Skip to content

Commit e73f1ee

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/learn-pr (branch live)
2 parents ead739e + cf2fab0 commit e73f1ee

8 files changed

Lines changed: 52 additions & 70 deletions

learn-pr/wwl-azure/design-application-architecture/includes/11-summary-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Copilot can assist you in designing Azure infrastructure solutions. Copilot can
2828

2929
- Discover [Azure API Management](/azure/api-management/api-management-key-concepts).
3030

31-
- Discover [Azure Cache for Redis](/azure/azure-cache-for-redis/cache-overview).
31+
- Discover [Azure Managed Redis](/azure/redis/overview).
3232

3333
## Learn more with self-paced training
3434

learn-pr/wwl-sci/connect-common-event-format-logs-to-azure-sentinel/2-plan-for-common-event-format-cef-connector.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Plan for Common Event Format connector
44
metadata:
55
title: Plan for Common Event Format connector
66
description: "Plan for Common Event Format connector"
7-
ms.date: 02/11/2025
7+
ms.date: 04/17/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/connect-common-event-format-logs-to-azure-sentinel/3-connect-your-external-solution-use-common-event-format-connector.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Connect your external solution using the Common Event Format connector
44
metadata:
55
title: Connect your external solution using the Common Event Format connector
66
description: "Connect your external solution using the Common Event Format connector"
7-
ms.date: 01/19/2023
7+
ms.date: 04/17/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/connect-common-event-format-logs-to-azure-sentinel/5-summary-resources.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary and resources
44
metadata:
55
title: Summary and resources
66
description: "Summary and resources"
7-
ms.date: 01/19/2023
7+
ms.date: 04/17/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit
Lines changed: 24 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,66 +1,46 @@
1-
The CEF Connector deploys a Syslog Forwarder server to support the communication between the appliance and Microsoft Sentinel. The server consists of a dedicated Linux machine with the Log Analytics agent for Linux installed. Many of the Microsoft Sentinel Data Connectors that are vendor-specific utilize CEF Connector.
1+
The **Common Event Format (CEF) via AMA** connector uses the **Azure Monitor Agent (AMA)** on a dedicated Linux log forwarder to support communication between your network appliances and Microsoft Sentinel. Many vendor-specific Microsoft Sentinel data connectors use CEF via AMA as their collection mechanism.
22

3-
The following diagram displays the setup for a Linux VM in Azure. The on-premises Syslog sources securely send events to an Azure Linux VM. The Linux VM with the Log Analytics agent installed then forwards the logs to the Microsoft Sentinel workspace.
3+
The following diagram illustrates the setup when you use a Linux VM in Azure as the forwarder. On-premises Syslog sources securely send events to the Azure Linux VM. AMA on the Linux VM then forwards the logs to your Microsoft Sentinel workspace.
44

5-
:::image type="content" source="../media/learn-path5-01.png" alt-text="Diagram of the Azure VM hosting Syslog connector architecture.":::
5+
:::image type="content" source="../media/learn-path5-01.png" alt-text="Diagram of an Azure VM used as a Syslog forwarder to Microsoft Sentinel.":::
66

7-
Alternatively, the following diagram displays the setup if you use a VM in another cloud or an on-premises machine. The on-premises Syslog sources securely send events to a Linux VM. The Linux VM with the Log Analytics agent installed then securely forwards the logs to the Microsoft Sentinel workspace.
7+
Alternatively, you can use a VM in another cloud or an on-premises machine as the forwarder. Syslog sources securely send events to the Linux VM with AMA installed, which then securely forwards the logs to your Microsoft Sentinel workspace.
88

9-
:::image type="content" source="../media/learn-path5-02.png" alt-text="Diagram of the on-premises Syslog connector architecture.":::
9+
:::image type="content" source="../media/learn-path5-02.png" alt-text="Diagram of an on-premises machine used as a Syslog forwarder to Microsoft Sentinel.":::
1010

1111
## Security considerations
1212

13-
Make sure to configure the machine's security according to your organization's security policy. For example, you can configure your network to align with your corporate network security policy and change the daemon's ports and protocols to align with your requirements.
13+
Configure the machine's security according to your organization's security policy. For example, configure your network to align with your corporate network security policy and change the daemon's ports and protocols to align with your requirements.
1414

