Forum Discussion
Integration of Sentinel with other 3rd party on-prem SIEM solutions (stream alerts to eventhub)
Dear Sentinel community,
I'm wondering if anyone already explored the possibilities of integrating sentinel Alerts with other SIEM solutions.
An Example could be for customers which want to leverage Sentinel for their Azure cloud environments but still need their on Premies SIEM solutions to receive logs also from other logs sources.
One option could be to stream Sentinel Alerts to Azure EventHub and then use the EventHub as log source in the on prem SIEM. Is this something supported on Sentinel?
regards,
Manuel
Hi Manuel_DEste, great meeting you again!
Yes and no.
Forwarding alerts to an event hub is supported. You can use one of several ways:
- Run a Logic App scheduled playbook to read alerts using the Log Analytics connector and then write them to an event hub using the Event Hub connector.
- Soon you will be able to do it by running a playbook automatically when an alert triggers.
- Lastly, you can Use the Security Graph API. Note that this will send all Azure alerts to your SIEM, not just Sentinel's.
Why no? because what you really want to send are cases and not alerts, which are automatically aggregated and reduced alerts. We are working to make sure those can be sent to a SIEM as well.
- Ofer_ShezafMicrosoft
Hi Manuel_DEste, great meeting you again!
Yes and no.
Forwarding alerts to an event hub is supported. You can use one of several ways:
- Run a Logic App scheduled playbook to read alerts using the Log Analytics connector and then write them to an event hub using the Event Hub connector.
- Soon you will be able to do it by running a playbook automatically when an alert triggers.
- Lastly, you can Use the Security Graph API. Note that this will send all Azure alerts to your SIEM, not just Sentinel's.
Why no? because what you really want to send are cases and not alerts, which are automatically aggregated and reduced alerts. We are working to make sure those can be sent to a SIEM as well.
- Manuel_DEsteCopper Contributor
Hi Ofer_Shezaf, great meeting you again too!
Thank you for your reply, I'll try the Security Graph API for now, I didn't know about this feature!- isflemingCopper Contributor
Manuel_DEste / Ofer_Shezaf , is there any update on the ability to integrate outputs from Sentinel with other SIEMs?
Thanks.
- BMaroCopper Contributor
Ofer_Shezaf hey i have one question: i am new in azure sentinel, and i want to know what is the difference between using MMA agent and Using syslogs in adding 3d party ressource
thank you
- Ofer_ShezafMicrosoft
BMaro Syslog is used for remote collection for systems that support it (which is most networking and security systems). The MMA (or Log Analytics Agent), is our software for collecting both Syslog as well as local telemetry on the system the MMA is installed on.
- Valon_KolicaMicrosoft
- AdiGrioBrass Contributor
For sending logs to other SIEMs, Sentinel might not be the best tool as most of the SIEMs have their own ways (though in many cases not very robust) of bringing logigng data from the cloud. There is also a bandwidth cost to take data out of the cloud, might be negligible for small logs but it all adds up.
However, for a subset of alerts, filtered as part of a use case (basically the output of an alert) one can get really creative. You can the available APIs (like Log Analytics REST API) to bring any kind of data from Sentinel and then send it through a logging tool like Logstash to a wide variety of destinations, including syslog, ELK, etc. I've also seen alerts being sent to other SIEMs through a specially crafter SMTP email (there is a native LogicApp connector for it).