- 17 Mar 2025
- 5 Minutes to read
- Print
- DarkLight
Microsoft Sentinel
- Updated on 17 Mar 2025
- 5 Minutes to read
- Print
- DarkLight
Microsoft Sentinel is a cloud-native security information and event management (SIEM) service that helps you detect, prevent, and respond to security threats across your entire organization. For detailed information refer to the Microsoft’s official documentation.
Integration Method: API
Tables: Detection Finding (2004), Incident Finding (2005), Authentication (3002)
The integration supports the following events.
Event | Description |
---|---|
Workspace Info | Retrieves details of workspace information in Microsoft Sentinel |
This integration supports the following versions.
Microsoft Sentinel management API | 2024-03-01 |
Note:
Microsoft Sentinel is a continuously updated cloud service. As of the preparation of this document, the latest release was in January 2025.
Prerequisites
The user should have access to the Azure portal with an account that has the Global Administrator privileges.
The user should have access to the DataBee console.
Configuration Overview
Create an application with required permissions to fetch the data.
Create Microsoft Sentinel data feed in the DataBee console with the required Client credentials.
DataBee Parameter
Azure Parameter
Client Key
Client Secret
Token URL(<tenant_id>)
API URL (<subscriptionId>)
API URL (<resourceGroupName>)
API URL(<workspaceName>)
Azure Configuration
Create an application
Log on to Azure portal with an account that has the Global Administrator privilege.
In the search bar, search for App registrations and select it.
On the “App registrations” page, select New registration, then “Register an application” window will appear.
On the “Register an application” window:
Under ‘Name’ enter your Application Name then click on Register to create the application.
On the app Overview page, copy the Application (client) ID and Directory (tenant) ID for later use.
Add Endpoint Access
Once the application is created, one permission should be provided to fetch data. The appropriate permissions for the application are needed to access these endpoints. The following section details how to configure and add permissions to the required endpoints.
Add Permissions
From the Azure Active Directory portal:
Select the application registered in the previous step.
Under Manage, click API permissions and then click Add a permission, the “Request API permissions” window will appear.
On “Request API permissions” window, click on Microsoft APIs then on Microsoft Graph.
Click on Application permissions.
The following permissions need to be granted for the endpoint to function properly:
Event
Type
Permission
Workspace info
Application
ThreatIndicators.Read.All
In the ‘Select permissions’ search bar, enter the permission shown above, and check the box to include them.
From the ‘ThreatIndicators’ dropdown, select ThreatIndicators.Read.All permissions.
Click the Add permissions button after selecting all required permissions.
On the “API permissions” page, click Grant Admin Consent for <tenant>.
Click the Yes button on the consent confirmation.
The necessary permissions have now been added for the endpoints. After this step, the permissions should include these minimum required permissions shown.
Create Resource Group and Workspace
In the search bar, search for Microsoft Sentinel and select it.
Click on the Create button to create a new resource group.
Click on the Create a new workspace button to create workspace.
Select the Subscription.
Enter the Workspace name.
Click the Create new button to create a new resource group or select an existing one.
Enter the resource group name.
Click on the OK button and then click on Review + Create button
Click on the Create button.
Add Access to Application to retrieve the data
To grant an application access to data, you must assign a role to it. To provide access to a resource group, navigate to the resource group created in the previous step then click on the Access control (IAM) button.
Click on the Add button then click on the Add role assignment.
Now click on the Reader role.
Select the application.
Click on the + Select members button
Select the application which we created in the Create an application step.
Click on the Select button.
Click on the Next button.
Click on the Review + assign button.
Get Resource Group and Workspace
In the search bar, search for Microsoft Sentinel and select it.
Click on the workspace which we have created previously in Create Resource Group and Workspace.
Click on the Settings button.
Click on the Workspace settings button.
Copy the Subscription ID, Workspace Name, and Resource group name, as these will be required during the DataBee configuration.
Creating the Client Secret
The final step to accessing the APIs is creating a Client Secret. To create it from the Azure Portal:
Select the application created above.
Under Manage, click Certificates & secrets, and then Client secrets.
Click New client secret. Then “Add a client secret” window appears.
On “Add a client secret” window:
Enter a ‘Description’ for this client secret and select the desired expiry period from the ‘Expires’ drop-list.
Then click on Add to create the client secret.
Note:
The user needs to re-create the client secret when it expires.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for Microsoft Sentinel and click it as shown below.
Click on the API Ingest option for collection method.
Enter feed contact information and click Next.
In the configuration page, enter the following:
Authorization Method: OAuth2
API Base URL: this is the base URL that DataBee will interact with.
Client Key: paste the Application (Client) ID generated earlier in the Azure portal.
Client Secret: paste the Client Secret value generated earlier in the Azure portal.
Token URL: replace <tenant_id> placeholder with your Directory (Tenant) ID.
Event Types: preselected for all the event types that integration pulls.
Subscription ID: paste the Subscription ID generated earlier in the Azure portal.
Resource Group Name: paste the Resource Group Name generated earlier in the Azure portal.
Workspace Name: paste the Workspace Name generated earlier in the Azure portal.
Click Submit.
Troubleshooting Tips
If you encounter an Invalid client or Unauthorized client error, it may be due to incorrect credentials. Please double-check that the client key, client secret, and Tenant ID are entered correctly. Since the client secret is only visible upon creation, you may need to regenerate it. To avoid any issues, consider pasting it into a text editor to ensure there are no extra spaces or unexpected characters before reconfiguring the DataBee feed.
If you receive an Unauthorized error, it may be because the client ID and client secret belong to different applications. Kindly verify that you are using credentials from the same application to resolve the issue.
If we encounter a response code 403, it is likely due to missing permissions. Ensure that all required permissions are correctly granted as per the steps outlined above.