Skip to content

Commit e0e3aa2

Browse files
committed
edit pass: analyze-a-packet-capture
1 parent ac55285 commit e0e3aa2

File tree

3 files changed

+16
-16
lines changed

3 files changed

+16
-16
lines changed

articles/network-watcher/network-watcher-alert-triggered-packet-capture.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ ms.custom: devx-track-azurepowershell
1111

1212
# Monitor networks proactively with alerts and Azure Functions by using packet capture
1313

14-
Azure Network Watcher packet capture creates capture sessions to track traffic in and out of virtual machines (VMs). The capture file can have a filter that you define to track only the traffic that you want to monitor. This data is stored in a storage blob or locally on the guest machine.
14+
The packet capture feature of Azure Network Watcher creates capture sessions to track traffic in and out of virtual machines (VMs). The capture file can have a filter that you define to track only the traffic that you want to monitor. This data is stored in a storage blob or locally on the guest machine.
1515

1616
You can start this capability remotely from other automation scenarios, such as from Azure Functions. You can run proactive captures based on defined network anomalies. Other uses include gathering network statistics, getting information about network intrusions, and debugging client/server communications.
1717

18-
Resources that are deployed in Azure run continuously. It's difficult to actively monitor the status of all resources at all times. For example, what happens if an problem occurs at 2:00 AM?
18+
Resources that are deployed in Azure run continuously. It's difficult to actively monitor the status of all resources at all times. For example, what happens if a problem occurs at 2:00 AM?
1919

2020
By using Network Watcher alerts and functions from within the Azure ecosystem, you can proactively respond with the data and tools to solve problems in your network.
2121

@@ -43,16 +43,16 @@ Here's the workflow for packet capture:
4343
1. The packet capture runs on the VM and collects data.
4444
1. The packet capture file is uploaded to a storage account for review and diagnosis.
4545

46-
To automate this process, you create and connect an alert on your VM to trigger when the incident occurs. You also create a function to call Network Watcher.
46+
To automate this process, you create and connect an alert on your VM to be triggered when the incident occurs. You also create a function to call Network Watcher.
4747

4848
This scenario:
4949

5050
- Creates an Azure function that starts a packet capture.
5151
- Creates an alert rule on a virtual machine and configures the alert rule to call the Azure function.
5252

53-
## Create an Azure function app
53+
## Create an Azure function
5454

55-
To create an Azure function to process the alert and create a packet capture, follow these steps:
55+
To create an Azure function to process the alert and create a packet capture, you first need to create a function app:
5656

5757
1. Sign in to the [Azure portal](https://portal.azure.com).
5858

@@ -66,7 +66,7 @@ To create an Azure function to process the alert and create a packet capture, fo
6666

6767
- Under **Project Details**, select the subscription for which you want to create the function app and the resource group to contain the app.
6868
- Under **Instance Details**:
69-
- For **Function app name**, enter the name of the function app. This name is appended by *.azurewebsites.net*.
69+
- For **Function App name**, enter the name of the function app. This name is appended with *.azurewebsites.net*.
7070
- For **Do you want to deploy code or container image?**, select the mode of publishing: **Code** or **Container image**.
7171
- For **Runtime stack**, select a runtime stack.
7272
- For **Version**, select the version of the runtime stack.
@@ -81,7 +81,7 @@ To create an Azure function to process the alert and create a packet capture, fo
8181

8282
1. Select **Review + create** to create the app.
8383

84-
### Create an Azure function
84+
Now you can create a function:
8585

8686
1. In the function app that you created, select **Functions**, and then select **Create** to open the **Create function** pane.
8787

@@ -99,7 +99,7 @@ To create an Azure function to process the alert and create a packet capture, fo
9999

100100
7. Update the [script](#add-powershell-to-the-function) and select **Save**.
101101

102-
### Authentication
102+
### Configure authentication
103103

104104
To use the PowerShell cmdlets, you must configure authentication in the function app. To configure authentication, you must configure environment variables and upload an encrypted key file to the function app.
105105

@@ -133,7 +133,7 @@ Set up the following environment variables, which are necessary to access the va
133133
- `AzureTenant`
134134
- `AzureCredPassword`
135135

136-
If you already have an application ID, use the `AzureClientID`, `AzureTenant`, and `AzureCredPassword` values of that application. If you don't have one, proceed to [Store the environment variables](#store-the-environment-variables).
136+
If you already have an application ID, use the `AzureClientID`, `AzureTenant`, and `AzureCredPassword` values of that application. If you don't have one, proceed to the [Store the environment variables](#store-the-environment-variables) section.
137137

138138
#### AzureClientID
139139

@@ -165,7 +165,7 @@ Get the tenant ID by running the following PowerShell cmdlet:
165165

