# Microsoft Sentinel

## Microsoft Sentinel

{% hint style="success" %}
This is a combined document for enabling the Dropzone AI Data Source and Alert Source for Microsoft Sentinel. Note that this is different from Microsoft 365/Microsoft Defender.

Microsoft Sentinel is an SIEM integration. SIEM integrations are used to perform analysis of any SIEM generated alerts, and/or to use generated data as part of investigation analysis.
{% endhint %}

The Dropzone platform integrates with the [Microsoft Sentinel](https://learn.microsoft.com/en-us/azure/sentinel/) security SIEM. Many customers ingest other alert sources into Microsoft Sentinel (e.g. IDPs) and integrate Dropzone into Microsoft Sentinel rather than the source systems.

### Integration Overview

To enable these integrations you will perform the following actions:

* Register a new application in Microsoft Entra Admin
* Locate your Client ID, Tenant ID, and create a Client Secret
* Assign necessary API permissions to the application
* Assign roles to the application in Microsoft Sentinel
* Locate your Workspace Name and Workspace ID

See the [Microsoft Integrations](https://docs.dropzone.ai/integrations/alert/ms_alert) page for instructions on how to register a new application, locate your Client ID and Tenant ID, and to create a Client Secret.

### Set Application Permissions

General instructions on how to assign API permissions to the application can be found in the [Microsoft Integrations](https://docs.dropzone.ai/integrations/alert/ms_alert) page.

Enabling MS Sentinel will require the following APIs and permissions:

| API             | Permissions               |
| --------------- | ------------------------- |
| Log Analytics   | `Data.Read`               |
| Microsoft Graph | `SecurityEvents.Read.All` |

To add the Log Analytics API, do the following:

* In the API permissions page, click "Add a permission"
* Navigate to "APIs my organization uses"
* In the search bar, input "Log Analytics API," and select it

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-e2ffe43e77627b9e3dc2805ae5de7a8e0306fccf%2Fmssentinel-api-8-1.png?alt=media" alt=""><figcaption><p>Select Log Analytics API</p></figcaption></figure>

* Click "Application permissions"
* In the search bar, input "Data.Read" and select it. Click "Add permissions"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-da3665a6ee1005bc9bda58d836d94516b732f451%2Fmssentinel-api-9-1.png?alt=media" alt=""><figcaption><p>Add the Data.Read permission</p></figcaption></figure>

* Once back in the Application API permissions page, click "Grant admin consent for \[mycompany.net]"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-ca7be8f024f4476706c280faf8aa2aa448f3e1cb%2Fmssentinel-api-12-1.png?alt=media" alt=""><figcaption><p>Grant admin consent</p></figcaption></figure>

* Click "Yes"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-e314df457fd222cf925c1bfed30e2f012e793d49%2Fmssentinel-api-13-1.png?alt=media" alt=""><figcaption><p>Grant admin consent</p></figcaption></figure>

If your integration requires access to security alerts via Microsoft Graph, do the following:

* In the API permissions page, click "Add a permission"
* Under the Microsoft API header, select "Microsoft Graph"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-c768b518ace85f39c45177fdc310a86a2033de74%2Fmssentinel-api-10-1.png?alt=media" alt=""><figcaption><p>Select Microsoft Graph</p></figcaption></figure>

* Click "Application permissions"
* Check the permission "SecurityEvents.Read.All," then click "Add permissions"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-3b85f9235e196491868b38e1a979ac8811ecc60f%2Fmssentinel-api-11-1.png?alt=media" alt=""><figcaption><p>Add the SecurityEvents.Read.All permission</p></figcaption></figure>

* Once back in the Application API permissions page, click "Grant admin consent for \[mycompany.net]"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-ca7be8f024f4476706c280faf8aa2aa448f3e1cb%2Fmssentinel-api-12-1.png?alt=media" alt=""><figcaption><p>Grant admin consent</p></figcaption></figure>

* Click "Yes"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-e314df457fd222cf925c1bfed30e2f012e793d49%2Fmssentinel-api-13-1.png?alt=media" alt=""><figcaption><p>Grant admin consent</p></figcaption></figure>

### Assign Roles in Microsoft Sentinel

To allow the application to access Microsoft Sentinel data, you must assign the application roles based on your desired access level.

