Forum Discussion
Integration of Sentinel with other 3rd party on-prem SIEM solutions (stream alerts to eventhub)
- Apr 07, 2019
Hi Manuel_DEste, great meeting you again!
Yes and no.
Forwarding alerts to an event hub is supported. You can use one of several ways:
- Run a Logic App scheduled playbook to read alerts using the Log Analytics connector and then write them to an event hub using the Event Hub connector.
- Soon you will be able to do it by running a playbook automatically when an alert triggers.
- Lastly, you can Use the Security Graph API. Note that this will send all Azure alerts to your SIEM, not just Sentinel's.
Why no? because what you really want to send are cases and not alerts, which are automatically aggregated and reduced alerts. We are working to make sure those can be sent to a SIEM as well.
For sending logs to other SIEMs, Sentinel might not be the best tool as most of the SIEMs have their own ways (though in many cases not very robust) of bringing logigng data from the cloud. There is also a bandwidth cost to take data out of the cloud, might be negligible for small logs but it all adds up.
However, for a subset of alerts, filtered as part of a use case (basically the output of an alert) one can get really creative. You can the available APIs (like Log Analytics REST API) to bring any kind of data from Sentinel and then send it through a logging tool like Logstash to a wide variety of destinations, including syslog, ELK, etc. I've also seen alerts being sent to other SIEMs through a specially crafter SMTP email (there is a native LogicApp connector for it).