You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Instructions/Labs/LAB_AK_07_Lab1_Ex03_Connect_Linux_Defender.md
+28-28Lines changed: 28 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,9 +30,9 @@ You are a Security Operations Analyst working at a company that implemented Micr
30
30
31
31
In this task, you'll access your Microsoft Sentinel workspace.
32
32
33
-
>**Note:** Microsoft Sentinel has been predeployed in your Azure subscription with the name **sentinelworkspace-01**, and the required *Content Hub* solutions have been installed.
33
+
>**Note:** Microsoft Sentinel has been predeployed in your Azure subscription with the name **sentinelworkspace-01**, and the required *Content hub* solutions have been installed.
34
34
35
-
1.Log in to **WIN1** virtual machine as Admin with the password: **Pa55w.rd**.
35
+
1.Sign in to **WIN1** virtual machine as Admin using the provided credentials.
36
36
37
37
1. Open the Microsoft Edge browser.
38
38
@@ -61,7 +61,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Commo
61
61
1. Enter the following PowerShell command, adjusting for your specific Linux server information, and press enter:
1. Enter *yes* to confirm the connection and then type the user's password and press enter. Your screen should look something like this:
@@ -78,7 +78,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Commo
78
78
79
79
1. Type **Enter** to run the command (this may take a couple minutes).
80
80
81
-
1. In the *To sign in, use a web browser to open the page <https://microsoft.com/devicelogin> and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
81
+
1. In the *To sign in, use a web browser to open the page `https://microsoft.com/devicelogin` and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
@@ -104,39 +104,39 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Commo
104
104
105
105
1. In the Microsoft Defender navigation menu, scroll down and expand the **Microsoft Sentinel** section.
106
106
107
-
1. Expand the **Content management** section and select **Content Hub**.
107
+
1. Expand the **Content management** section and select **Content hub**.
108
108
109
-
1. In the *Content hub*, search for the **Common Event Format** solution and select it from the list.
109
+
1. In the **Content hub**, search for the **Common Event Format** solution and select it from the list.
110
110
111
-
1. On the *Common Event Format* solution page select **Manage**.
111
+
1. On the **Common Event Format** solution page select **Manage**.
112
112
113
113
>**Note:** The *Common Event Format* solution installs both the *Common Events Format (CEF) via AMA* and the *Common Events Format (CEF) via Legacy Agent* Data connectors.
114
114
115
-
1. Select the *Common Events Format (CEF) via AMA* Data connector, and select **Open connector page** on the connector information blade.
115
+
1. Select the **Common Events Format (CEF) via AMA** Data connector, and select **Open connector page** on the connector information blade.
116
116
117
-
1. In the *Configuration* section, select the **+Create data collection rule** button.
117
+
1. In the **Configuration** section, select the **+Create data collection rule** button.
118
118
119
119
>**Important:** You need to enter a unique name for the Rule Name, consider using your *Student* username number, for example, **AZLINxxxxxxxxDCR**.
120
120
121
-
1. On the *Create data collection rule* page, *Basic* tab, enter **AZLINxxxxxxxxDCR** for Rule Name, then select **Next: Resources**.
121
+
1. On the **Create data collection rule** page, in the **Basic** tab, enter **AZLINxxxxxxxxDCR** for Rule Name, then select **Next: Resources**.
122
122
123
-
1. On the *Resources* tab, expand your *MOC Subscription* under *Scope*.
123
+
1. On the **Resources** tab, expand your *MOC Subscription* under *Scope*.
124
124
125
125
>**Hint:** You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
126
126
127
127
1. Expand **SentinelStatic**, then select **LIN1**.
128
128
129
-
>**Note:** You're *LIN1* virtual machine may appear with a different name, like ubuntuxxx.
129
+
>**Note:** Your *LIN1* virtual machine may appear with a different name, like ubuntuxxx.
130
130
131
-
1. Select **Next: Collect**. In the *Collect* tab, select the *LOG_ALERT* drop-down menu, and select **LOG_WARNING**.
131
+
1. Select **Next: Collect**. In the **Collect** tab, select the **LOG_ALERT** drop-down menu, and select **LOG_WARNING**.
132
132
133
133
1. Select **Next: Review + create**, and select **Create**. Wait for the deployment to finish.
134
134
135
135
>**Note:** You may need to refresh the page.
136
136
137
137
1. The *Common Event Format (CEF) via AMA* Data connector should now show **Connected**.
138
138
139
-
1. The data collection rule installs the Azure Monitor Agent (AMA), and the The *CEF collector* install commands were pre-deployed on the LIN1 machine to install the CEF collector.
139
+
1. The data collection rule installs the Azure Monitor Agent (AMA), and the *CEF collector* install commands were pre-deployed on the LIN1 machine to install the CEF collector.
