Skip to content

Commit f21d143

Browse files
committed
Fix heading lenght
1 parent 774918b commit f21d143

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/sentinel/cef-syslog-ama-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The Azure Monitor Agent supports Syslog RFCs 3164 and 5424.
2525

2626
CEF, or Common Event Format, is a vendor-neutral format for logging data from network and security devices and appliances, such as firewalls, routers, detection and response solutions, and intrusion detection systems, as well as from other kinds of systems such as web servers. An extension of Syslog, it was developed especially for security information and event management (SIEM) solutions. CEF messages have a standard header that contains information such as the device vendor, the device product, the device version, the event class, the event severity, and the event ID. CEF messages also have a variable number of extensions that provide more details about the event, such as the source and destination IP addresses, the username, the file name, or the action taken.
2727

28-
## How Microsoft Sentinel collects Syslog and CEF messages with the Azure Monitor Agent
28+
## Collection of Syslog and CEF messages with AMA
2929

3030
The following diagrams illustrate the architecture of Syslog and CEF message collection in Microsoft Sentinel, using the **Syslog via AMA** and **Common Event Format (CEF) via AMA** connectors.
3131

0 commit comments

Comments
 (0)