Introduction
This guide provides instructions on how to integrate Beyond Identity events data with Microsoft Sentinel. Microsoft Sentinel Integration is done by posting event logs to Entra Log Analytics. The Log Analytics workspace is attached to Microsoft Sentinel.
Contents
Prerequisites
Ensure that you have the following:
- You have a Beyond Identity tenant configured for your organization and are able to enroll users.
- You have a Microsoft Entra account with the following:
- Admin privileges to create Log Analytics workspace
- Microsoft Sentinel license
Microsoft Sentinel Integration
- Configure the Entra Log Analytics workspace
- Post Beyond Identity tenant events to the Log Analytics workspace
- Add Microsoft Sentinel to the Log Analytics workspace
Configure the Entra Log Analytics workspace
- Log into the Azure portal with an admin account. In the search box, type “lo” and in the search results, click on Log Analytics workspaces.
- In the Log Analytics workspaces screen, click on Create log analytics workspace.
-
In the Create Log Analytics workspace screen:
-
Choose an Entra subscription and resource group.
-
Under Instance details, enter a name, such as “bi-siem-events.”
-
Choose a region for the log analytics workspace.
-
Click on Review + Create.
-
-
Click on Create in the next screen. After the Log Analytics workspace is successfully created, it will be listed in “Log Analytics workspaces.”
- Note down the Workspace Name and Workspace ID. You will need to provide these in a later section.
- Click on Agents and expand Log analytics agent instructions.
- Note down the “Primary key.” You will use this in a later section.
Add Microsoft Sentinel to the Log Analytics workspace
- In the Entra portal, access Microsoft Sentinel.
- Click Create.
- Under Add Microsoft Sentinel to a workspace, type the name you entered for the Workspace name in the search box and select it. In this example, the name is “bi-siem-events.”
- Click on Add.
Beyond Identity Configuration
This configuration is done using the Beyond Identity Admin console.
- Access the Beyond Identity Admin console through your SSO integration.
- Click on Integrations and then click the SIEM tab.
- Click on Add SIEM integration.
- Select “Microsoft Sentinel” from the SIEM Provider drop down and then click Save Changes.
- In the “Add SIEM Integration” screen, complete the following:
- Enter the Workspace Name and Workspace ID you noted previously in Step 5 of Configure the Entra Log Analytics workspace.
- Enter the Primary Key you noted in Step 7 of Configure the Entra Log Analytics workspace for the “Shared Key.”
- Enter “beyondidentity” for the Log Type.
- From the Events drop down, “select all” events or select the events you are interested in. You can also include any future events as they are added.
- From the Threat Signals drop down, “select all” signals or select the threat signals you are interested in. You can also include any future threat signals as they are added.
- Click Test Configuration to confirm that a connection exists between Sentinel and Beyond Identity.
- Click Save Changes. Once SIEM configuration is complete in the Beyond Identity Admin console, you will be able to see the events in your Microsoft Sentinel.
- Enter the Workspace Name and Workspace ID you noted previously in Step 5 of Configure the Entra Log Analytics workspace.
Verification in Microsoft Sentinel
You can verify that you are receiving events from Beyond Identity with a log search in Microsoft Sentinel.
- Open the Entra portal and navigate to “Microsoft Sentinel.”
- Click on the name of the Log Analytics workspace you created previously, such as “bi-siem-events.”
- Close the “Queries” pop-up.
- Enter this query in the query text box, and replace “BI_Tenant_events” with the log type value from the Admin console.
BI_Tenant_events_CL | where actor_tenant_id_s contains_cs ""
You should see the results in the results box. The query language used is KQL[Kusto query language. Refer to https://learn.microsoft.com/en-us/azure/data-explorer/kusto/query/
Comments
0 comments
Please sign in to leave a comment.