Skip to content

Commit 7759938

Browse files
committed
Fix: Lab 07 Ex03 - Connect Linux Defender
1 parent ee5e0bd commit 7759938

File tree

1 file changed

+28
-28
lines changed

1 file changed

+28
-28
lines changed

Instructions/Labs/LAB_AK_07_Lab1_Ex03_Connect_Linux_Defender.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ You are a Security Operations Analyst working at a company that implemented Micr
3030

3131
In this task, you'll access your Microsoft Sentinel workspace.
3232

33-
>**Note:** Microsoft Sentinel has been predeployed in your Azure subscription with the name **sentinelworkspace-01**, and the required *Content Hub* solutions have been installed.
33+
>**Note:** Microsoft Sentinel has been predeployed in your Azure subscription with the name **sentinelworkspace-01**, and the required *Content hub* solutions have been installed.
3434
35-
1. Log in to **WIN1** virtual machine as Admin with the password: **Pa55w.rd**.
35+
1. Sign in to **WIN1** virtual machine as Admin using the provided credentials.
3636

3737
1. Open the Microsoft Edge browser.
3838

@@ -61,7 +61,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Commo
6161
1. Enter the following PowerShell command, adjusting for your specific Linux server information, and press enter:
6262

6363
```PowerShell
64-
ssh insert-your-linux-IP-address-here -l insert-linux-user-name-here
64+
ssh <insert-your-linux-IP-address-here> -l <insert-linux-user-name-here>
6565
```
6666
6767
1. Enter *yes* to confirm the connection and then type the user's password and press enter. Your screen should look something like this:
@@ -78,7 +78,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Commo
7878
7979
1. Type **Enter** to run the command (this may take a couple minutes).
8080
81-
1. In the *To sign in, use a web browser to open the page <https://microsoft.com/devicelogin> and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
81+
1. In the *To sign in, use a web browser to open the page `https://microsoft.com/devicelogin` and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
8282
8383
![Linux azcmagent device login](../Media/device-login.png)
8484
@@ -104,39 +104,39 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Commo
104104
105105
1. In the Microsoft Defender navigation menu, scroll down and expand the **Microsoft Sentinel** section.
106106
107-
1. Expand the **Content management** section and select **Content Hub**.
107+
1. Expand the **Content management** section and select **Content hub**.
108108
109-
1. In the *Content hub*, search for the **Common Event Format** solution and select it from the list.
109+
1. In the **Content hub**, search for the **Common Event Format** solution and select it from the list.
110110
111-
1. On the *Common Event Format* solution page select **Manage**.
111+
1. On the **Common Event Format** solution page select **Manage**.
112112
113113
>**Note:** The *Common Event Format* solution installs both the *Common Events Format (CEF) via AMA* and the *Common Events Format (CEF) via Legacy Agent* Data connectors.
114114
115-
1. Select the *Common Events Format (CEF) via AMA* Data connector, and select **Open connector page** on the connector information blade.
115+
1. Select the **Common Events Format (CEF) via AMA** Data connector, and select **Open connector page** on the connector information blade.
116116
117-
1. In the *Configuration* section, select the **+Create data collection rule** button.
117+
1. In the **Configuration** section, select the **+Create data collection rule** button.
118118
119119
>**Important:** You need to enter a unique name for the Rule Name, consider using your *Student* username number, for example, **AZLINxxxxxxxxDCR**.
120120
121-
1. On the *Create data collection rule* page, *Basic* tab, enter **AZLINxxxxxxxxDCR** for Rule Name, then select **Next: Resources**.
121+
1. On the **Create data collection rule** page, in the **Basic** tab, enter **AZLINxxxxxxxxDCR** for Rule Name, then select **Next: Resources**.
122122
123-
1. On the *Resources* tab, expand your *MOC Subscription* under *Scope*.
123+
1. On the **Resources** tab, expand your *MOC Subscription* under *Scope*.
124124
125125
>**Hint:** You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
126126
127127
1. Expand **SentinelStatic**, then select **LIN1**.
128128
129-
>**Note:** You're *LIN1* virtual machine may appear with a different name, like ubuntuxxx.
129+
>**Note:** Your *LIN1* virtual machine may appear with a different name, like ubuntuxxx.
130130
131-
1. Select **Next: Collect**. In the *Collect* tab, select the *LOG_ALERT* drop-down menu, and select **LOG_WARNING**.
131+
1. Select **Next: Collect**. In the **Collect** tab, select the **LOG_ALERT** drop-down menu, and select **LOG_WARNING**.
132132
133133
1. Select **Next: Review + create**, and select **Create**. Wait for the deployment to finish.
134134
135135
>**Note:** You may need to refresh the page.
136136
137137
1. The *Common Event Format (CEF) via AMA* Data connector should now show **Connected**.
138138
139-
1. The data collection rule installs the Azure Monitor Agent (AMA), and the The *CEF collector* install commands were pre-deployed on the LIN1 machine to install the CEF collector.
139+
1. The data collection rule installs the Azure Monitor Agent (AMA), and the *CEF collector* install commands were pre-deployed on the LIN1 machine to install the CEF collector.
140140
141141
1. Return to the *PowerShell Command Prompt* window. You should still be connected to the LIN1 virtual machine.
