Deploy Continuous Threat Monitoring for SAP in Microsoft Sentinel
Note
Azure Sentinel is now called Microsoft Sentinel, and we’ll be updating these pages in the coming weeks. Learn more about recent Microsoft security enhancements.
This article introduces you to the process of deploying the Microsoft Sentinel Continuous Threat Monitoring solution for SAP. The full process is detailed in a whole set of articles linked under Deployment milestones below.
Important
The Microsoft Sentinel SAP solution is currently in PREVIEW. The Azure Preview Supplemental Terms include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
Overview
Continuous Threat Monitoring for SAP is a Microsoft Sentinel solution that you can use to monitor your SAP systems and detect sophisticated threats throughout the business logic and application layers. The solution includes the following components:
- The SAP data connector for data ingestion.
- Analytics rules and watchlists for threat detection.
- Workbooks for interactive data visualization.
The SAP data connector is an agent, installed on a VM or a physical server, that collects application logs from across the entire SAP system landscape. It then sends those logs to your Log Analytics workspace in Microsoft Sentinel. You can then use the other content in the SAP Continuous Threat Monitoring solution – the analytics rules, workbooks, and watchlists – to gain insight into your organization's SAP environment and to detect and respond to security threats.
Deployment milestones
Follow your deployment journey through this series of articles, in which you'll learn how to navigate each of the following steps:
| Milestone | Article |
|---|---|
| 1. Deployment overview | YOU ARE HERE |
| 2. Deployment prerequisites | Prerequisites for deploying SAP continuous threat monitoring |
| 3. Prepare SAP environment | Deploying SAP CRs and configuring authorization |
| 4. Deploy data connector agent | Deploy and configure the data connector agent container |
| 5. Deploy SAP security content | Deploy SAP security content |
| 6. Optional steps | - Configure auditing - Configure SAP data connector to use SNC |
Next steps
Begin the deployment of SAP continuous threat monitoring solution by reviewing the Prerequisites
Povratne informacije
Pošalјite i prikažite povratne informacije za