Skip to content

Commit fbfbd65

Browse files
committed
Initial edit for Step 1 of CEF doc
1 parent 19bddd2 commit fbfbd65

File tree

1 file changed

+40
-15
lines changed

1 file changed

+40
-15
lines changed

articles/sentinel/connect-cef-agent.md

Lines changed: 40 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -13,36 +13,61 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 11/26/2019
16+
ms.date: 04/07/2020
1717
ms.author: yelevin
1818

1919
---
20-
# Step 1: Deploy the agent
20+
# Step 1: Deploy the log forwarder
2121

2222

23-
In this step, you need to select the Linux machine that will act as a proxy between Azure Sentinel and your security solution. You will have to run a script on the proxy machine that:
24-
- Installs the Log Analytics agent and configures it as needed to listen for Syslog messages.
25-
- Configures the Syslog daemon to listen to Syslog messages using TCP port 514 and then forwards only the CEF messages to the Log Analytics agent using TCP port 25226.
26-
- Sets the Syslog agent to collect the data and send it securely to Azure Sentinel, where it is parsed and enriched.
23+
In this step, you will designate and configure the Linux machine that will forward the logs from your security solution to your Azure Sentinel workspace. This machine can be a physical or virtual machine in your on-premises environment, an Azure VM, or a VM in another cloud. Using the link provided, you will run a script on the designated machine that performs the following tasks:
24+
- Installs the Log Analytics agent for Linux (also known as the OMS agent) and configures it for the following purposes:
25+
- listening for CEF messages from the built-in Linux Syslog daemon on TCP port 25226
26+
- sending the messages securely over TLS to your Azure Sentinel workspace, where they are parsed and enriched
27+
- Configures the built-in Linux Syslog daemon (rsyslog.d/syslog-ng) for the following purposes:
28+
- listening for Syslog messages from your security solutions on TCP port 514
29+
- forwarding only the messages it identifies as CEF to the Log Analytics agent on localhost using TCP port 25226
2730

28-
## Deploy the agent
31+
## Prerequisites
32+
33+
- You must have elevated permissions (sudo) on your designated Linux machine.
34+
- You must have python installed on the Linux machine.<br>Use the `python -version` command to check.
35+
- The Linux machine must not be connected to any Azure workspaces before you install the Log Analytics agent.
36+
37+
## Run the deployment script
2938

30-
1. In the Azure Sentinel portal, click **Data connectors** and select **Common Event Format (CEF)** and then **Open connector page**.
39+
1. From the Azure Sentinel navigation menu, click **Data connectors**. From the list of connectors, click the **Common Event Format (CEF)** tile, and then the **Open connector page** button on the lower right.
3140

32-
1. Under **Install and configure the Syslog agent**, select your machine type, either Azure, other cloud, or on-premises.
33-
> [!NOTE]
34-
> Because the script in the next step installs the Log Analytics agent and connects the machine to your Azure Sentinel workspace, make sure this machine is not connected to any other workspace.
35-
1. You must have elevated permissions (sudo) on your machine. Make sure that you have Python on your machine using the following command: `python –version`
41+
1. Under **1.2 Install the CEF collector on the Linux machine**, copy the link provided under **Run the following script to install and apply the CEF collector**, or from the text below:
42+
43+
`sudo wget https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py [WorkspaceID] [Workspace Primary Key]`
3644

37-
1. Run the following script on your proxy machine.
38-
`sudo wget https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py [WorkspaceID] [Workspace Primary Key]`
3945
1. While the script is running, check to make sure you don't get any error or warning messages.
4046

4147
Continue to [STEP 2: Configure your security solution to forward CEF messages](connect-cef-solution-config.md) .
4248

49+
## Deployment script explained
50+
51+
The following is a command-by-command description of the actions of the deployment script.
52+
53+
**Downloading and installing the Log Analytics agent:**
54+
55+
56+
|Action |Command |
57+
|--------------|-------------------|
58+
|Downloads the installation script for the Log Analytics (OMS) Linux agent|`wget https://raw.githubusercontent.com/Microsoft/OMS-Agent-for-Linux/master/installer/scripts/onboard_agent.sh`|
59+
|Installs the Log Analytics agent|`sh onboard_agent.sh -w [workspaceID] -s [Primary Key] -d opinsights.azure.com`|
60+
61+
**Configuring the Syslog daemon:**
62+
|Action |rsyslog daemon |syslog-ng daemon |
63+
|--------------|-------------------|-------------------|
64+
|Open port 514 for TCP communication<br>using syslog configuration file|`/etc/rsyslog.conf`|`/etc/syslog-ng/syslog-ng.conf`|
65+
|Configure the daemon to forward CEF messages<br>to the Log Analytics agent on localhost, on TCP port 25226, by inserting a special omsagent configuration file into the syslog daemon directory|`/etc/rsyslog.d/security-config-omsagent.conf`|`/etc/syslog-ng/conf.d/security-config-omsagent.conf`|
66+
|File contents:|`:rawmsg, regex, "CEF\|ASA" ~`<br>`*.* @@127.0.0.1:25226`|`filter f_oms_filter {match(\"CEF\|ASA\" ) ;};`<br>
67+
- syslog-ng:
4368

4469
## Next steps
45-
In this document, you learned how to connect CEF appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
70+
In this document, you learned how to deploy the Log Analytics agent to connect CEF appliances to Azure Sentinel. To learn more about Azure Sentinel, see the following articles:
4671
- Learn how to [get visibility into your data, and potential threats](quickstart-get-visibility.md).
4772
- Get started [detecting threats with Azure Sentinel](tutorial-detect-threats.md).
4873

0 commit comments

Comments
 (0)