Skip to content

Azure Sentinel

Azure Sentinel Integration

To forward the events to Azure Sentinel you must first set up the Azure Sentinel Integration.

Integration of Azure Sentinel:

a. Prerequisites:

  • Azure Logic App - Webhook.
  • Azure Sentinel Subscription.

b. Steps to Integrate:

  • Go to Settings -→ Integrations -→ CWPP(Tab).
  • Click integrate now on Azure Sentinel.
  • Fill up the following fields:
  • Integration Name: Enter the name for the integration. You can set any name of your choice. e.g., Container Security Alerts

  • Webhook URL: Enter your Azure Logic App's Webhook URL here. e.g., https://xyz.xxxxx.log ic.azu re.com:443/workflows/xxxxxxxx

  • Group Name: You can specify any group name based on your prefernece, this can be used to filter the events. This works as a key value pair, where key is Group Name and Group Value is the value for the Key Group Name. e.g., K8s Cluster

  • Group Value: You can add any value to this group value. e.g., Dev Team Cluster

  • Click Test to check the new functionality, You will receive the test message on configured Azure Sentinel. -Test message Please ignore !!
  • Click Save to save the Integration. You can now configure Alert Triggers for Azure Sentinel Events

Creating webhook using the Azure Logic App

About the logic app:

Azure Logic Apps is a cloud platform where you can create and run automated workflows with little to no code. Using the visual designer and selecting from prebuilt operations, you can quickly build a workflow that integrates and manages your apps, data, services, and systems. To create a webhook using the logic app.
- Step 1: Search for the logic app in the Azure portal.
- Step 2: Add the new logic app and fill in the relevant details.
- Step 3: After creating the logic it will appear in the logic app dashboard.
- Step 4: Open the app and click on the go-to resource button.
- Step 5: Select the http request to receive the logs.
- Step 6: Click on the new step and click HTTP after that click on the Azure log analytics to receive the alert data.
- Step 7: Add the connection name, workspaceID, and workspace key you can get workspace id and key in the log analytics workspace tab.
- Step 8: Click on the Integration and click on the Agents tab.
- Step 9: Click on the Azure log analytics data collector and click JSON request body as the body and log name, After the setup is done you will receive a webhook URL.

To see Logs in the Sentinel.

  • Step 1: Open Microsoft Sentinel in the portal.
  • Step 2: Click on the integrations.
  • Step 3: Click on the logs tab and go to custom logs and select the time range and click on run the query to get the logs.