166166
#### AzureCredPassword
167167

168-
The value of the `AzureCredPassword` environment variable is the value that you get from running the following PowerShell sample. This example is the same one that the preceding [Authentication](#authentication) section showed. The value that you need is the output of the `$Encryptedpassword` variable. This is the service principal password that you encrypted by using the PowerShell script.
168+
The value of the `AzureCredPassword` environment variable is the value that you get from running the following PowerShell sample. This sample is the same one that the preceding [Authentication](#authentication) section showed. The value that you need is the output of the `$Encryptedpassword` variable. This output is the service principal password that you encrypted by using the PowerShell script.
169169

170170
```powershell
171171
#Variables
@@ -316,7 +316,7 @@ if ($requestBody.context.resourceType -eq "Microsoft.Compute/virtualMachines") {
316316

317317
## Configure an alert on a VM
318318

319-
You can configure alerts to notify individuals when a specific metric crosses a threshold that you assigned to it. In this example, the alert is on the Network Out Total metric that's sent, but you can trigger the alert for many other metrics.
319+
You can configure alerts to notify individuals when a specific metric crosses a threshold that you assigned to it. In this example, the alert is on the **Network Out Total** metric that's sent, but you can trigger the alert for many other metrics.
320320

321321
### Create the alert rule
322322

articles/network-watcher/network-watcher-intrusion-detection-open-source-tools.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This article explains how to set up your environment to perform network intrusio
2222

2323
Network Watcher gives you the packet captures for performing network intrusion detection. Suricata processes the packet captures and triggers alerts based on packets that match its rule set of threats. Suricata stores these alerts in a log file on your local machine.
2424

25-
By using the Elastic Stack, you can index the logs that Suricata generates and then use them to create a Kibana dashboard. A dashboard gives a visual representation of the logs and a means to quickly gain insights to potential network vulnerabilities.
25+
By using the Elastic Stack, you can index the logs that Suricata generates and then use them to create a Kibana dashboard. A dashboard provides a visual representation of the logs and a way to quickly gain insights to potential network vulnerabilities.
2626

2727
:::image type="content" source="./media/network-watcher-intrusion-detection-open-source-tools/figure1.png" alt-text="Diagram that shows a simple web application scenario.":::
2828

@@ -44,7 +44,7 @@ For other methods of installation, see the [Suricata installation quickstart gui
4444
4545
## Download the Emerging Threats rule set
4646
47-
At this stage, you don't have any rules for Suricata to run. You can create your own rules if there are specific threats to your network that you want to detect. You can also use developed rule sets from various providers, such as Emerging Threats or Talos rules from Snort. In this article, you use the freely available Emerging Threats rule set.
47+
At this stage, you don't have any rules for Suricata to run. You can create your own rules if you want to detect specific threats to your network. You can also use developed rule sets from various providers, such as Emerging Threats or Talos rules from Snort. In this article, you use the freely available Emerging Threats rule set.
4848
4949
Download the rule set and copy it into the directory:
5050
@@ -70,11 +70,11 @@ tail -f /var/log/suricata/fast.log
7070
7171
## Set up the Elastic Stack
7272
73-
Although logs that Suricata produces contain valuable information about what's happening on your network, these log files aren't the easiest to read and understand. By connecting Suricata with the Elastic Stack, you can create a Kibana dashboard to search, graph, analyze, and derive insights from your logs.
73+
Logs that Suricata produces contain valuable information about what's happening on your network, but these log files aren't the easiest to read and understand. By connecting Suricata with the Elastic Stack, you can create a Kibana dashboard to search, graph, analyze, and derive insights from your logs.
7474
7575
### Install Elasticsearch
7676
77-
1. Elastic Stack version 5.0 and later requires Java 8. Run the command `java -version` to check your version. If you don't have Java installed, refer to [documentation on the Azure-supported Java Development Kits](/azure/developer/java/fundamentals/java-support-on-azure).
77+
1. Elastic Stack version 5.0 and later require Java 8. Run the command `java -version` to check your version. If you don't have Java installed, refer to [documentation on the Azure-supported Java Development Kits](/azure/developer/java/fundamentals/java-support-on-azure).
7878
7979
1. Download the correct binary package for your system:
8080

articles/network-watcher/network-watcher-using-open-source-tools.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The resulting URL looks something like the following example: `http://storageacc
4545

4646
## Analyze packet captures
4747

48-
CapAnalysis offers various options to visualize your packet capture. Each one provides analysis from a different perspective. With these visual summaries, you can understand your network traffic trends and quickly spot any unusual activity.t
48+
CapAnalysis offers various options to visualize your packet capture. Each one provides analysis from a different perspective. With these visual summaries, you can understand your network traffic trends and quickly spot any unusual activity.
4949

5050
The following list describes a few of the CapAnalysis features:
5151

0 commit comments

Comments
 (0)