Skip to main content

Microsoft Sentinel

Microsoft Azure Pull

Synopsis

Creates a collector that fetches security incidents from Azure Sentinel workspaces. Supports authentication, batch processing, and automatic incident tracking with incremental updates.

Schema

- id: <numeric>
name: <string>
description: <string>
type: sentinel
tags: <string[]>
pipelines: <pipeline[]>
status: <boolean>
properties:
tenant_id: <string>
client_id: <string>
client_secret: <string>
subscription_id: <string>
resource_group: <string>
workspace_name: <string>
batch_size: <numeric>
event_frequency: <numeric>

Configuration

The following are the minimum requirements to define the device.

Device

FieldRequiredDefaultDescription
idYUnique identifier
nameYDevice name
descriptionN-Optional description
typeYMust be sentinel
tagsN-Optional tags
pipelinesN-Optional pre-processor pipelines
statusNtrueEnable/disable the device

Azure Authentication

FieldRequiredDefaultDescription
tenant_idYAzure tenant ID
client_idYAzure client ID
client_secretYAzure client secret
subscription_idYAzure subscription ID

Workspaces

FieldRequiredDefaultDescription
resource_groupYAzure resource group name
workspace_nameYLog Analytics workspace name

Collection

FieldRequiredDefaultDescription
batch_sizeN1000Number of incidents to fetch per batch
event_frequencyN300Collection interval in seconds

Advanced Features

Incidents

The collector captures comprehensive incident data such as basic incident details (ID, title, description), severity and status, classification and labels, owner information, temporal data (create, modify, activity dates and times), and information on resources.

Incremental Updates

The collector tracks the last processed incident's timestamp, fetches only new incidents since the last checkpoint, orders incidents by creation time, and spports batch processing.

Normalization

Incidents are automatically normalized with ECS field mapping in addition to using consistent timestamp formats, structured label handling, and owner information. (See Appendix for details of ECS.)

Examples

The following are commonly used configuration types.

Basic

A basic collector can be created as below:

Creating a simple Sentinel collector...

- id: 1
name: basic_sentinel
type: sentinel
properties:
tenant_id: "00000000-0000-0000-0000-000000000000"
client_id: "11111111-1111-1111-1111-111111111111"
client_secret: "your-client-secret"
subscription_id: "22222222-2222-2222-2222-222222222222"
resource_group: "your-resource-group"
workspace_name: "your-workspace"

High-Volume

Large numbers of incidents can be collected:

Optimizing for high incident volumes...

- id: 2
name: volume_sentinel
type: sentinel
properties:
tenant_id: "00000000-0000-0000-0000-000000000000"
client_id: "11111111-1111-1111-1111-111111111111"
client_secret: "your-client-secret"
subscription_id: "22222222-2222-2222-2222-222222222222"
resource_group: "your-resource-group"
workspace_name: "your-workspace"
batch_size: 5000
event_frequency: 60

Pipelines

Incidents can be enriched and processed:

Applying custom processing to incidents...

- id: 3
name: pipeline_sentinel
type: sentinel
pipelines:
- incident_enricher
- severity_classifier
properties:
tenant_id: "00000000-0000-0000-0000-000000000000"
client_id: "11111111-1111-1111-1111-111111111111"
client_secret: "your-client-secret"
subscription_id: "22222222-2222-2222-2222-222222222222"
resource_group: "your-resource-group"
workspace_name: "your-workspace"
batch_size: 1000
event_frequency: 300

Multiple Workspaces

Information can be collected from multiple workspaces:

Configuring multiple workspace collectors...

- id: 4
name: prod_sentinel
type: sentinel
properties:
tenant_id: "00000000-0000-0000-0000-000000000000"
client_id: "11111111-1111-1111-1111-111111111111"
client_secret: "your-client-secret"
subscription_id: "22222222-2222-2222-2222-222222222222"
resource_group: "prod-rg"
workspace_name: "prod-workspace"
- id: 5
name: dev_sentinel
type: sentinel
properties:
tenant_id: "00000000-0000-0000-0000-000000000000"
client_id: "11111111-1111-1111-1111-111111111111"
client_secret: "your-client-secret"
subscription_id: "22222222-2222-2222-2222-222222222222"
resource_group: "dev-rg"
workspace_name: "dev-workspace"
note

Each workspace collector maintains its own checkpoint, and can be configured independently.

Incident Fields

The collector maps incident fields to standardized ECS fields:

Sentinel FieldECS FieldDescription
Titleevent.nameIncident title
Descriptionevent.descriptionIncident description
Severityevent.severityIncident severity level
Statusevent.outcomeCurrent incident status
Classificationevent.classificationIncident classification
CreatedTimeUTCevent.createdIncident creation time
LastModifiedTimeUTCevent.last_modifiedLast update time
FirstActivityTimeUTCevent.startFirst detected activity
LastActivityTimeUTCevent.endLatest detected activity
OwnerEmailuser.emailAssigned owner's email
OwnerAssignedTouser.nameAssigned owner's name
ResourceIdcloud.resource_idAzure resource ID
LabelslabelsIncident labels
note

All timestamps are normalized at nanosecond level in UTC.