Skip to content

Microsoft Sentinel

You can set up Wallarm to log the following events in Microsoft Azure Sentinel:

  • Hits detected except for:

  • System related:

    • User changes (newly created, deleted, role change)
    • Integration changes (disabled, deleted)
    • Application changes (newly created, deleted, name change)
  • Vulnerabilities detected, all by default or only for the selected risk level(s) - high, medium or low.

  • Rules and triggers changed (creating, updating, or deleting the rule or trigger)

  • Scope (exposed assets) changed: updates in hosts, services, and domains

  • On an hourly basis, you can get a notification with the number of requests processed during the previous hour

Setting up integration

In the Microsoft UI:

  1. Run Microsoft Sentinel on a Workspace.

  2. Proceed to the Sentinel Workspace settings → AgentsLog Analytics agent instructions and copy the following data:

    • Workspace ID
    • Primary key

In the Wallarm Console UI:

  1. Open the Integrations section.

  2. Click the Microsoft Sentinel block or click the Add integration button and choose Microsoft Sentinel.

  3. Enter an integration name.

  4. Paste the copied Workspace ID and Primary key.

  5. Optionally, specify the Azure Sentinel table for Wallarm events. If it does not exist, it will be auto-created.

    Without a name, separate tables are created for each event type.

  6. Choose event types to be logged in Microsoft Sentinel. If the events are not chosen, then logs will not be sent.

  7. Test the integration and make sure the settings are correct.

    Delay in sending data to new workspaces

    Creating a Workspace on Sentinel for Wallarm integration can take up to 1 hour for all services to function. This delay can result in errors during integration testing and usage. If all integration settings are correct but errors continue to appear, please try again after 1 hour.

  8. Click Add integration.

    Sentinel integration

Testing integration

Integration testing allows checking configuration correctness, availability of the Wallarm Cloud, and the notification format. To test the integration, you can use the button Test integration when creating or editing the integration.

The integration is tested as follows:

  • Test notifications with the prefix [Test message] are sent to the selected system.

  • Test notifications cover the following events (each in a single record):

    • New user in the company account
    • Newly detected hit
    • Newly discovered IP in the company scope
    • New trigger in the company account
    • Newly discovered security vulnerability
  • Test notifications include test data.

You can find Wallarm logs in your Microsoft Workspace → LogsCustom Logs, e.g. the test create_user_CL log in Microsoft Sentinel looks as follows:

Test Sentinel message

Types of Wallarm logs

Overall, Wallarm can log in Sentinel the records of the following types:

Event Sentinel log type
New hit new_hits_CL
New user in a company account create_user_CL
Deletion of a user from a company account delete_user_CL
User role update update_user_CL
Deletion of an integration delete_integration_CL
Disabling an integration disable_integration_CL or integration_broken_CL if it was disabled due to incorrect settings
New application create_application_CL
Deletion of an application delete_application_CL
Application name update update_application_CL
New vulnerability of a high risk vuln_high_CL
New vulnerability of a medium risk vuln_medium_CL
New vulnerability of a low risk vuln_low_CL
New rule rule_create_CL
Deletion of a rule rule_delete_CL
Changes of an existing rule rule_update_CL
New trigger trigger_create_CL
Deletion of a trigger trigger_delete_CL
Changes of an existing trigger trigger_update_CL
Updates in hosts, services, and domains in exposed assets scope_object_CL
Changes in API inventory (if the corresponding trigger is active) api_structure_changed_CL
Amount of attacks exceeds the threshold (if the corresponding trigger is active) attacks_exceeded_CL
New denylisted IP (if the corresponding trigger is active) ip_blocked_CL

Updating integration

To update the settings of active integration:

  1. Go to Wallarm Console → Integrations in the US or EU Cloud.

  2. Open an active integration.

  3. Make required changes and click Save.

Disabling integration

To stop sending reports and notifications temporarily, you can disable the integration:

  1. Go to Wallarm Console → Integrations in the US or EU Cloud.

  2. Open an active integration and click Disable.

To re-enable sending reports and notifications, open the disabled integration and click Enable.

Disabling the integration is the system event. If you receive system notifications, messages about disabled integration will be sent to the configured system.

Deleting integration

To stop sending reports and notifications permanently, you can delete the integration. Deleting an integration cannot be undone. The integration will be removed from the list permanently.

  1. Go to Wallarm Console → Integrations in the US or EU Cloud.

  2. Open integration and click Delete.

  3. Confirm the action.

Deleting the integration is the system event. If you receive system notifications, messages about deleted integration will be sent to the configured system.