Microsoft Sentinel Integration¶
Once configured, Valtix Alerts will be sent to Microsoft Sentinel using the defined Alert Service and Alert Rule.
Prerequisites¶
In order to send alerts to Microsoft Sentinel, the following information is required:
- Azure Log Analytics Workspace
- Azure Log Table
Create an Alert Service¶
- Navigate to Administration -> Alert Profiles -> Services
- Click Create
- Name - Enter unique name for the alert integration. Example
valtix-MSSentinel-profile
. - Description (optional) - Enter a description for the alert integration
- Type - Using the pulldown, choose Microsoft Sentinel
- API Key - Specify the Shared Key created in Azure for the Azure Log Analytics Workspace
- Azure Log Table Name - Specify the name of the Azure Log defined when creating the Azure Log Analytics Workspace
- Azure Log Analytics Workspace ID - Specify the ID of the Azure Log Analytics Workspace
- Click Save
Create an Alert Rule¶
- Navigate to Settings -> Alert Profiles -> Alert Rules
- Click Create
- Profile Name - Enter unique name for the integration. Example
valtix-MSSentinel-alert-rule
. - Description (optional) - Enter a description for the alert rule
- Alert Profile - Using the pulldown, choose a PagerDuty Alert Profile. As example, select profile created above
valtix-MSSentinel-profile
. - Type - Using the pulldown, select either System Logs or Discovery
- Sub Type - For Type System Logs, the Sub Type pulldown options are either: Gateway or Account. For Type Discovery, the Sub Type pulldown option is: Insights Rule.
- Severity - For selected Type System Logs, and using the pulldown, select a Severity level from options:
Info
Warning
Medium
High
orCritical
. For Type Discovery, select a Severity level from options:Info
Medium
Critical
. - Enabled - Using the checkbox, check to enable this alert profile
- Click Save