You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+18-20Lines changed: 18 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,16 +24,19 @@ This connector is available in two versions: the legacy connector for CloudTrail
24
24
25
25
# [S3 connector (new)](#tab/s3)
26
26
27
-
This article explains how to configure the new AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side.
27
+
This tab explains how to configure the AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side. Each side's process produces information used by the other side. This two-way authentication creates secure communication.
28
28
29
29
## Prerequisites
30
30
31
-
Make sure that the logs from your selected AWS service use the format accepted by Microsoft Sentinel:
31
+
-Make sure that the logs from your selected AWS service use the format accepted by Microsoft Sentinel:
32
32
33
-
-**Amazon VPC**: .csv file in GZIP format with headers; delimiter: space.
34
-
-**Amazon GuardDuty**: json-line and GZIP formats.
35
-
-**AWS CloudTrail**: .json file in a GZIP format.
36
-
-**CloudWatch**: .csv file in a GZIP format without a header. If you need to convert your logs to this format, you can use this [CloudWatch lambda function](cloudwatch-lambda-function.md).
33
+
-**Amazon VPC**: .csv file in GZIP format with headers; delimiter: space.
34
+
-**Amazon GuardDuty**: json-line and GZIP formats.
35
+
-**AWS CloudTrail**: .json file in a GZIP format.
36
+
-**CloudWatch**: .csv file in a GZIP format without a header. If you need to convert your logs to this format, you can use this [CloudWatch lambda function](cloudwatch-lambda-function.md).
37
+
38
+
- You must have write permission on the Microsoft Sentinel workspace.
39
+
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
37
40
38
41
## Architecture overview
39
42
@@ -53,7 +56,7 @@ This graphic and the following text show how the parts of this connector solutio
53
56
54
57
## Connect the S3 connector
55
58
56
-
- In your AWS environment:
59
+
-**In your AWS environment:**
57
60
58
61
- Configure your AWS service(s) to send logs to an **S3 bucket**.
59
62
@@ -63,18 +66,11 @@ This graphic and the following text show how the parts of this connector solutio
63
66
64
67
- Attach the appropriate **IAM permissions policies** to grant Microsoft Sentinel access to the appropriate resources (S3 bucket, SQS).
65
68
66
-
- In Microsoft Sentinel:
67
-
68
-
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
69
-
70
-
Each side's process produces information used by the other side. This sharing creates secure communication.
71
-
72
-
We have made available, in our GitHub repository, a script that **automates the AWS side of this process**. See the instructions for [automatic setup](#automatic-setup) later in this document.
69
+
We have made available, in our GitHub repository, a script that **automates the AWS side of this process**. See the instructions for [automatic setup](#automatic-setup) later in this document.
73
70
74
-
## Global prerequisites
71
+
-**In Microsoft Sentinel:**
75
72
76
-
- You must have write permission on your Microsoft Sentinel workspace.
77
-
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
73
+
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
78
74
79
75
## Automatic setup
80
76
@@ -123,7 +119,7 @@ To run the script to set up the connector, use the following steps:
123
119
124
120
:::image type="content" source="media/connect-aws/aws-script-output.png" alt-text="Screenshot of output of A W S connector setup script." lightbox="media/connect-aws/aws-script-output.png":::
125
121
126
-
:::image type="content" source="media/connect-aws/aws-add-connection-auto.png" alt-text="Screenshot of pasting the A W S role information from the script, to the S3 connector." lightbox="media/connect-aws/aws-add-connection-auto.png":::
122
+
:::image type="content" source="media/connect-aws/aws-add-connection.png" alt-text="Screenshot of pasting the A W S role information from the script, to the S3 connector." lightbox="media/connect-aws/aws-add-connection.png":::
127
123
128
124
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it will store the ingested data. Then select **Add connection**.
129
125
@@ -239,6 +235,8 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
239
235
240
236
# [CloudTrail connector (legacy)](#tab/ct)
241
237
238
+
This tab explains how to configure the AWS CloudTrail connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side. Each side's process produces information used by the other side. This two-way authentication creates secure communication.
239
+
242
240
> [!NOTE]
243
241
> AWS CloudTrail has [built-in limitations](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/WhatIsCloudTrail-Limits.html) in its LookupEvents API. It allows no more than two transactions per second (TPS) per account, and each query can return a maximum of 50 records. Consequently, if a single tenant constantly generates more than 100 records per second in one region, backlogs and delays in data ingestion will result.
244
242
>
@@ -256,7 +254,7 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
256
254
257
255
Setting up this connector has two steps:
258
256
-[Create an AWS assumed role and grant access to the AWS Sentinel account](#create-an-aws-assumed-role-and-grant-access-to-the-aws-sentinel-account-1)
259
-
-[Add the AWS role information to the AWS data connector](#add-the-aws-role-information-to-the-aws-data-connector)
257
+
-[Add the AWS role information to the AWS CloudTrail data connector](#add-the-aws-role-information-to-the-aws-cloudtrail-data-connector)
260
258
261
259
#### Create an AWS assumed role and grant access to the AWS Sentinel account
262
260
@@ -282,7 +280,7 @@ Setting up this connector has two steps:
282
280
283
281
- Name the role with a meaningful name that includes a reference to Microsoft Sentinel. Example: "*MicrosoftSentinelRole*".
284
282
285
-
#### Add the AWS role information to the AWS data connector
283
+
#### Add the AWS role information to the AWS CloudTrail data connector
286
284
287
285
1. In the browser tab open to the AWS console, enter the **Identity and Access Management (IAM)** service and navigate to the list of **Roles**. Select the role you created above.
0 commit comments