* Navigate to [your Azure portal](https://portal.azure.com)
* Under the "Azure Services" heading, navigate to Microsoft Sentinel

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-9ce36d8bb95436b6aa66a5636958c5b9582e8708%2Fmssentinel-api-1.png?alt=media" alt=""><figcaption><p>Navigate to Microsoft Sentinel</p></figcaption></figure>

* Select the Log Analytics Workspace you wish to analyze

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-f118572de032b001f3c571686b6840b7173c614a%2Fmssentinel-api-10.png?alt=media" alt=""><figcaption><p>Select your workspace</p></figcaption></figure>

* Navigate to Configuration > Settings

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-bee8979b7d7f5c676797087e5a3ff4cc48b7f39c%2Fmssentinel-api-14-1.png?alt=media" alt=""><figcaption><p>Navigate to Settings</p></figcaption></figure>

* Click on "Workspace settings"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-0c9656ec58529160f7fc11cf5512c599194a8cb4%2Fmssentinel-api-15-1.png?alt=media" alt=""><figcaption><p>Click on Workspace settings</p></figcaption></figure>

* Navigate to "Access control (IAM)"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-23fe828eea5dd3a534af319c00fdadd46b6fa457%2Fmssentinel-api-16-1.png?alt=media" alt=""><figcaption><p>Click on Access control (IAM)</p></figcaption></figure>

* Select Add > Add role assignment

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-74b3288518ede701b14d55073b6a9492359edd62%2Fmssentinel-api-17-1.png?alt=media" alt=""><figcaption><p>Add a role assignment</p></figcaption></figure>

* Select a [role](https://learn.microsoft.com/en-us/azure/sentinel/roles) based on your desired access level:
  * Read-only access: Log Analytics Reader or Microsoft Sentinel Reader
  * Read and write access: Microsoft Sentinel Responder or Microsoft Sentinel Contributor

{% hint style="info" %}
If you wish to enable Ticket Sync, you must assign the application a Read and write access role.
{% endhint %}

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-c133391520bba78f6d5f93e8508b068ad129aefb%2Fmssentinel-api-18-1.png?alt=media" alt=""><figcaption><p>Select your role</p></figcaption></figure>

{% hint style="info" %}
For the purpose of this documentation, the Log Analytics Reader role has been selected.
{% endhint %}

* Once you have selected your role, click "Members"
* Next to "Assign access to," select "User, group, or service principal"
* Click "Select members"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-bcda2693bc29f66641238b145d5e744bbf940f5b%2Fmssentinel-api-19-1.png?alt=media" alt=""><figcaption><p>Click Select members</p></figcaption></figure>

* Search for your application (such as Dropzone AI Sentinel Integration) and click "Select"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-85752ec3a2c0e47bc3585805a551cc773737fabd%2Fmssentinel-api-20-1.png?alt=media" alt=""><figcaption><p>Assign members</p></figcaption></figure>

* In the bottom left hand corner, click "Review + assign" twice

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-a3bd6bb1db9d46f8a3b1afd76270b1809394629d%2Fmssentinel-api-21-1.png?alt=media" alt=""><figcaption><p>Click Review + assign</p></figcaption></figure>

### Workspace IDs

To obtain your Workspace Name and Workspace ID, do the following:

* Navigate to [your Azure portal](https://portal.azure.com)
* Under the "Azure Services" heading, navigate to Microsoft Sentinel

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-258093ece001be6f192e28a14120acfafc3abbac%2Fmssentinel-api-1-1.png?alt=media" alt=""><figcaption><p>Navigate to Microsoft Sentinel</p></figcaption></figure>

* Select the Workspace you wish to analyze

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-f118572de032b001f3c571686b6840b7173c614a%2Fmssentinel-api-10.png?alt=media" alt=""><figcaption><p>Select your workspace</p></figcaption></figure>

* In the left sidebar, navigate to Configuration > Settings

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-bee8979b7d7f5c676797087e5a3ff4cc48b7f39c%2Fmssentinel-api-14-1.png?alt=media" alt=""><figcaption><p>Navigate to settings</p></figcaption></figure>

* Click on "Workspace Settings"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-0c9656ec58529160f7fc11cf5512c599194a8cb4%2Fmssentinel-api-15-1.png?alt=media" alt=""><figcaption><p>Navigate to settings</p></figcaption></figure>

