- 07 Nov 2024
- 6 Minutes to read
- PDF
Integrate Microsoft Sentinel with Red Canary
- Updated on 07 Nov 2024
- 6 Minutes to read
- PDF
Integrating Microsoft Sentinel with Red Canary's advanced capabilities builds a robust security ecosystem. This integration allows for seamless data sharing, improved threat detection, and accelerated incident response. This empowers you to better understand your security posture and proactively mitigate risks.
To integrate Microsoft Sentinel with Red Canary, follow the procedure below from beginning to end.
Prerequisites
From your Azure environment, locate the following data points to configure your Red Canary source platform:
Azure Tenant ID
Azure Subscription ID
Sentinel Resource Group Name
Sentinel Workspace Name
Log Analytics Workspace ID
You must have Azure Global Admin rights to upload and accept the Azure Resource Management (ARM) Template configuration and add the required role assignments in Azure.
Step 1: Microsoft Azure–Locate your Microsoft Azure IDs
Start the integration process by locating your Microsoft Azure IDs.
Login using a Global Admin account for the tenant that you want to integrate with Red Canary.
In the search bar, type and then select Tenant properties.
Copy and save your Tenant ID. You’ll use this in a later step.
In the search bar, type and then select Subscriptions.
Copy and save your Subscription ID. You’ll use this in a later step.
Click on your subscription name.
Select your log analytics workspace ID, copy and save your workspace ID. You’ll use this in a later step.
In the search bar, type and then select Resource Groups.
Copy and save the Resource Group Name you are setting up a subscription for. You’ll use this in a later step.
In the search bar, type and then select Workspaces.
Copy and save the Workspace Name you're setting up a subscription for. You’ll use this in a later step.
Step 2: Red Canary–Input your Microsoft Azure information
Enter your Microsoft Azure information into Red Canary to start sending your alerts.
From your Red Canary homepage, go to the Integrations page then click Add Integration.
On the Add integration dialog, search for the Microsoft Azure Sentinel integration then click Configure.
On the Add Integration page:
Enter a Name for the integration
Select Microsoft Azure Sentinel via API Poll in the Ingest Format / Method dropdown
Enter your Microsoft Azure Tenant ID from Step 1.3
Enter your Microsoft Azure Subscription ID from Step 1.5
Enter a Microsoft Sentinel Resource Group Name from Step 1.9
Enter a Microsoft Sentinel Workspace Name from Step 1.11
Enter your Microsoft Log Analytics Workspace ID from Step 1.7
Click Save.
Locate your newly-added integration in the list at the bottom of the Integrations page, then click on the name to view the configuration.
Click Edit Configuration.
Under the Permissions section on the Edit Integration page, click the Azure consent link.
Step 3: Microsoft Azure–Confirm that Red Canary has been configured in Azure
Confirm that the Red Canary enterprise application has been configured in your Azure Active Directory.
Login to the Microsoft Azure account you want to integrate with Red Canary.
Click Accept.
Login into your Microsoft Azure account again.
Step 4: Microsoft Azure–Add a Security Reader role assignment to Red Canary
Grant Red Canary permission to read your Microsoft Azure Alerts to start sending security data for ingestion.
In the search bar, type and then select Subscriptions.
Click on your Azure Sentinel subscription name.
Click Access Control (IAM).
Click +Add, and then click Add role assignment.
In the search bar, type and then select Security Reader.
Click Next.
From the Assign access to section, select User, group, or service principal.
Click Select Members.
In the search bar, type and then select Red Canary + Azure Sentinel API Poller.
Click Select.
To review your role assignment, click Next.
Click Review + assign.
Step 5: Microsoft Azure–Add a Log Analytics Contributor role assignment to Red Canary
Grant Red Canary permission to read and analyze your Microsoft Azure telemetry to start sending security data for ingestion.
In the search bar, type and then select Subscriptions.
Click on your Azure Sentinel subscription name.