142142
@@ -169,7 +169,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Syslo
169169
1. Enter the following PowerShell command, adjusting for your specific Linux server information, and press enter:
170170
171171
```PowerShell
172-
ssh insert-your-linux-IP-address-here -l insert-linux-user-name-here
172+
ssh <insert-your-linux-IP-address-here> -l <insert-linux-user-name-here>
173173
```
174174
175175
1. Enter *yes* to confirm the connection and then type the user's password and press enter. Your screen should look something like this:
@@ -186,7 +186,7 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Syslo
186186
187187
1. Type **Enter** to run the command (this may take a couple minutes).
188188
189-
1. In the *To sign in, use a web browser to open the page <https://microsoft.com/devicelogin> and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
189+
1. In the *To sign in, use a web browser to open the page `https://microsoft.com/devicelogin` and enter the code* message, Ctrl+Click the link to open the device login page. Copy the code provided and paste it into the *Enter code to allow access* box and select **Next**.
190190
191191
![Linux azcmagent device login](../Media/device-login.png)
192192
@@ -206,49 +206,49 @@ In this task, you will connect a Linux host to Microsoft Sentinel with the Syslo
206206
207207
1. Start the Microsoft Edge browser.
208208
209-
1. In the Microsoft Edge browser, navigate to the [Microsoft Defender portal](https://security.microsoft.com).
209+
1. In the Microsoft Edge browser, navigate to the Microsoft Defender portal at `https://security.microsoft.com`.
210210
211211
1. In the **Sign in** dialog box, copy, and paste in the **Tenant Email** account provided by your lab hosting provider and then select **Next**.
212212
213213
1. In the **Enter password** dialog box, copy, and paste in the **Tenant Password** provided by your lab hosting provider and then select **Sign in**.
214214
215215
>**Note:** You may be prompted to enter the *Temporary Access Pass* (TAP) instead of a password.
216216
217-
1. In the Microsoft Defender navigation menu, scroll down and expand Microsoft Sentinel
217+
1. In the Microsoft Defender navigation menu, scroll down and expand **Microsoft Sentinel**.
218218
219-
1. In the Microsoft Sentinel navigation menus, scroll down to the *Content management* section and select **Content Hub**.
219+
1. In the Microsoft Sentinel navigation menus, scroll down to the **Content management** section and select **Content hub**.
220220
221-
1. In the *Content hub*, search for the **Syslog** solution and select it from the list.
221+
1. In the **Content hub**, search for the **Syslog** solution and select it from the list.
222222
223-
1. On the *Syslog* solution page select **Manage**.
223+
1. On the **Syslog** solution page select **Manage**.
224224
225225
>**Note:** The *Syslog* solution installs two *Syslog* Data connector, 7 Analytics rules, 9 Hunting queries, 2 Parsers and 21 Workbooks.
226226
227-
1. Select the *Syslog via AMA* Data connector, and select **Open connector page** on the connector information blade
227+
1. Select the **Syslog via AMA** Data connector, and select **Open connector page** on the connector information blade.
228228
229-
1. In the *Configuration* section, select **+Create data collection rule**.
229+
1. In the **Configuration** section, select **+Create data collection rule**.
230230
231231
>**Important:** You need to enter a unique name for the Rule Name, consider using your *Student* username number, for example, **AZLINxxxxxxxxDCR2**.
232232
233-
1. On the *Create data collection rule* page, *Basic* tab, enter **AZLINxxxxxxxxDCR2** for Rule Name, then select **Next: Resources**.
233+
1. On the **Create data collection rule** page, in the **Basic** tab, enter **AZLINxxxxxxxxDCR2** for Rule Name, then select **Next: Resources**.
234234
235-
1. On the *Resources* tab, expand your *MOC Subscription* under *Scope*.
235+
1. On the **Resources** tab, expand your *MOC Subscription* under *Scope*.
236236
237237
>**Hint:** You can expand the whole *Scope* hierarchy by selecting the ">" before the *Scope* column.
238238
239239
1. Expand **SentinelStatic**, then select **LIN2**.
240240
241-
>**Note:** You're *LIN2* virtual machine may appear with a different name, like ubuntuxxx.
241+
>**Note:** Your *LIN2* virtual machine may appear with a different name, like ubuntuxxx.
242242
243-
1. Select **Next: Collect**. In the *Collect* tab, select the *LOG_ALERT* drop-down menu, and select **LOG_WARNING**.
243+
1. Select **Next: Collect**. In the **Collect** tab, select the **LOG_ALERT** drop-down menu, and select **LOG_WARNING**.
244244
245245
1. Select **Next: Review + create**, and select **Create**. Wait for the deployment to finish.
246246
247247
1. The *Syslog via AMA* Data connector should now show **Connected**.
248248
249249
>**Note:** You may need to refresh the page.
250250
251-
1. The data collection rule installs the Azure Monitor Agent (AMA), and the The *AMA Forwarder* install commands were pre-deployed on the LIN2 machine to install the AMA Forwarder.
251+
1. The data collection rule installs the Azure Monitor Agent (AMA), and the *AMA Forwarder* install commands were pre-deployed on the LIN2 machine to install the AMA Forwarder.
252252
253253
1. Return to the *PowerShell Command Prompt* window. You should still be connected to the LIN2 virtual machine.
254254

0 commit comments

Comments
 (0)