Skip to content

Commit dafa015

Browse files
authored
Merge pull request #8898 from wazuh/enhancement/302-msgraph-api-update
add extra step and images to ms-graph-api-setup.rst
2 parents fcf38a8 + 32756a6 commit dafa015

File tree

4 files changed

+33
-3
lines changed

4 files changed

+33
-3
lines changed

CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ All notable changes to this project will be documented in this file.
2626
- **Post-release**: Added a Q&A to the Cloud service FAQ section. ([#8832](https://github.com/wazuh/wazuh-documentation/pull/8832))
2727
- **Post-release**: Added agent restart commands to Agent enrollment methods section. ([#8836](https://github.com/wazuh/wazuh-documentation/pull/8836))
2828
- **Post-release**: Added Wazuh Docker support for Windows. ([#8852](https://github.com/wazuh/wazuh-documentation/pull/8852))
29+
- **Post-release**: Added new steps and images to the API Permission section of the *Wazuh Microsoft Graph API* setup documentation. ([#8898](https://github.com/wazuh/wazuh-documentation/pull/8898))
2930

3031
### Changed
3132

source/cloud-security/azure/ms-graph-api-setup.rst

Lines changed: 32 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,12 @@ Your application needs specific API permissions to retrieve logs and events from
5757

5858
To configure the application permissions, go to the **API permissions** page and choose **Add a permission**.
5959

60-
#. Select **Microsoft Graph API** and click on **Application permissions**.
60+
#. Select **Microsoft Graph API** and click on **Application permissions**:
61+
62+
.. thumbnail:: /images/cloud-security/ms-graph/select-api-permissions.png
63+
:align: center
64+
:width: 80%
65+
6166
#. Add the following relationships' permissions under the **SecurityAlert** and **SecurityIncident** sections:
6267

6368
- ``SecurityAlert.Read.All``: This permission is required to read security alerts from the ``/security/alerts_v2`` API on your tenant.
@@ -78,10 +83,18 @@ To configure the application permissions, go to the **API permissions** page and
7883
:alt: API permissions Intune
7984
:align: center
8085
:width: 100%
86+
87+
#. Use an admin user to **Grant admin consent** for the tenant:
8188

82-
.. note::
89+
.. thumbnail:: /images/cloud-security/ms-graph/grant-admin-consent.png
90+
:title: API permissions Intune
91+
:alt: API permissions Intune
92+
:align: center
93+
:width: 100%
8394

84-
Admin consent is required for API permission changes.
95+
.. note::
96+
97+
Admin consent is required for API permission changes.
8598

8699
Wazuh server or agent
87100
---------------------
@@ -133,6 +146,22 @@ Next, we will see the necessary configuration to allow the integration to succes
133146
- ``<name>`` specifies the resource's name (i.e., specific API endpoint) to query for logs.
134147
- ``<relationship>`` specifies the types of content (relationships) to obtain logs for.
135148

149+
#. Restart your Wazuh server or agent, depending on where you configured the Wazuh module for Microsoft Graph.
150+
151+
.. tabs::
152+
153+
.. tab:: Wazuh agent
154+
155+
.. code-block:: console
156+
157+
# systemctl restart wazuh-agent
158+
159+
.. tab:: Wazuh manager
160+
161+
.. code-block:: console
162+
163+
# systemctl restart wazuh-manager
164+
136165
.. note::
137166

138167
Multi-tenant is not supported. You can only configure one block of ``api_auth``. To learn more about the Wazuh module for Microsoft Graph options, see the :doc:`ms-graph </user-manual/reference/ossec-conf/ms-graph-module>` reference.
174 KB
Loading
138 KB
Loading

0 commit comments

Comments
 (0)