- This topic is empty.
- Post
-
- December 14, 2024 at 4:01 pm
Weekend WikiKeymasterLet’s go through a step-by-step guide to connect a data source to Microsoft Sentinel, using a practical example. I’ll take AWS CloudTrail as the data source, but this can be adapted to other sources.
Step-by-Step: Connect AWS CloudTrail to Microsoft Sentinel
Step 1: Prerequisites
Ensure the following are in place:
- Azure Sentinel Workspace:
- A Log Analytics Workspace connected to Microsoft Sentinel.
- AWS Permissions:
- An AWS account with administrator permissions or specific permissions to configure CloudTrail.
- CloudTrail enabled in AWS:
- AWS CloudTrail is used to track API calls and events in AWS.
Step 2: Open Microsoft Sentinel
- Sign in to the Azure portal.
- Navigate to Microsoft Sentinel.
- Select the Sentinel workspace you want to connect data to.
Step 3: Access Data Connectors
- In the Sentinel dashboard, select Data connectors from the left-hand menu under the Configuration section.
- Use the search bar to look for AWS CloudTrail.
- Click on the AWS CloudTrail connector.
Step 4: Configure the AWS CloudTrail Connector
- In the connector interface, click Open connector page.
- Review the connector’s Prerequisites section, which outlines permissions, regions, and configuration details.
Connector Configuration Steps:
- Step 4.1: Set Up an AWS IAM Role
- In the AWS Management Console:
- Go to the IAM service.
- Create a new IAM Role:
- Select Another AWS Account as the trusted entity.
- Enter the Microsoft Sentinel AWS Account ID and an External ID (provided by the connector page in Azure Sentinel).
- Attach the AWS managed policy:
AWSCloudTrailReadOnlyAccess
.
- Copy the Role ARN from AWS.
- In the AWS Management Console:
- Step 4.2: Configure CloudTrail
- Ensure AWS CloudTrail is enabled in your AWS account.
- If not:
- Go to the CloudTrail service in AWS.
- Create a trail and configure it to send logs to an S3 bucket.
Step 5: Link Sentinel to AWS
- In the Microsoft Sentinel connector configuration page:
- Enter the AWS Role ARN you copied earlier.
- Specify the Region and CloudTrail S3 bucket name.
- Test the connection to verify access.
- Once validated, click Save to establish the connection.
Step 6: Validate Data Ingestion
- Open the Logs section in Sentinel.
- Run the following KQL query to check if CloudTrail logs are being ingested:
AWSCloudTrail | take 10
- Confirm that logs are showing up in the query results.
Step 7: Enable Analytics Rules (Optional)
- Go to the Analytics section in Sentinel.
- Enable pre-built analytics rules provided for AWS CloudTrail:
- Example: Detect unauthorized access attempts.
- Adjust rule thresholds and alerts based on your organization’s requirements.
Step 8: Set Up Dashboards (Optional)
- Go to the Workbooks section in Sentinel.
- Search for and deploy the AWS CloudTrail Workbook.
- This provides a visual dashboard for monitoring CloudTrail events.
Generalization for Other Data Sources
For other sources (e.g., Syslog, Palo Alto), replace the AWS-specific steps with:
- Syslog/CEF: Configure a Linux VM with a Log Analytics agent to act as a Syslog forwarder.
- Third-Party APIs: Use API credentials and tokens to link Sentinel with platforms like Okta, Salesforce, or ServiceNow.
Would you like this walkthrough for a different data source? Let me know!
- You must be logged in to reply to this topic.