You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/secure-sap-microsoft-cloud/includes/4-microsoft-sentinel-security-rise.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,19 +4,19 @@ The SAP RISE certified Microsoft Sentinel solution for SAP applications allows y
4
4
5
5
The solution allows you to gain visibility to user activities on SAP RISE/ECS and the SAP business logic layers and apply Microsoft Sentinel’s built-in content.
6
6
- Use a single console to monitor all your enterprise estate including SAP instances in SAP RISE/ECS on Azure and other clouds, SAP Azure native, and on-premises estate.
7
-
-Detect and automatically respond to threats: Detect suspicious activity including privilege escalation, unauthorized changes, sensitive transactions, data exfiltration and more with out-of-the-box detection capabilities.
8
-
-Correlate SAP activity with other signals: More accurately detect SAP threats by cross-correlating across endpoints, Microsoft Entra data and more.
9
-
-Customize based on your needs - build your own detections to monitor sensitive transactions and other business risks.
10
-
-Visualize the data with [built-in workbooks](/azure/sentinel/sap/sap-audit-log-workbook).
7
+
-Detect and automatically respond to threats: Detect suspicious activity including privilege escalation, unauthorized changes, sensitive transactions, data exfiltration and more with out-of-the-box detection capabilities.
8
+
-Correlate SAP activity with other signals: More accurately detect SAP threats by cross-correlating across endpoints, Microsoft Entra data and more.
9
+
-Customize based on your needs - build your own detections to monitor sensitive transactions and other business risks.
10
+
-Visualize the data with [built-in workbooks](/azure/sentinel/sap/sap-audit-log-workbook).
11
11
12
12
:::image type="content" source="../media/sap-rise-sentinel.png" alt-text="Diagram that shows how to connect Microsoft Sentinel with SAP RISE/ECS.":::
13
13
This diagram shows an example of Microsoft Sentinel connected through an intermediary VM or container to SAP managed SAP system. The intermediary VM or container runs in customer's own subscription with configured SAP data connector agent. Connection to SAP Business Technology Platform (BTP) uses SAP's public APIs for the Audit Log Management Service.
14
14
15
15
For SAP RISE/ECS, the Microsoft Sentinel solution must be deployed in customer's Azure subscription. All parts of the Microsoft Sentinel solution are managed by customer and not by SAP. Private network connectivity from customer's vnet is needed to reach the SAP landscapes managed by SAP RISE/ECS. Typically, this connection is over the established vnet peering or through alternatives described in this document.
16
16
17
17
To enable the solution, only an authorized RFC user is required and nothing needs to be installed on the SAP systems. The container-based [SAP data collection agent](/azure/sentinel/sap/deployment-overview?tabs=agent) included with the solution can be installed either on VM or AKS/any Kubernetes environment. The collector agent uses an SAP service user to consume application log data from your SAP landscape through RFC interface using standard RFC calls.
18
-
- Authentication methods supported in SAP RISE: SAP username and password or X509/SNC certificates
19
-
- Only RFC based connections are possible currently with SAP RISE/ECS environments
18
+
- Authentication methods supported in SAP RISE: SAP username and password or X509/SNC certificates.
19
+
- Only RFC based connections are possible currently with SAP RISE/ECS environments.
0 commit comments