Click Access Control (IAM).
Click +Add, and then click Add role assignment.
In the search bar, type and then select Log Analytics Contributor.
Click Next.
From the Assign access to section, select User, group, or service principal.
Click Select Members.
In the search bar, type and then select Red Canary + Azure Sentinel API Poller.
Click Select.
To review your role assignment, click Next.
Click Review + assign.
Step 6: Microsoft Azure–Add a Sentinel Responder role assignment to Red Canary
Grant Red Canary permission to edit data, incidents, and manage incidents in Microsoft Azure.
In the search bar, type and then select Subscriptions.
Click on your Azure Sentinel subscription name.
Click Access Control (IAM).
Click +Add, and then click Add role assignment.
In the search bar, type and then select Sentinel Responder.
Click Next.
From the Assign access to section, select User, group, or service principal.
Click Select Members.
In the search bar, type and then select Red Canary + Azure Sentinel API Poller.
Click Select.
To review your role assignment, click Next.
Click Review + assign.
Step 7: Red Canary–Activate the Microsoft Azure Sentinel integration
Enable your new Microsoft Azure Sentinel alert source in Red Canary.
Return to the Edit Integration page in Red Canary.
Under the Permissions section, check the Confirm Microsoft Sentinel API Access Granted box.
Click Activate to activate the integration.
Click Save.
Step 8: Microsoft Azure–Deploy an ARM template
Deploy the Red Canary provided ARM template in Azure to enable Red Canary to have the right permissions in your Azure tenant.
Login using a Global Admin account for the tenant that you want to integrate with Red Canary.
In the search bar, type and then select Service providers.
Click Service Provider Offers.
Click +Add offer, and then click Add via template.
Upload the Red Canary provided ARM Template, and then click Upload.
From the Subscription dropdown, select the subscription that your Sentinel instance resides in.
From the region dropdown, select the region your Sentinel instance is deployed in.
Click Next: Review + create >.
Click Create.
Step 9: Red Canary–Configure Alert State Sync Actions
Once the integration is active, you can configure the state sync actions to determine whether Red Canary should add comments and/or automatically close the alerts in the source platform.
Open the Edit Integration page in Red Canary.
Under the Actions in the Source Platform section, set the comment and close options as described in the table below.
Add comments to alerts in Microsoft Azure Sentinel…
As Red Canary validates the alert
If checked, Red Canary adds comments to the alert in Microsoft Sentinel as the alert is investigated and resolved. (Default=checked)
Close alerts in Microsoft Azure Sentinel…
When Red Canary validates the alert as non-threatening
If checked, Red Canary closes the alert in Microsoft Sentinel as
Benign Positive
if the state isNot a Threat
. (Default=checked)When Red Canary validates the alert as suspicious
If checked, Red Canary closes the alert in Microsoft Sentinel as
True Positive
if the state isSuspicious
,Highly Suspicious
, orThreat
but no threat has been published. (Default=unchecked)When Red Canary publishes a threat involving the alert
If checked, Red Canary closes the alert in Microsoft Sentinel as
True Positive
if the state isThreat
and a threat has been published. (Default=checked)Click Save when done.
FAQ
Why do we require each of the roles above?
Log Analytics Contributor: This role is needed to create Diagnostic Settings on Storage Accounts and Key Vaults to stream events into Red Canary for monitoring. Additionally, it is necessary for configuring Data Export on Log Analytics Workspaces. These actions allow Red Canary to ingest logs for analysis, including control plane and sign-in logs.
Reader Role: This role is used for reading and enumerating resources like Storage Accounts, subscriptions, and Key Vaults within the tenant. This role allows Red Canary to identify the necessary resources without making changes.
Sentinel Responder Role: This role is necessary for Red Canary to manage and update incidents in Microsoft Sentinel. Without this permission, automations and incident responses—such as updating incident statuses—would not be possible. This role enables the required actions for managing threat responses within Sentinel.