15-
To use TLS communication between the Syslog source and the Syslog Forwarder, you'll need to configure the Syslog daemon (rsyslog or syslog-ng) to communicate in TLS.
15+
To use TLS communication between the Syslog source and the Syslog forwarder, configure the Syslog daemon (rsyslog or syslog-ng) to communicate in TLS.
1616

1717
## Prerequisites
1818

19-
Make sure the Linux machine you use as a log forwarder is running one of the following operating systems:
19+
Make sure the Linux machine you use as a log forwarder is running one of the following 64-bit operating systems:
2020

21-
- 64-bit
21+
- Amazon Linux 2 or 2023
22+
- Oracle Linux 8 or 9
23+
- Red Hat Enterprise Linux (RHEL) Server 8 or 9
24+
- Debian GNU/Linux 10, 11, or 12
25+
- Ubuntu Linux 20.04 LTS, 22.04 LTS, or 24.04 LTS
26+
- SUSE Linux Enterprise Server 15
2227

23-
- Amazon Linux 2017.09
28+
> [!NOTE]
29+
> AMA supports only 64-bit operating systems.
2430
25-
- Oracle Linux 7
31+
Supported Syslog daemon versions:
2632

27-
- Red Hat Enterprise Linux (RHEL) Server 7 and 8, including minor versions (not 6)
33+
- Syslog-ng: 2.1 - 3.22.1
34+
- Rsyslog: v8
2835

29-
- Debian GNU/Linux 8 and 9
36+
Supported Syslog RFCs:
3037

31-
- Ubuntu Linux 14.04 LTS, 16.04 LTS, and 18.04 LTS
38+
- Syslog RFC 3164
39+
- Syslog RFC 5424
3240

33-
- SUSE Linux Enterprise Server 12, 15
41+
Your machine must also meet these requirements:
3442

35-
- 32-bit
36-
37-
- Oracle Linux 7
38-
39-
- Red Hat Enterprise Linux (RHEL) Server 7 and 8, including minor versions (not 6)
40-
41-
- Debian GNU/Linux 8 and 9
42-
43-
- Ubuntu Linux 14.04 LTS and 16.04 LTS
44-
45-
- Daemon versions
46-
47-
- Syslog-ng: 2.1 - 3.22.1
48-
49-
- Rsyslog: v8
50-
51-
- Syslog RFCs supported
52-
53-
- Syslog RFC 3164
54-
55-
- Syslog RFC 5424
56-
57-
Make sure your machine also meets the following requirements:
58-
59-
Permissions
43+
**Permissions**
6044

6145
- You must have elevated permissions (sudo) on your machine.
6246

63-
Software requirements
64-
65-
- Make sure you have python 2.7 or 3 running on your machine.
66-
Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,37 @@
1-
You need to designate and configure a Linux machine to forward the logs from your security solution to your Microsoft Sentinel workspace. This machine can be physical or virtual in your on-premises environment, an Azure VM, or a VM in another cloud. Using the link provided, you'll run a script on the designated machine that performs the following tasks:
1+
You need to designate and configure a Linux machine to forward logs from your security solution to your Microsoft Sentinel workspace. This machine can be physical or virtual in your on-premises environment, an Azure VM, or a VM in another cloud.
22

3-
Installs the Log Analytics agent for Linux (also known as the OMS agent) and configures it for the following purposes:
3+
The **Common Event Format (CEF) via AMA** connector uses a **Data Collection Rule (DCR)** to configure the **Azure Monitor Agent (AMA)** on your Linux forwarder. AMA handles both agent installation and log forwarding — no manual script installation is required.
44

5-
- Listening for CEF messages from the built-in Linux Syslog daemon on TCP port 25226
5+
When configured, AMA on the Linux forwarder:
66

7-
- Sending the messages securely over TLS to your Microsoft Sentinel workspace, where they're parsed and enriched
7+
- Listens for CEF messages from the built-in Linux Syslog daemon on TCP port 514
8+
- Forwards CEF messages to your Microsoft Sentinel workspace, where they're parsed and enriched
89

9-
Configures the built-in Linux Syslog daemon (rsyslog.d/syslog-ng) for the following purposes:
10+
## Set up the CEF via AMA connector
1011

11-
- Listening for Syslog messages from your security solutions on TCP port 514
12+
To configure the connector:
1213

13-
- Forwarding only the messages it identifies as CEF to the Log Analytics agent on localhost using TCP port 25226
14+
1. In the Microsoft Sentinel portal, select **Data connectors**.
1415

