Skip to content

Commit f0c9d0d

Browse files
Merge pull request #285459 from yelevin/yelevin/custom-devices-fix
Correction and removal of old bookmark
2 parents 1ed6cea + 045e41c commit f0c9d0d

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

articles/sentinel/unified-connector-custom-device.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Follow these steps to ingest log messages from Apache HTTP Server:
7373

7474
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
7575

76-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
76+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
7777

7878
## Apache Tomcat
7979

@@ -90,7 +90,7 @@ Follow these steps to ingest log messages from Apache Tomcat:
9090

9191
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
9292

93-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
93+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
9494

9595
## Cisco Meraki
9696

@@ -176,7 +176,7 @@ Follow these steps to ingest log messages from Cisco Meraki:
176176
177177
1. Configure and connect the Cisco Meraki device(s): follow the [instructions provided by Cisco](https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/Meraki_Device_Reporting_-_Syslog%2C_SNMP%2C_and_API) for sending syslog messages. Use the IP address or hostname of the virtual machine where the Azure Monitor Agent is installed.
178178
179-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
179+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
180180
181181
## JBoss Enterprise Application Platform
182182
@@ -194,7 +194,7 @@ Follow these steps to ingest log messages from JBoss Enterprise Application Plat
194194
195195
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
196196
197-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
197+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
198198
199199
## JuniperIDP
200200
@@ -264,7 +264,7 @@ Follow these steps to ingest log messages from JuniperIDP:
264264
265265
1. For the instructions to configure the Juniper IDP appliance to send syslog messages to an external server, see [SRX Getting Started - Configure System Logging.](https://supportportal.juniper.net/s/article/SRX-Getting-Started-Configure-System-Logging).
266266
267-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
267+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
268268
269269
## MarkLogic Audit
270270
@@ -290,7 +290,7 @@ Follow these steps to ingest log messages from MarkLogic Audit:
290290
1. Validate by selecting OK.
291291
1. Refer to MarkLogic documentation for [more details and configuration options](https://docs.marklogic.com/guide/admin/auditing).
292292
293-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
293+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
294294
295295
## MongoDB Audit
296296
@@ -314,7 +314,7 @@ Follow these steps to ingest log messages from MongoDB Audit:
314314
1. Set the `path` parameter to `/data/db/auditlog.json`.
315315
1. Refer to MongoDB documentation for [more parameters and details](https://www.mongodb.com/docs/manual/tutorial/configure-auditing/).
316316
317-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
317+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
318318
319319
## NGINX HTTP Server
320320
@@ -331,7 +331,7 @@ Follow these steps to ingest log messages from NGINX HTTP Server:
331331
332332
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
333333
334-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
334+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
335335
336336
## Oracle WebLogic Server
337337
@@ -349,7 +349,7 @@ Follow these steps to ingest log messages from Oracle WebLogic Server:
349349
350350
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
351351
352-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
352+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
353353
354354
## PostgreSQL Events
355355
@@ -372,7 +372,7 @@ Follow these steps to ingest log messages from PostgreSQL Events:
372372
1. Set `logging_collector=on`
373373
1. Refer to PostgreSQL documentation for [more parameters and details](https://www.postgresql.org/docs/current/runtime-config-logging.html).
374374
375-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
375+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
376376
377377
## SecurityBridge Threat Detection for SAP
378378
@@ -389,7 +389,7 @@ Follow these steps to ingest log messages from SecurityBridge Threat Detection f
389389
390390
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
391391
392-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
392+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
393393
394394
## SquidProxy
395395
@@ -407,7 +407,7 @@ Follow these steps to ingest log messages from SquidProxy:
407407
408408
Replace the {TABLE_NAME} and {LOCAL_PATH_FILE} placeholders in the [DCR template](connect-custom-logs-ama.md?tabs=arm#create-the-data-collection-rule) with the values in steps 1 and 2. Replace the other placeholders as directed.
409409
410-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
410+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
411411
412412
## Ubiquiti UniFi
413413
@@ -475,7 +475,7 @@ Follow these steps to ingest log messages from Ubiquiti UniFi:
475475
1. Follow the [instructions provided by Ubiquiti](https://help.ui.com/hc/en-us/categories/6583256751383) to enable syslog and optionally debugging logs.
476476
1. Select Settings > System Settings > Controller Configuration > Remote Logging and enable syslog.
477477
478-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
478+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
479479
480480
## VMware vCenter
481481
@@ -551,7 +551,7 @@ Follow these steps to ingest log messages from VMware vCenter:
551551
1. Follow the [instructions provided by VMware](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.monitoring.doc/GUID-9633A961-A5C3-4658-B099-B81E0512DC21.html) for sending syslog messages.
552552
1. Use the IP address or hostname of the machine where the Azure Monitor Agent is installed.
553553
554-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
554+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
555555
556556
## Zscaler Private Access (ZPA)
557557
@@ -561,7 +561,7 @@ Follow these steps to ingest log messages from Zscaler Private Access (ZPA):
561561
562562
1. Log storage location: Create a log file on your external syslog server. Grant the syslog daemon write permissions to the file. Install the AMA on the external syslog server if it's not already installed. Enter this filename and path in the **File pattern** field in the connector, or in place of the `{LOCAL_PATH_FILE}` placeholder in the DCR.
563563
564-
1. Configure the syslog daemon to export its vCenter log messages to a temporary text file so the AMA can collect them.
564+
1. Configure the syslog daemon to export its ZPA log messages to a temporary text file so the AMA can collect them.
565565
566566
# [rsyslog](#tab/rsyslog)
567567
@@ -619,7 +619,7 @@ Follow these steps to ingest log messages from Zscaler Private Access (ZPA):
619619
1. Follow the [instructions provided by ZPA](https://help.zscaler.com/zpa/configuring-log-receiver). Select JSON as the log template.
620620
1. Select Settings > System Settings > Controller Configuration > Remote Logging and enable syslog.
621621
622-
[Back to list](#specific-instructions-per-application-type) | [Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
622+
[Back to top](#custom-logs-via-ama-data-connector---configure-data-ingestion-to-microsoft-sentinel-from-specific-applications)
623623
624624
## Related content
625625

0 commit comments

Comments
 (0)