Dropzone AI Documentation
WebsiteTest Drive
  • Dropzone Documentation
  • Overview
    • Alert Sources
    • Data Sources
    • Communicators
    • On-prem Support - Dropzone Connector
    • Interactive Chat
    • Metrics Guide
  • Dropzone Administraton
    • Team Admin
      • Google Workspace SAML
      • Okta SAML
  • Dropzone Integrations
    • Alert + Data Source Integrations
      • Amazon Web Services (AWS)
        • Cross-Account Access via CloudFormation
        • Cross-Account Access via Console
      • CrowdStrike
      • Datadog
      • Elasticsearch
      • Google Workspace
      • Google GCP
      • Jira
      • Microsoft 365 / Microsoft Defender
      • Microsoft Sentinel
      • Palo Alto Networks Firewall
      • Panther
      • SentinelOne
      • Splunk
      • Sumo Logic
    • Alert Integrations
      • Gem
    • Communicators
      • Slack Communicator
    • Data Source Integrations
      • AbuseIPDB
      • Active Directory (LDAP)
      • Archive Inspector
      • Blocklist.de
      • CAPA
      • Censys
      • Crowdstrike Falcon Intelligence
      • DNSResolver
      • EchoTrail
      • File
      • GreyNoise
      • Hybrid Analysis
      • Host.io
      • IPInfo.io
      • IPQualityScore
      • MalwareBazaar
      • Nuclei
      • NVD
      • Okta
      • oletools
      • OpenSSL Sign Code
      • PDF Analysis
      • Perplexity AI
      • PhishTank
      • Shodan
      • TShark
      • QRadar
      • UnshortenMe
      • URLhaus
      • Urlscan.io
      • VirusTotal
      • Vision
      • WHOIS
      • YARAify
Powered by GitBook
On this page
  • Microsoft Sentinel
  • Integration Overview
  • Register a New Application in Microsoft Entry Admin Center
  • Client ID, Tenant ID, and Client Secret
  • Set Application Permissions
  • Assign Roles in Microsoft Sentinel
  • Workspace IDs
  • Enable the Dropzone Data Source Integration
  • Enable the Dropzone Alert Source Integration

Was this helpful?

  1. Dropzone Integrations
  2. Alert + Data Source Integrations

Microsoft Sentinel

PreviousMicrosoft 365 / Microsoft DefenderNextPalo Alto Networks Firewall

Last updated 1 day ago

Was this helpful?

Microsoft Sentinel

This is a combined document for enabling the Dropzone AI Data Source and Alert Source for Microsoft Sentinel. Note that this is different from Microsoft 365/Microsoft Defender.

Microsoft Sentinel is an SIEM integration. SIEM integrations are used to perform analysis of any SIEM generated alerts, and/or to use generated data as part of investigation analysis.

The Dropzone platform integrates with the security SIEM. Many customers ingest other alert sources into Microsoft Sentinel (e.g. IDPs) and integrate Dropzone into Microsoft Sentinel rather than the source systems.

Integration Overview

To enable these integrations you will perform the following actions:

  • Register a new application in Azure Active Directory (AAD)

  • Locate your Client ID, Tenant ID, and create a Client Secret

  • Assign necessary API permissions to the application

  • Assign roles to the application in Microsoft Sentinel

  • Locate your Workspace Name and Workspace ID

Register a New Application in Microsoft Entry Admin Center

  • Sign into as an administrator

  • In the left sidebar, navigate to Identity > Applications > App Registrations

  • Click "New Registration"

  • Name the new application something memorable, such as "Dropzone AI Sentinel Integration"

  • Under "Supported account types," select "Accounts in this organizational directory only (Single tenant)"

  • Leave the "Redirect URI (optional)" blank

  • Click "Register"

Client ID, Tenant ID, and Client Secret

Once the application has been created, it will redirect you to the application's Overview page.

  • In the Overview page, copy the Application ID and the Directory ID for use later in the Dropzone UI, where they are called "Client ID" and "Tenant ID" respectively

  • Next to "Client credentials", click "Add a certificate or secret"

  • Under the Client secrets heading, click "New client secret"

  • Enter a description for the client secret, such as "Dropzone AI Integration Secret", and choose an appropriate expiration date. Click "Add"

Your Dropzone integration will stop working when the client secret expires. Consider setting a calendar reminder to update the key prior to expiration. For convenience's sake, we recommend picking a longer expiration date, to limit the number of times the client secret must be updated.

  • Under "Value," copy the Client Secret Value for use later in the Dropzone UI, where it is called "Client Secret"

This value is not shown after you leave this page — be sure to record it immediately.

Set Application Permissions

  • In the application's sidebar, navigate to Manage > API permissions

  • Click "Add a permission"

  • Navigate to "APIs my organization uses"

  • In the search bar, input "Log Analytics API," and select it

  • Click "Application permissions"

  • In the search bar, input "Data.Read" and select it. Click "Add permissions"

If your integration requires access to security alerts via Microsoft Graph, do the following:

  • In the API permissions page, click "Add a permission"

  • Under the Microsoft API header, select Microsoft Graph

  • Click "Application permissions"

  • Check the permission "SecurityEvents.Read.All", then click "Add permissions"

  • Once back in the Application API permissions page, click "Grant admin consent for [mycompany.net]"

  • Click "Yes"

Assign Roles in Microsoft Sentinel

To allow the application to access Microsoft Sentinel data, you must assign the application roles based on your desired access level.

