Our Integration guide was accurate at the time of writing but vendors change things frequently! If you find errors or anything is outdated, let us know by raising a request in the Samurai Help Center and we shall get it updated.
Product |
Samurai [Local] Collector |
Samurai [Cloud] Collector |
Microsoft Azure Management Plane |
|
Use these instructions to create Log Analytics Workspace and to connect it to Microsoft Azure Activity Log.
You will also be able to create Azure Active Directory application and add Active Directory Audit and Sign-in Logs to Log Analytics Workspace. In addition, you can also configure Azure Application Gateway Log Analytics.
To complete this Integration you will need to:
1) From the Microsoft Azure Portal
- Create a Log Analytics Workspace
- Connect Log Analytics Workspace to Azure Activity Log
- Add Active Directory Audit and Sign-in Logs to Log Analytics Workspace
- Add Security Center Logs to Log Analytics Workspace with Continuous Export
- Register application for Microsoft Identity
- Configure Azure Application Gateway Log Analytics
- Add Access Controls Within Log Analytics Workspaces
2) From the Samurai application:
Create a Log Analytics Workspace
Perform the steps outlined within the Azure Documentation - Create Log Analytics workspace
- Log in to the Microsoft Azure portal.
- Enter Log Analytics in the search box and select Log Analytics workspaces
- From the Create Resource menu, click IT & Management Tools.
- Select Add
- Select a relevant Subscription or create a new one
- To create a new workspace, specify the following information
- Specify an appropriate name for the new Log Analytics Workspace
- Select a relevant Region based on your resources (refer to the Azure documentation linked above
- Select Review + Create
- On the newly created Log Analytics Workspace, locate the Workspace ID and record it - you will need this information to Complete the Microsoft Azure Management Plane integration
Send Azure Activity Log to Log Analytics
Perform the steps outlined within the Azure Documentation - Send to Log Analytics Workspace
You may also need to refer to Create diagnostic settings
You can configure diagnostic settings in the Azure portal either from the Azure Monitor menu or from the menu for the resource.
Add Active Directory Audit and Sign-in Logs to Log Analytics Workspace
If you have the Microsoft Office 365 integration then you do not need to complete this section as Samurai will already be ingesting Audit and Sign-in Logs, therefore please go to the next section - Add Security Center Logs to Log Analytics with Continuous Export
You can configure the diagnostic settings in the Azure portal either from the Azure Monitor menu or from the menu for the resource.
Perform the steps outlined within the Azure Documentation - Send Logs to Azure Monitor
- Log in to the Azure portal using your Azure account.
- In the left navigation pane, Select Azure Active Directory>Diagnostic settings->Add diagnostic setting. You can also select Export Settings from the Audit Logs or Sign-ins page to get to the diagnostic settings configuration page.
-
In the Diagnostic settings menu
- Specify a descriptive Name for this diagnostic setting. For example, ad-log-analytics.
- Under Category details select SigninLogs and AuditLogs
-
Under Destination details select Send to Log Analytics workspace
-
Select the relevant Subscription and Log Analytics Workspace created in Create Log Analytics Workspace.
- Click Save
Add Security Center Logs to Log Analytics Workspace with Continuous Export
Perform the steps outlined within the Azure Documentation - Setup continuous export
- Log in to the Azure portal using your Azure account.
- From the Defender for Cloud's menu, open Environment settings
-
Select the specific subscription for which you want to configure the data export.
- From the sidebar of the setting page for that subscription, select Continuous export
- Specify the following information:
- Select the Log Analytics workspace tab.
- Select the Security alerts checkbox.
- Select High, Medium, Low (all options) from the Security alerts list.
- Select Export Frequency > Streaming updates
- In the Export configuration section, select the resource group where this configuration will reside.
- In the Export target section, perform the following steps:
- Select the subscription where the Log Analytics Workspace was created from the Subscription list.
- Select the Log Analytics Workspace created earlier from the Select target workspace list.
- Click Save.
Register application for Microsoft identity
Perform the steps outlined within the Azure Documentation - Register an application
- Log in to the Azure portal using your Azure account.
- In the left navigation pane, click Azure Active Directory.
- Click App registrations. The App registrations page appears.
- Click New application registration. The Register an application page appears.
- Specify a descriptive Name. For example, NTT-log-analytics-monitoring.
- Select Accounts in this organizational directory only.
- Under the Redirect URI (optional), leave the field blank.
- Click Register.
- From the newly created application’s dashboard, copy and save the following information and you will need this when you Complete the Microsoft Azure Management Plane integration.
- Application (client) ID
- Directory (tenant) ID
- From the new application’s menu, navigate to API permissions.
- Click Add a permission.
- Click APIs my organization uses.
- Search for and select Log Analytics API. The Log Analytics API page appears.
- Click Application permissions.
- Select the Data.Read checkbox.
- Click Add permissions.
- In the dashboard for the application, click Grant admin consent for <tenant name>.
- In the left navigation pane, click Certificates & secrets under the Manage section.
- Click New client secret.
- Specify a description and choose an expiration period.
- Copy and save the value of the client secret - you will need this information to Complete the Microsoft Azure Management Plane integration
The expiration period for this secret key may depend on your company’s security policy. If a finite length is chosen, your company is responsible for providing a new key to NTT before expiration to ensure uninterrupted service.
Configure Azure Application Gateway Log Analytics
Perform the steps outlined within the Azure Documentation - Enable logging through the Azure Portal
- Log in to the Azure portal using your Azure account
- From the left navigation pane, under Monitoring, select Diagnostic settings
- Select Turn on Diagnostics
- The Diagnostics settings page appears
- Perform the following steps:
- Specify ntt-export in the Diagnostic settings name field
- Select the Send to Log Analytics checkbox.
- Select the relevant Subscription
- Select the relevant Log Analytics workspace.
- Under LOG section, select the ApplicationGatewayAccessLog and ApplicationGatewayFirewallLog checkboxes
- Click Save.
Add Access Controls Within Log Analytics Workspaces
Perform the steps outlined within the Azure Documentation - Assign Azure roles using the Azure portal
- Navigate to Log Analytics Workspaces.
- Select the relevant workspace.
- Select Access Control (IAM) from the left navigation pane.
- Click Add a role assignment.
- Select Owner from the Role list.
- Select Azure AD use, group, or service principal from the Assign
access to list. - Search the Azure Active Directory Application.
The name of the Azure Active Directory Application should match the one that was completed in Create Azure Active Directory Application
- Click Save.
Complete the Microsoft Azure Management Plane integration
You will need to following information:
- Application (Client) ID (captured during steps within Register application for Microsoft Identity)
- Directory (Tenant) ID (captured during steps within Register application for Microsoft Identity)
- Secret Key (created under Create Azure Active Directory Application)
- Workspace ID (captured under Create Log Analytics Workspace)
- Login to the Samurai MDR web application
- Select Integrations
- Select Create
- Locate and click Microsoft Azure Management Plane
- Click Next (we leverage a Samurai Cloud Collector)
- Enter a Name of Integration - name will appear in the Samurai application for you to easily reference
- Enter a Description (Optional) - if completed will appear in the Samurai application for you to easily reference)
- Enter your Application ID
- Enter your Tenant ID
- Enter the Workspace ID
- Enter your Secret Key
- Click Finish
For general information on Integrations refer to the Integrations article.
Comments
0 comments
Article is closed for comments.