Overview
Microsoft Sentinel is a cloud-native security information and event management (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise — fast.
Creating a Microsoft Sentinel connection
Create the connection by using one of the following methods:
Using OAuth
Creating your connection
- In the Blink platform, navigate to the Connections page > Add connection. A New Connection dialog box opens displaying icons of external service providers available.
- Select the Microsoft Sentinel icon. A dialog box with name of the connection and connection methods appear.
- (Optional) Edit the name of the connection. At a later stage you cannot edit the name.
- Click Microsoft Sentinel to authenticate using OAuth.
- Sign in using your credentials.
Need admin approval? please refer to the Need Admin Approval guide.
Using App Registration
To create the connection you need:
- A Client ID
- A Client Secret
- A Tenant ID
Obtaining the credentials
Creating the App
-
Log into the Azure Portal.
-
Go to the Microsoft Entra ID resource.
-
In the left-hand menu, click App registrations.
-
Create a new application registration or click on one of your existing applications.
-
In the left-hand menu, click API permissions.
-
Click Add a permission and select Microsoft Graph.
-
Choose Application permissions and mark the permissions you wish to add.
To support all of Blink’s actions, these are the required application permissions:
Required Permissions |
---|
SecurityActions.ReadWrite.All |
SecurityAlert.ReadWrite.All |
SecurityAnalyzedMessage.ReadWrite.All |
SecurityEvents.ReadWrite.All |
SecurityIncident.ReadWrite.All |
-
Click Add permissions to save the changes.
-
Click Grant admin consent for
<your tenant>
on the API permissions page. Only admins can grant consent. -
Confirm that the added permissions are now verified.
-
Navigate to Overview and Copy your client ID and tenant ID.
Assign role to App
-
In Azure portal, search and click on Microsoft Sentinel.
-
Select your account and click on Resource Group.
-
Under the resource group, navigate to Access control (IAM).
-
Navigate to Role Assignments > Click Add > Add role assignment.
-
Under the Role tab, search for sentinel roles and select the
Microsoft Sentinel Contributor
role. -
Navigate to the Members tab, under Assign access to select User, group, or service principal. Click + Select members and on the right side menu, select your app.
-
Under Review + assign, see your app and click on Review + assign.
-
Go back to Access control (IAM) and verify that your app has been assigned with the required role.
Create and copy a secret
-
Go back to your app’s Overview page, create a new client secret.
-
Copy the secret value.
Creating your connection
-
In the Blink platform, navigate to the Connections page > Add connection. A New Connection dialog box opens displaying icons of external service providers available.
-
Select the Microsoft Entra ID icon. A dialog box with name of the connection and connection methods appear.
-
(Optional) Edit the name of the connection. At a later stage you cannot edit the name.
-
Select App Registration as the method to create the connection.
-
Fill in the parameters:
- The client ID
- The client secret
- The tenant ID
-
(Optional) Click Test Connection to test it.
-
Click Create connection. The new connection appears on the Connections page.
-
Search and click on Microsoft Sentinel.
Interactive Tutorial Guides
You can also refer to the following tutorial guides for a more in-depth understanding of how to create a Microsoft Sentinel connection.
Was this page helpful?