140
140
141
141
1. Return to the *PowerShell Command Prompt* window. You should still be connected to the LIN1 virtual machine.
142
142
@@ -169,7 +169,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Syslo
169
169
1. Enter the following PowerShell command, adjusting for your specific Linux server information, and press enter:
1. Enter *yes* to confirm the connection and then type the user's password and press enter. Your screen should look something like this:
@@ -186,7 +186,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Syslo
186
186
187
187
1. Type **Enter** to run the command (this may take a couple minutes).
188
188
189
-
1. In the *To sign in, use a web browser to open the page <https://microsoft.com/devicelogin> and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
189
+
1. In the *To sign in, use a web browser to open the page `https://microsoft.com/devicelogin` and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
@@ -206,49 +206,49 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Syslo
206
206
207
207
1. Start the Microsoft Edge browser.
208
208
209
-
1. In the Microsoft Edge browser, navigate to the [Microsoft Defender portal](https://security.microsoft.com).
209
+
1. In the Microsoft Edge browser, navigate to the Microsoft Defender portal at `https://security.microsoft.com`.
210
210
211
211
1. In the **Sign in** dialog box, copy, and paste in the **Tenant Email** account provided by your lab hosting provider and then select **Next**.
212
212
213
213
1. In the **Enter password** dialog box, copy, and paste in the **Tenant Password** provided by your lab hosting provider and then select **Sign in**.
214
214
215
215
>**Note:** You may be prompted to enter the *Temporary Access Pass* (TAP) instead of a password.
216
216
217
-
1. In the Microsoft Defender navigation menu, scroll down and expand Microsoft Sentinel
217
+
1. In the Microsoft Defender navigation menu, scroll down and expand **Microsoft Sentinel**.
218
218
219
-
1. In the Microsoft Sentinel navigation menus, scroll down to the *Content management* section and select **Content Hub**.
219
+
1. In the Microsoft Sentinel navigation menus, scroll down to the **Content management** section and select **Content hub**.
220
220
221
-
1. In the *Content hub*, search for the **Syslog** solution and select it from the list.
221
+
1. In the **Content hub**, search for the **Syslog** solution and select it from the list.
222
222
223
-
1. On the *Syslog* solution page select **Manage**.
223
+
1. On the **Syslog** solution page select **Manage**.
224
224
225
225
>**Note:** The *Syslog* solution installs two *Syslog* Data connector, 7 Analytics rules, 9 Hunting queries, 2 Parsers and 21 Workbooks.
226
226
227
-
1. Select the *Syslog via AMA* Data connector, and select **Open connector page** on the connector information blade
227
+
1. Select the **Syslog via AMA** Data connector, and select **Open connector page** on the connector information blade.
228
228
229
-
1. In the *Configuration* section, select **+Create data collection rule**.
229
+
1. In the **Configuration** section, select **+Create data collection rule**.
230
230
231
231
>**Important:** You need to enter a unique name for the Rule Name, consider using your *Student* username number, for example, **AZLINxxxxxxxxDCR2**.
232
232
233
-
1. On the *Create data collection rule* page, *Basic* tab, enter **AZLINxxxxxxxxDCR2** for Rule Name, then select **Next: Resources**.
233
+
1. On the **Create data collection rule** page, in the **Basic** tab, enter **AZLINxxxxxxxxDCR2** for Rule Name, then select **Next: Resources**.
234
234
235
-
1. On the *Resources* tab, expand your *MOC Subscription* under *Scope*.
235
+
1. On the **Resources** tab, expand your *MOC Subscription* under *Scope*.
236
236
237
237
>**Hint:** You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
238
238
239
239
1. Expand **SentinelStatic**, then select **LIN2**.
240
240
241
-
>**Note:** You're *LIN2* virtual machine may appear with a different name, like ubuntuxxx.
241
+
>**Note:** Your *LIN2* virtual machine may appear with a different name, like ubuntuxxx.
242
242
243
-
1. Select **Next: Collect**. In the *Collect* tab, select the *LOG_ALERT* drop-down menu, and select **LOG_WARNING**.
243
+
1. Select **Next: Collect**. In the **Collect** tab, select the **LOG_ALERT** drop-down menu, and select **LOG_WARNING**.
244
244
245
245
1. Select **Next: Review + create**, and select **Create**. Wait for the deployment to finish.
246
246
247
247
1. The *Syslog via AMA* Data connector should now show **Connected**.
248
248
249
249
>**Note:** You may need to refresh the page.
250
250
251
-
1. The data collection rule installs the Azure Monitor Agent (AMA), and the The *AMA Forwarder* install commands were pre-deployed on the LIN2 machine to install the AMA Forwarder.
251
+
1. The data collection rule installs the Azure Monitor Agent (AMA), and the *AMA Forwarder* install commands were pre-deployed on the LIN2 machine to install the AMA Forwarder.
252
252
253
253
1. Return to the *PowerShell Command Prompt* window. You should still be connected to the LIN2 virtual machine.
0 commit comments