  • Under the "Azure Services" heading, navigate to Microsoft Sentinel

  • Select the Log Analytics Workspace you wish to analyze

  • Navigate to Configuration > Settings

  • Click on "Workspace settings"

  • Navigate to "Access control (IAM)"

  • Select Add > Add role assignment

    • Read-only access: Log Analytics Reader or Microsoft Sentinel Reader

    • Read and write access: Microsoft Sentinel Responder or Microsoft Sentinel Contributor

If you wish to enable Ticket Sync, you must assign the application a Read and write access role.

For the purpose of this documentation, the Log Analytics Reader role has been selected.

  • Once you have selected your role, click "Members"

  • Next to "Assign access to," select "User, group, or service principal"

  • Click "Select members"

  • Search for your application (such as Dropzone AI Sentinel Integration) and click "Select"

  • In the bottom left hand corner, click "Review + assign" twice

Workspace IDs

To obtain your Workspace Name and Workspace ID, do the following:

  • Under the "Azure Services" heading, navigate to Microsoft Sentinel

  • Select the Workspace you wish to analyze

  • In the left sidebar, navigate to Configuration > Settings

  • Click on "Workspace Settings"

  • Copy the Workspace ID, Subscription ID, and Resource Group shown for use later in the Dropzone UI

Enable the Dropzone Data Source Integration

To enable the Data Source integration, you will need the following information:

Dropzone Field
Source

Client ID

The Application ID copied earlier

Tenant ID

The Directory ID copied earlier

Client Secret

The Client Secret Value copied earlier

Workspace ID

The Workspace ID copied earlier

Subscription ID

The Subscription ID copied earlier

Resource Group

The Resource group copied earlier

To enable the Data Source integration, do the following:

  • Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.ai

  • In the bottom right corner, navigate to Settings > Integrations

  • Click "Available"

  • In the Search bar, search Microsoft Sentinel, then click "Configure"

  • Under the Data Source heading, input the Client ID, Tenant ID, and Client Secret

  • Under the Workspaces heading, click "Add item." Input the details of your workspace, then click "Add item" again.

  • Click "Test & Save" to finish

If you have any errors engage your Dropzone AI support representative.

Enable the Dropzone Alert Source Integration

To enable the Alert Source integration, you will need the following information:

Dropzone Field
Source

Client ID

The Application ID copied earlier

Tenant ID

The Directory ID copied earlier

Client Secret

The Client Secret Value copied earlier

Workspace ID

The Workspace ID copied earlier

Subscription ID

The Subscription ID copied earlier

Resource Group

The Resource group copied earlier

To enable the Alert Source integration, do the following:

  • Navigate to your Dropzone AI tenant home page e.g. https://mycompany.dropzone.ai

  • In the bottom right corner, navigate to Settings > Integrations

  • Click "Available"

  • In the Search bar, search Microsoft Sentinel, then click "Configure"

  • Under the Alert Source heading, input the Client ID, Tenant ID, and Client Secret

  • Under the Workspaces heading, click "Add item." Input the details of your workspace, then click "Add item" again.

  • Under the heading "Enabled severity levels," check the boxes for each incident severity level you want Dropzone to ingest alerts for

  • Under the heading "Enabled statuses," check the box for each incident status you want Dropzone to investigate alerts for

  • If you wish, you may adjust your ticket sync settings. To do so, under the "Ticket Sync — Update Ticket Status" header, check the box labeled "Update status on investigation change"

Dropzone has several stages to its investigation process: Start, Completed/In Review, Reviewed, and Reopened. During those stages, Dropzone can write updates to the Sentinel ticket status. Shown below is a reasonable default.

  • If you want Dropzone to be able to investigate email alerts, check the box under the heading "Microsoft Defender Email Fetching"

  • Input your desired Log ingestion delay, poll interval, and poll lookback.

  • Click "Test & Save" to finish

If you have any errors engage your Dropzone AI support representative.

Microsoft's documentation for creating client credentials for an application is available

Navigate to

Select a based on your desired access level:

Navigate to

Navigate to Microsoft Sentinel

If you wish, you may add queries to investigate. To do so, click "Add Item" under the KQL Queries heading, then input the Query. Click "Add item" again when done

here
your Azure portal
role
your Azure portal
KQL
Microsoft Sentinel
your Entra home
Navigate to App Registrations
Registering the Dropzone AI Application
Register the new application
Copy the integration details
Add a certificate or secret
Create a new client secret
Add client secret
Copy the Client Secret Value
Navigate to API permissions
Add a permission
Select Log Analytics API
Add the Data.Read permission
Select Microsoft Graph
Add the SecurityEvents.Read.All permission
Grant admin consent
Grant admin consent
Navigate to Microsoft Sentinel
Select your workspace
Navigate to Settings
Click on Workspace settings
Click on Access control (IAM)
Add a role assignment
Select your role
Click Select members
Assign members
Click Review + assign
Select your workspace
Navigate to settings
Navigate to settings
Copy the integration details
Integrations Dropdown
Click Available
The Microsoft Sentinel Tile
The Microsoft Sentinel Data Integration pt 1
The Microsoft Sentinel Data Integration pt 2
Integrations Dropdown
Click Available
The Microsoft Sentinel Tile
The Microsoft Sentinel Alert configuration (pt 1)
The Microsoft Sentinel Alert configuration (pt 2)
The Microsoft Sentinel Alert configuration (pt 3)
The Microsoft Sentinel Alert configuration (pt 4)
The Microsoft Sentinel Alert configuration (pt 5)
The Microsoft Sentinel Alert configuration (pt 6)
The Microsoft Sentinel Alert configuration (pt 7)