You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[Configure Your Service](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/configure-your-service.html)
22
22
*[Prerequisite IAM Policies](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/prerequisite-iam-policies.html)
23
23
*[Enable Access to Logging Analytics and Its Resources](https://docs.oracle.com/en-us/iaas/logging-analytics/doc/enable-access-logging-analytics-and-its-resources.html)
*[Ingest OCI VCN Flow Logs into OCI Logging Analytics](https://blogs.oracle.com/observability/post/how-to-ingest-oci-vcn-flow-logs-into-oci-logging-analytics)
26
27
*[Ingest OCI Audit logs into OCI Logging Analytics](https://redthunder.blog/2021/06/01/getting-insights-with-oci-audit-log-with-logging-analytics-via-service-connector/)
27
28
28
-
### Enable Threat Intelligence Integration
29
-
Logging Analytics is integrated with Oracle Threat Intelligence to automatically receive the threat feed as the logs are ingested. The feature is available for all the log sources in the regions where both Logging Analytics and Oracle Threat Intelligence services are enabled. The Threat IPs widget makes use of this feature, which is not enabled by default.
30
-
To enable:
31
-
1. In OCI console, Navigate to Observability and Management -> Logging Analytics->Administration
32
-
2. Click on “Sources”. in search box in the top right, search for “vcn”. You should get 2 sources: “OCI VCN Flow Unified Schema Logs” and “OCI VCN Flow Logs”
33
-
3. Edit each source. On the Edit screen, click the “Field Enrichment” tab. Ensure the "Enabled" checkbox is checked for the "Geo location" function
34
-
4. Edit the "Geo location" function by clicking the three dots, and check "Threat Intelligence enrichment" checkbox.
35
-
5. If it is not, check the checkbox and click "Save Changes"
Logging Analytics is integrated with Oracle Threat Intelligence to automatically receive the threat feed as the logs are ingested. The feature is available for all the log sources in the regions where both Logging Analytics and Oracle Threat Intelligence services are enabled. The Threat IPs widget makes use of this feature, which is not enabled by default.
31
+
To enable:
32
+
33
+
1. In OCI console, Navigate to Observability and Management -> Logging Analytics->Administration
34
+
2. Click on “Sources”. in search box in the top right, search for “vcn”. You should get 2 sources: “OCI VCN Flow Unified Schema Logs” and “OCI VCN Flow Logs”
35
+
3. Edit each source. On the Edit screen, click the “Field Enrichment” tab. Ensure the "Enabled" checkbox is checked for the "Geo location" function
36
+
4. Edit the "Geo location" function by clicking the three dots, and check "Threat Intelligence enrichment" checkbox.
37
+
5. If it is not, check the checkbox and click "Save Changes"
Download the files to your local workstation. There are 3 files with “.json” extension corresponding to the 3 security dashboards
40
42
1. Identity Security: Identity Security.json
41
43
2. Network Security: Network Security.json
@@ -54,8 +56,8 @@ Follow these steps to import the JSON files:
54
56
55
57
It may take some time for the data to start flowing into the dashboard. You will not see any data unless there are activities on the target system(s) that would be picked up by the corresponding widget/query.
56
58
57
-
### Security Analytics Dashboards Visulization
58
-
You can now use Security Analytics Dashboards to detect security threats and issues in OCI tenany. For example, Threat IPs detected in VCN Flow Logs accessing OCI cloud resources or spikes detected in Network Ingress Traffic from Public IPs need further investigation from the security teams to mitigate security risks across your tenancy.
59
+
### Security Fundamentals Dashboards Visulization
60
+
You can now use Security Fundamentals Dashboards to detect security threats and issues in OCI tenany. For example, Threat IPs detected in VCN Flow Logs accessing OCI cloud resources or spikes detected in Network Ingress Traffic from Public IPs need further investigation from the security teams to mitigate security risks across your tenancy.
0 commit comments