MS Sentinel Integration Steps
Introduction
The purpose of this document is to provide instructions on implementing an integration between MS Sentinel and Remedio.
Overview
Microsoft Sentinel is a cloud-native Security Information and Event Management (SIEM) and Security Orchestration Automated Response (SOAR) solution built on Azure. It provides intelligent security analytics and threat detection across the entire enterprise. Sentinel collects data at cloud scale from users, devices, applications, and infrastructure, both on-premises and in multiple clouds.
MS Sentinel Integration Prerequisites
To enable data ingestion from Remedio into Microsoft Sentinel, you will need the Workspace ID and Primary Key from your Azure Log Analytics workspace. These credentials are required to authenticate and send data using the HTTP Data Collector API. You can find them in the Azure Portal by navigating to your Log Analytics workspace, then selecting Agents Management. Ensure these values are securely stored, as they provide access to your logging environment.
MS Sentinel Side
Log in to the Azure Portal
Go to https://portal.azure.com and sign in with your Azure credentials.Open Your Log Analytics Workspace
In the left-hand menu or search bar, type "Log Analytics workspaces" and select the appropriate workspace used by Microsoft Sentinel.Go to Agents Management
Inside the workspace, in the left-hand pane, scroll down and click on Agents Management.Copy the Credentials
Workspace ID: Found at the top of the Agents Management page.
Primary Key: Listed under Primary Key. You may also see a Secondary Key — either can be used, but the primary is standard.
Remedio Side
Log in to the Remedio console with administrator access privileges.
Go to Settings > Integration > MS Sentinel and fill the required fields:
Workspace ID
Shared Key = Primary key
Click the "Test" button to confirm the accuracy of your settings and ensure the successful establishment of the integration. Click “Connect” to save the connection configuration.
If you see any error message, please review your settings, and make any necessary adjustments until the test passes successfully.
Viewing Remedio Tables in MS Sentinel
Go to https://portal.azure.com and open Microsoft Sentinel.
Select your workspace, then go to Settings > Workspace Settings (opens the Log Analytics workspace).
In the left pane, click Tables.
Browse or search for your table (e.g.,
GytpolAlerts_CL) to view its schema and ingestion method.
View Remedio Data in Sentinel Logs
In the https://portal.azure.com, go to Microsoft Sentinel.
Select your workspace and click Logs.
In the Tables pane, search for
GytpolAlerts_CLor any of the above tables.Run a query like:
GytpolAlerts_CL | take 1000
You have completed the process. The MS Sentinel Connector is now configured.