15-
## Run the deployment script
16+
1. Search for and select **Common Event Format (CEF) via AMA**.
1617

17-
To view the connector page:
18+
1. Select **Open connector page** on the details pane.
1819

19-
1. Select Data connectors page.
20+
1. Under **Configuration**, select **+Create data collection rule**.
2021

21-
1. Select Common Event Format (CEF).
22+
1. On the **Basic** tab, enter a name for the data collection rule, then select your subscription and resource group.
2223

23-
1. select the Open connector page on the preview pane.
24+
1. On the **Resources** tab, select the Linux machine you designated as the log forwarder.
2425

25-
1. Verify that you have the appropriate permissions as described under Prerequisites.
26+
1. On the **Collect** tab, confirm the CEF facility and log level settings.
2627

27-
1. Copy the "sudo wget …" command and run with elevated permissions on the dedicated Linux VM.
28+
1. Select **Review + create**, then select **Create**. AMA is automatically installed on the Linux forwarder if it isn't already present.
2829

29-
:::image type="content" source="../media/common-event-format-connector.png" alt-text="Screenshot of the C E F Connector Page." lightbox="../media/common-event-format-connector.png":::
30+
1. Configure each network appliance to forward its syslog events to your Linux forwarder on UDP or TCP port 514.
3031

31-
### Using the same machine to forward both plain Syslog and common event format messages
32+
:::image type="content" source="../media/common-event-format-connector.png" alt-text="Screenshot of the Common Event Format via AMA connector page in Microsoft Sentinel." lightbox="../media/common-event-format-connector.png":::
3233

33-
If you plan to use this log forwarder machine to forward Syslog messages as CEF, then to avoid the duplication of events to the Syslog and CommonSecurityLog tables:
34+
## Use the same machine to forward both plain Syslog and CEF messages
3435

35-
On each source machine that sends logs to the forwarder in CEF format, you must edit the Syslog configuration file to remove the facilities used to send CEF messages.
36+
If you plan to use this log forwarder machine to forward both plain Syslog messages and CEF messages, edit the Syslog configuration file on each source machine that sends logs in CEF format. Remove the facilities used to send CEF messages to avoid duplicate events in the Syslog and CommonSecurityLog tables.
3637

learn-pr/wwl-sci/connect-common-event-format-logs-to-azure-sentinel/includes/5-summary-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
You should have learned how to send Common Event Format (CEF) log data to the Microsoft Sentinel workspace using the provided data connector.
1+
You learned how to send Common Event Format (CEF) log data to the Microsoft Sentinel workspace using the provided data connector.
22

33
You should now be able to:
44

@@ -10,6 +10,6 @@ You should now be able to:
1010

1111
You can learn more by reviewing the following.
1212

13-
[Become a Microsoft Sentinel Ninja](https://techcommunity.microsoft.com/t5/azure-sentinel/become-an-azure-sentinel-ninja-the-complete-level-400-training/ba-p/1246310?azure-portal=true)
13+
[Become a Microsoft Sentinel Ninja](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/become-a-microsoft-sentinel-ninja-the-complete-level-400/ba-p/1246310?azure-portal=true)
1414

1515
[Microsoft Tech Community Security Webinars](https://techcommunity.microsoft.com/t5/microsoft-security-and/security-community-webinars/ba-p/927888?azure-portal=true)

learn-pr/wwl-sci/connect-common-event-format-logs-to-azure-sentinel/index.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,16 @@ uid: learn.wwl.connect-common-event-format-cef-logs-to-azure-sentinel
33
metadata:
44
title: Connect Common Event Format logs to Microsoft Sentinel
55
description: "Connect Common Event Format logs to Microsoft Sentinel"
6-
ms.date: 02/11/2025
6+
ms.date: 04/17/2026
77
author: wwlpublish
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
11+
ai-usage: ai-assisted
1112
title: Connect Common Event Format logs to Microsoft Sentinel
1213
summary: Most vendor-provided connectors utilize the CEF connector. Learn about the Common Event Format (CEF) connector's configuration options.
1314
abstract: |
14-
Upon completion of this module, the learner will be able to:
15+
Upon completion of this module, the learner is able to:
1516
- Explain the Common Event Format connector deployment options in Microsoft Sentinel
1617
- Run the deployment script for the Common Event Format connector
1718
prerequisites: |

0 commit comments

Comments
 (0)