You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/cohesity-using-azure-function.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ To integrate with Cohesity (using Azure Function) make sure you have:
52
52
**STEP 1 - Get a Cohesity DataHawk API key (see troubleshooting [instruction 1](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CohesitySecurity/Data%20Connectors/Helios2Sentinel/IncidentProducer))**
53
53
54
54
55
-
**STEP 2 - Register Azure app ([link](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps)) and save Application (client) ID, Directory (tenant) ID, and Secret Value ([instructions](https://learn.microsoft.com/en-us/azure/healthcare-apis/register-application)). Grant it Azure Storage (user_impersonation) permission. Also, assign the 'Microsoft Sentinel Contributor' role to the application in the appropriate subscription.**
55
+
**STEP 2 - Register Azure app ([link](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/RegisteredApps)) and save Application (client) ID, Directory (tenant) ID, and Secret Value ([instructions](https://learn.microsoft.com/azure/healthcare-apis/register-application)). Grant it Azure Storage (user_impersonation) permission. Also, assign the 'Microsoft Sentinel Contributor' role to the application in the appropriate subscription.**
56
56
57
57
58
58
**STEP 3 - Deploy the connector and the associated Azure Functions**.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/rapid7-insight-platform-vulnerability-management-reports-using-azure-function.md
+12-17Lines changed: 12 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,27 +94,22 @@ Use the following step-by-step instructions to deploy the Rapid7 Insight Vulnera
94
94
**1. Deploy a Function App**
95
95
96
96
> **NOTE:** You will need to [prepare VS code](https://aka.ms/sentinel-InsightVMCloudAPI-functionapp) file. Extract archive to your local development computer.
97
-
2. Start VS Code. Choose File in the main menu and select Open Folder.
98
-
3. Select the top level folder from extracted files.
99
-
4. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.
97
+
1. Start VS Code. Choose File in the main menu and select Open Folder.
98
+
1. Select the top level folder from extracted files.
99
+
1. Choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose the **Deploy to function app** button.
100
100
If you aren't already signed in, choose the Azure icon in the Activity bar, then in the **Azure: Functions** area, choose **Sign in to Azure**
101
101
If you're already signed in, go to the next step.
102
-
5. Provide the following information at the prompts:
102
+
1. Provide the following information at the prompts:
103
103
104
-
a. **Select folder:** Choose a folder from your workspace or browse to one that contains your function app.
104
+
1.**Select folder:** Choose a folder from your workspace or browse to one that contains your function app.
105
+
1.**Select Subscription:** Choose the subscription to use.
106
+
1. Select **Create new Function App in Azure** (Don't choose the Advanced option)
107
+
1.**Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. InsightVMXXXXX).
108
+
1.**Select a runtime:** Choose Python 3.8.
109
+
1. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
105
110
106
-
b. **Select Subscription:** Choose the subscription to use.
107
-
108
-
c. Select **Create new Function App in Azure** (Don't choose the Advanced option)
109
-
110
-
d. **Enter a globally unique name for the function app:** Type a name that is valid in a URL path. The name you type is validated to make sure that it's unique in Azure Functions. (e.g. InsightVMXXXXX).
111
-
112
-
e. **Select a runtime:** Choose Python 3.8.
113
-
114
-
f. Select a location for new resources. For better performance and lower costs choose the same [region](https://azure.microsoft.com/regions/) where Microsoft Sentinel is located.
115
-
116
-
6. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied.
117
-
7. Go to Azure Portal for the Function App configuration.
111
+
1. Deployment will begin. A notification is displayed after your function app is created and the deployment package is applied.
112
+
1. Go to Azure Portal for the Function App configuration.
Copy file name to clipboardExpand all lines: articles/sentinel/data-connectors/snowflake-using-azure-function.md
+14-10Lines changed: 14 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,34 +60,38 @@ To query data from Snowflake you need a user that is assigned to a role with suf
60
60
61
61
1. Enter the Snowflake console.
62
62
2. Switch role to SECURITYADMIN and [create a new role](https://docs.snowflake.com/en/sql-reference/sql/create-role.html):
63
-
```
63
+
64
64
USE ROLE SECURITYADMIN;
65
-
CREATE OR REPLACE ROLE EXAMPLE_ROLE_NAME;```
65
+
CREATE OR REPLACE ROLE EXAMPLE_ROLE_NAME;
66
+
66
67
3. Switch role to SYSADMIN and [create warehouse](https://docs.snowflake.com/en/sql-reference/sql/create-warehouse.html) and [grand access](https://docs.snowflake.com/en/sql-reference/sql/grant-privilege.html) to it:
67
-
```
68
+
68
69
USE ROLE SYSADMIN;
69
70
CREATE OR REPLACE WAREHOUSE EXAMPLE_WAREHOUSE_NAME
70
71
WAREHOUSE_SIZE = 'SMALL'
71
72
AUTO_SUSPEND = 5
72
73
AUTO_RESUME = true
73
74
INITIALLY_SUSPENDED = true;
74
-
GRANT USAGE, OPERATE ON WAREHOUSE EXAMPLE_WAREHOUSE_NAME TO ROLE EXAMPLE_ROLE_NAME;```
75
+
GRANT USAGE, OPERATE ON WAREHOUSE EXAMPLE_WAREHOUSE_NAME TO ROLE EXAMPLE_ROLE_NAME;
76
+
75
77
4. Switch role to SECURITYADMIN and [create a new user](https://docs.snowflake.com/en/sql-reference/sql/create-user.html):
76
-
```
78
+
77
79
USE ROLE SECURITYADMIN;
78
80
CREATE OR REPLACE USER EXAMPLE_USER_NAME
79
81
PASSWORD = 'example_password'
80
82
DEFAULT_ROLE = EXAMPLE_ROLE_NAME
81
83
DEFAULT_WAREHOUSE = EXAMPLE_WAREHOUSE_NAME
82
-
;```
84
+
;
85
+
83
86
5. Switch role to ACCOUNTADMIN and [grant access to snowflake database](https://docs.snowflake.com/en/sql-reference/account-usage.html#enabling-account-usage-for-other-roles) for role.
84
-
```
87
+
85
88
USE ROLE ACCOUNTADMIN;
86
-
GRANT IMPORTED PRIVILEGES ON DATABASE SNOWFLAKE TO ROLE EXAMPLE_ROLE_NAME;```
89
+
GRANT IMPORTED PRIVILEGES ON DATABASE SNOWFLAKE TO ROLE EXAMPLE_ROLE_NAME;
90
+
87
91
6. Switch role to SECURITYADMIN and [assign role](https://docs.snowflake.com/en/sql-reference/sql/grant-role.html) to user:
88
-
```
92
+
89
93
USE ROLE SECURITYADMIN;
90
-
GRANT ROLE EXAMPLE_ROLE_NAME TO USER EXAMPLE_USER_NAME;```
94
+
GRANT ROLE EXAMPLE_ROLE_NAME TO USER EXAMPLE_USER_NAME;
91
95
92
96
>**IMPORTANT:** Save user and API password created during this step as they will be used during deployment step.
0 commit comments