This guide walks you through creating a Microsoft Entra ID application with permissions to access your Microsoft Sentinel instance, and gathering all of the necessary configuration values to create a Microsoft Sentinel integration.

Create a Microsoft Entra ID Application and Service Principal

Before you begin, you must have access to the Microsoft Azure portal and have a Microsoft Sentinel instance provisioned for a Log Analytics workspace.

1. Create Entra ID Application

API access is granted to a service principal, which is create by registering a new Application with Entra ID. Follow the Microsoft documentation to create the application. When complete, note the tenant ID, Application (client) ID, and the client secret to a safe location.

2. Assign permissions to the service principal

Note the modified permissions below when following the Microsoft documentation.

Once you have the application registered, add permissions and roles as described in the Microsoft Authentication documentation.

When adding API permissions, the Microsoft documentation suggests adding Data.Read as a 'Delegated' permission, but this does not grant the service principal access. Instead, add the Data.Read permission as an 'Application' permission. Once done, make sure you enable the permission by clicking the 'Grant admin consent' button.

When adding the Log Analytics Role Assignments, the documentation only notes adding the 'Reader' role. For full functionality, add all of the following roles:

  • Reader
  • Microsoft Sentinel Contributor

3. Gather the log analytics workspace values

On the Log Analytics workspace overview page, find the 'Resource group' name, 'Subscription ID', 'Workspace Name', and 'Workspace ID'. Note these values in a safe location along with you application authentication values.

If setting up ingestion, click on the "JSON View" link and copy the fully qualified resource ID into a safe location.

4. (Ingestion Only) Configure a Data Collection Rule

To support ingestion, set up a Data Collection Rule following steps 3 and 4 of our Sink configuration guide using the fully qualified Log Analytics Workspace ID gathered in step 3. When complete, save the Rule ID, Stream Name, and Logs Ingestion Endpoint values to a safe location. Take care to perform step 4, granting permissions on the Data Collection Rule to the application and service principal created in step 1 of this guide.

Configure the Integration

Create your integration by supplying all of the required and any desired optional values.

Logs URL (Optional): The root URL for the Microsoft Azure Monitor Logs API. This is optional and should only be supplied if using an alternate Microsoft cloud, such as GovCloud. Default "https://api.loganalytics.azure.com".

Management URL (Optional): The root URL for the Microsoft Azure Management API. This is optional and should only be supplied if using an alternate Microsoft cloud, such as GovCloud. Default "https://management.azure.com".

Tenant ID: This is the 'Directory (tenant) ID' gathered in step 1

Client ID: This is the 'Application (client) ID' gathered in step 1

Client Secret: This is the client secret gathered in step 1

Resource Group: This is the 'Resource Group' gathered in step 3

Subscription ID: This is the 'Subscription ID' gathered in step 3.

Workspace ID: This is the 'Workspace ID' gathered in step 3

Workspace Name: This is the 'Workspace Name' gathered in step 3

Ingest URL (Ingestion Only): This is the 'Logs Ingestion Endpoint' gathered in step 4.

Rule ID (Ingestion Only): This is the 'Rule ID' gathered in step 4.

Stream Name (Ingestion Only): This is the 'Stream Name' gathered in step 4.