Skip to content

Commit f9d5f4a

Browse files
author
yelevin
committed
Final image changes
1 parent 6489d51 commit f9d5f4a

File tree

6 files changed

+18
-20
lines changed

6 files changed

+18
-20
lines changed

articles/sentinel/connect-aws.md

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,19 @@ This connector is available in two versions: the legacy connector for CloudTrail
2424
2525
# [S3 connector (new)](#tab/s3)
2626

27-
This article explains how to configure the new AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side.
27+
This tab explains how to configure the AWS S3 connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side. Each side's process produces information used by the other side. This two-way authentication creates secure communication.
2828

2929
## Prerequisites
3030

31-
Make sure that the logs from your selected AWS service use the format accepted by Microsoft Sentinel:
31+
- Make sure that the logs from your selected AWS service use the format accepted by Microsoft Sentinel:
3232

33-
- **Amazon VPC**: .csv file in GZIP format with headers; delimiter: space.
34-
- **Amazon GuardDuty**: json-line and GZIP formats.
35-
- **AWS CloudTrail**: .json file in a GZIP format.
36-
- **CloudWatch**: .csv file in a GZIP format without a header. If you need to convert your logs to this format, you can use this [CloudWatch lambda function](cloudwatch-lambda-function.md).
33+
- **Amazon VPC**: .csv file in GZIP format with headers; delimiter: space.
34+
- **Amazon GuardDuty**: json-line and GZIP formats.
35+
- **AWS CloudTrail**: .json file in a GZIP format.
36+
- **CloudWatch**: .csv file in a GZIP format without a header. If you need to convert your logs to this format, you can use this [CloudWatch lambda function](cloudwatch-lambda-function.md).
37+
38+
- You must have write permission on the Microsoft Sentinel workspace.
39+
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
3740

3841
## Architecture overview
3942

@@ -53,7 +56,7 @@ This graphic and the following text show how the parts of this connector solutio
5356

5457
## Connect the S3 connector
5558

56-
- In your AWS environment:
59+
- **In your AWS environment:**
5760

5861
- Configure your AWS service(s) to send logs to an **S3 bucket**.
5962

@@ -63,18 +66,11 @@ This graphic and the following text show how the parts of this connector solutio
6366

6467
- Attach the appropriate **IAM permissions policies** to grant Microsoft Sentinel access to the appropriate resources (S3 bucket, SQS).
6568

66-
- In Microsoft Sentinel:
67-
68-
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
69-
70-
Each side's process produces information used by the other side. This sharing creates secure communication.
71-
72-
We have made available, in our GitHub repository, a script that **automates the AWS side of this process**. See the instructions for [automatic setup](#automatic-setup) later in this document.
69+
We have made available, in our GitHub repository, a script that **automates the AWS side of this process**. See the instructions for [automatic setup](#automatic-setup) later in this document.
7370

74-
## Global prerequisites
71+
- **In Microsoft Sentinel:**
7572

76-
- You must have write permission on your Microsoft Sentinel workspace.
77-
- Install the Amazon Web Services solution from the **Content Hub** in Microsoft Sentinel. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](sentinel-solutions-deploy.md).
73+
- Enable and configure the **AWS S3 Connector** in the Microsoft Sentinel portal. See the instructions below.
7874

7975
## Automatic setup
8076

@@ -123,7 +119,7 @@ To run the script to set up the connector, use the following steps:
123119

124120
:::image type="content" source="media/connect-aws/aws-script-output.png" alt-text="Screenshot of output of A W S connector setup script." lightbox="media/connect-aws/aws-script-output.png":::
125121

126-
:::image type="content" source="media/connect-aws/aws-add-connection-auto.png" alt-text="Screenshot of pasting the A W S role information from the script, to the S3 connector." lightbox="media/connect-aws/aws-add-connection-auto.png":::
122+
:::image type="content" source="media/connect-aws/aws-add-connection.png" alt-text="Screenshot of pasting the A W S role information from the script, to the S3 connector." lightbox="media/connect-aws/aws-add-connection.png":::
127123

128124
1. Select a data type from the **Destination table** drop-down list. This tells the connector which AWS service's logs this connection is being established to collect, and into which Log Analytics table it will store the ingested data. Then select **Add connection**.
129125

@@ -239,6 +235,8 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
239235

240236
# [CloudTrail connector (legacy)](#tab/ct)
241237

238+
This tab explains how to configure the AWS CloudTrail connector. The process of setting it up has two parts: the AWS side and the Microsoft Sentinel side. Each side's process produces information used by the other side. This two-way authentication creates secure communication.
239+
242240
> [!NOTE]
243241
> AWS CloudTrail has [built-in limitations](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/WhatIsCloudTrail-Limits.html) in its LookupEvents API. It allows no more than two transactions per second (TPS) per account, and each query can return a maximum of 50 records. Consequently, if a single tenant constantly generates more than 100 records per second in one region, backlogs and delays in data ingestion will result.
244242
>
@@ -256,7 +254,7 @@ Learn how to [troubleshoot Amazon Web Services S3 connector issues](aws-s3-troub
256254

257255
Setting up this connector has two steps:
258256
- [Create an AWS assumed role and grant access to the AWS Sentinel account](#create-an-aws-assumed-role-and-grant-access-to-the-aws-sentinel-account-1)
259-
- [Add the AWS role information to the AWS data connector](#add-the-aws-role-information-to-the-aws-data-connector)
257+
- [Add the AWS role information to the AWS CloudTrail data connector](#add-the-aws-role-information-to-the-aws-cloudtrail-data-connector)
260258

261259
#### Create an AWS assumed role and grant access to the AWS Sentinel account
262260

@@ -282,7 +280,7 @@ Setting up this connector has two steps:
282280

283281
- Name the role with a meaningful name that includes a reference to Microsoft Sentinel. Example: "*MicrosoftSentinelRole*".
284282

285-
#### Add the AWS role information to the AWS data connector
283+
#### Add the AWS role information to the AWS CloudTrail data connector
286284

287285
1. In the browser tab open to the AWS console, enter the **Identity and Access Management (IAM)** service and navigate to the list of **Roles**. Select the role you created above.
288286

Binary file not shown.
2.77 KB
Loading
3.68 KB
Loading
Binary file not shown.
-8.62 KB
Loading

0 commit comments

Comments
 (0)