ITDR
SIEM Configuration Guide for Microsoft Sentinel
This article provides information on prerequisites and how to configure a Service Connector to forward events or audit logs to Microsoft Sentinel.
Prerequisites
Make sure the following prerequisites are met:
- Create a log analytics workspace on Sentinel. To learn more, refer to the Microsoft documentation.
- Have network connectivity between the Service Connector and Sentinel API server on TCP port 443.
- Use the TCP protocol.
The Sentinel SIEM integration is proxy-aware if direct network connectivity is not available.
Configuring a Service Connector to Forward Events to Sentinel
Follow these steps to configure a Service Connector to forward events or audit logs to Sentinel:
- Step 1: Obtain the Log Analytics Workspace ID and Primary Key from the Microsoft Azure Portal
- Log in to the Microsoft Azure portal using your credentials.
- Go to Azure services > Microsoft Sentinel.
- Open the workspace that you created for the Sentinel SIEM integration.
- Go to Settings > Agents management.
- Click the Windows servers tab.
Copy the Workspace ID and Primary key.
- Step 2: Forward Logs to Sentinel
- In the Zscaler ITDR Admin Portal, go to Orchestrate > SIEM Integrations.
Click Add Integration, and select Sentinel from the drop-down menu.
In the Sentinel Details window:
- Name: Enter a name for the Sentinel SIEM integration.
- Enabled: Select to enable SIEM integration.
- Service Connector: Select a Service Connector from the drop-down menu. If you select a Service Connector that is configured in the ITDR Admin Portal, the portal sends logs to Sentinel.
- Type of logs: Select an option from the drop-down menu.
- Events: Send events to Sentinel.
- Audit Logs: Send audit logs to the Sentinel.
- Include Safe Events: Enable to forward the events that are marked as safe to Sentinel.
Filter: Specify a query if you want to send filtered event logs to Sentinel. If this field is blank, all event logs are sent to Sentinel.
The Filter option is available only for event logs.
- Workspace ID: Enter the Workspace ID you copied from Sentinel.
- Primary Key: Enter the Primary key you copied from Sentinel.
- Log Type: Enter an identifier for the log type.
- Use Proxy Settings: Enable if the Service Connector requires a proxy to connect to the Sentinel server.
Click Save.
The Sentinel SIEM integration is added.
To test Sentinel SIEM integration, generate events on the Investigate page. The Sentinel starts receiving the logs in 10 to 15 minutes.
Close