploy-sap-security-content.md)
192
-
- [Deploy the Microsoft Sentinel SAP data connector with SNC](configure-snc.md)
192
+
- [Deploy the Microsoft Sentinel Threat Monitoring for SAP data connector with SNC](configure-snc.md)
193
193
- [Enable and configure SAP auditing](configure-audit.md)
194
194
- [Collect SAP HANA audit logs](collect-sap-hana-audit-logs.md)
195
195
196
196
Troubleshooting:
197
197
198
-
- [Troubleshoot your Microsoft Sentinel SAP solution deployment](sap-deploy-troubleshoot.md)
198
+
- [Troubleshoot your Microsoft Sentinel Threat Monitoring for SAP solution deployment](sap-deploy-troubleshoot.md)
199
199
- [Configure SAP Transport Management System](configure-transport.md)
200
200
201
201
Reference files:
202
202
203
-
- [Microsoft Sentinel SAP solution data reference](sap-solution-log-reference.md)
204
-
- [Microsoft Sentinel SAP solution: security content reference](sap-solution-security-content.md)
203
+
- [Microsoft Sentinel Threat Monitoring for SAP solution data reference](sap-solution-log-reference.md)
204
+
- [Microsoft Sentinel Threat Monitoring for SAP solution: security content reference](sap-solution-security-content.md)
Copy file name to clipboardExpand all lines: articles/sentinel/sap/configure-transport.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Configure SAP Transport Management System to connect from Microsoft Sentinel | Microsoft Docs
3
-
description: This article shows you how to configure the SAP Transport Management System in the event of an error or in a lab environment where it hasn't already been configured, in order to successfully deploy the Continuous Threat Monitoring solution for SAP in Microsoft Sentinel.
3
+
description: This article shows you how to configure the SAP Transport Management System in the event of an error or in a lab environment where it hasn't already been configured, in order to successfully deploy the Threat Monitoring solution for SAP in Microsoft Sentinel.
4
4
author: MSFTandrelom
5
5
ms.author: andrelom
6
6
ms.topic: how-to
@@ -10,10 +10,10 @@ ms.date: 04/07/2022
10
10
11
11
[!INCLUDE [Banner for top of topics](../includes/banner.md)]
12
12
13
-
This article shows you how to configure the SAP Transport Management System in order to successfully deploy the Continuous Threat Monitoring solution for SAP in Microsoft Sentinel.
13
+
This article shows you how to configure the SAP Transport Management System in order to successfully deploy the Threat Monitoring solution for SAP in Microsoft Sentinel.
14
14
15
15
> [!IMPORTANT]
16
-
> The Microsoft Sentinel SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
16
+
> The Microsoft Sentinel Threat Monitoring for SAP solution is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
17
18
18
SAP's Transport Management System is normally already configured on production systems. However, in a lab environment, where CRs often haven't been previously installed, configuration may be required.
19
19
@@ -72,30 +72,30 @@ The following steps show the process for configuring the Transport Management Sy
72
72
73
73
## Next steps
74
74
75
-
Now that you've configured the Transport Management System, you'll be able to successfully complete the `STMS_IMPORT` transaction and you can continue [preparing your SAP environment](preparing-sap.md) for deploying the Continuous Threat Monitoring solution for SAP in Microsoft Sentinel.
75
+
Now that you've configured the Transport Management System, you'll be able to successfully complete the `STMS_IMPORT` transaction and you can continue [preparing your SAP environment](preparing-sap.md) for deploying the Threat Monitoring solution for SAP in Microsoft Sentinel.
76
76
77
77
> [!div class="nextstepaction"]
78
78
> [Deploy SAP Change Requests and configure authorization](preparing-sap.md#import-the-crs)
79
79
80
-
Learn more about the Microsoft Sentinel SAP solutions:
80
+
Learn more about the Microsoft Sentinel Threat Monitoring for SAP solutions:
81
81
82
-
-[Deploy Continuous Threat Monitoring for SAP](deployment-overview.md)
83
-
-[Prerequisites for deploying SAP continuous threat monitoring](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
82
+
-[Deploy Threat Monitoring for SAP](deployment-overview.md)
83
+
-[Prerequisites for deploying Threat Monitoring for SAP](prerequisites-for-deploying-sap-continuous-threat-monitoring.md)
84
84
-[Deploy SAP Change Requests (CRs) and configure authorization](preparing-sap.md)
85
85
-[Deploy and configure the SAP data connector agent container](deploy-data-connector-agent-container.md)
86
86
-[Deploy SAP security content](deploy-sap-security-content.md)
87
-
-[Deploy the Microsoft Sentinel SAP data connector with SNC](configure-snc.md)
87
+
-[Deploy the Microsoft Sentinel Threat Monitoring for SAP data connector with SNC](configure-snc.md)
88
88
-[Enable and configure SAP auditing](configure-audit.md)
89
89
-[Collect SAP HANA audit logs](collect-sap-hana-audit-logs.md)
90
90
91
91
Troubleshooting:
92
92
93
-
-[Troubleshoot your Microsoft Sentinel SAP solution deployment](sap-deploy-troubleshoot.md)
93
+
-[Troubleshoot your Microsoft Sentinel Threat Monitoring for SAP solution deployment](sap-deploy-troubleshoot.md)
94
94
95
95
Reference files:
96
96
97
-
-[Microsoft Sentinel SAP solution data reference](sap-solution-log-reference.md)
98
-
-[Microsoft Sentinel SAP solution: security content reference](sap-solution-security-content.md)
97
+
-[Microsoft Sentinel Threat Monitoring for SAP solution data reference](sap-solution-log-reference.md)
98
+
-[Microsoft Sentinel Threat Monitoring for SAP solution: security content reference](sap-solution-security-content.md)
0 commit comments