/
Microsoft Sentinel SIEM

Microsoft Sentinel SIEM

Step 1: Log into your Azure portal and navigate to Microsoft Sentinel in your subscription.

Step 2: Locate the Log Analytics Workspace associated with Microsoft Sentinel or create one. In the example below, BlueHexagonLogs is the name of the Log Analytics Workspace

Step 3: Navigate to Dashboard → Log Analytics Workspaces and locate the workspace and click to view details

Step 4: Click on Agents management → grab the Workspace ID and either ONE of primary or secondary key and share with your Blue Hexagon representative. Once we enable the connector on our backend alerts should flow into the Log Analytics Workspace. The keys are the same for Windows or Linux servers tabs so either can be used.

 

Related content

Microsoft Defender for Endpoint
Microsoft Defender for Endpoint
More like this
SentinelOne
More like this
Palo Alto Networks Firewall Integration
Palo Alto Networks Firewall Integration
Read with this
Blue Hexagon for Azure
Blue Hexagon for Azure
More like this
Add-On Pack: NG-NDR
Add-On Pack: NG-NDR
More like this
Azure-SecurityCenter-High-Severity-Alerts-Enabled
Azure-SecurityCenter-High-Severity-Alerts-Enabled
More like this

Blue Hexagon Proprietary