* Copy the Workspace ID, Subscription ID, and Resource Group shown for use later in the Dropzone UI

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-ef436095ab0e30ed46d4aa366f034dc2eb110758%2Fmssentinel-api-13.png?alt=media" alt=""><figcaption><p>Copy the integration details</p></figcaption></figure>

## Enable Microsoft Sentinel

To enable the Alert Source integration, you will need the following information:

| Dropzone Field  | Source                                 |
| --------------- | -------------------------------------- |
| Client ID       | The Application ID copied earlier      |
| Tenant ID       | The Directory ID copied earlier        |
| Client Secret   | The Client Secret Value copied earlier |
| Workspace ID    | The Workspace ID copied earlier        |
| Subscription ID | The Subscription ID copied earlier     |
| Resource Group  | The Resource group copied earlier      |

To enable the Alert Source integration, do the following:

* Navigate to your Dropzone AI tenant home page e.g. https\://*mycompany*.dropzone.app
* In the bottom right corner, navigate to Settings > Integrations

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-b3f07f902b1402dadc7abbd8bb62f9c204547390%2Fui-integrations-dropdown.png?alt=media" alt=""><figcaption><p>Integrations Dropdown</p></figcaption></figure>

* Click "Available"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-434641ec6d4e45051842f86164f485d6bd289424%2Fapp_system_integrations_available.png?alt=media" alt=""><figcaption><p>Click Available</p></figcaption></figure>

* In the Search bar, search Microsoft Sentinel, then click "Configure"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-cefe39bab89bfe9d861b2d34fb36ecebc01c81cf%2Fapp_system_integrations_available_Microsoft_Sentinel.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Tile</p></figcaption></figure>

* Under the Alert Source heading, input the Client ID, Tenant ID, and Client Secret

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-ce404c5a6acb5cd3bd53676ac7c789af3a17160c%2Fapp_system_integrations_available_mssentinel_alert_config.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 1)</p></figcaption></figure>

* Under the Workspaces heading, click "Add item." Input the details of your workspace, then click "Add item" again

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-6b4030a21ed9cc02d8b1cc2b97e9ee9bc8d592f3%2Fapp_system_integrations_available_mssentinel_alert_config-2.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 2)</p></figcaption></figure>

* Under the heading "Enabled severity levels," check the boxes for each incident severity level you want Dropzone to ingest alerts for
* Under the heading "Enabled statuses," check the box for each incident status you want Dropzone to investigate alerts for

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-96ba2560fac1539c7fcf1a624b66b18324d8fab0%2Fapp_system_integrations_available_mssentinel_alert_config-3.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 3)</p></figcaption></figure>

* If you wish, you may add [KQL](https://learn.microsoft.com/en-us/kusto/query/?view=microsoft-fabric) queries to investigate. To do so, click "Add Item" under the KQL Queries heading, then input the Query. Click "Add item" again when done

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-b4df3049affe310e0043483f7175c12b22f3fd7d%2Fapp_system_integrations_available_mssentinel_alert_config-4.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 4)</p></figcaption></figure>

* If you wish, you may adjust your ticket sync settings. To do so, under the "Ticket Sync — Update Ticket Status" header, check the box labeled "Update status on investigation change"

{% hint style="info" %}
Dropzone has several stages to its investigation process: Start, Completed/In Review, Reviewed, and Reopened. During those stages, Dropzone can write updates to the Sentinel ticket status. Shown below is a reasonable default.
{% endhint %}

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-2c1b420ec91a2e85a757797a5a493683f3e120f8%2Fapp_system_integrations_available_mssentinel_alert_config-5.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 5)</p></figcaption></figure>

* If you want Dropzone to be able to investigate email alerts, check the box under the heading "Microsoft Defender Email Fetching"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-ea1d15672d841a5151d30ee544ead75ff7a8b6a6%2Fapp_system_integrations_available_mssentinel_alert_config-6.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 6)</p></figcaption></figure>

* Input your desired Log ingestion delay, poll interval, and poll lookback
* Click "Test & Save" to finish

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-54a75689e11b60073d1fa9da5eeb7caf25545838%2Fapp_system_integrations_available_mssentinel_alert_config-7.png?alt=media" alt=""><figcaption><p>The Microsoft Sentinel Alert configuration (pt 7)</p></figcaption></figure>

If you have any errors engage your Dropzone AI support representative.
