Sending SlashID Detections to Microsoft Sentinel
SlashID can forward real-time identity security detections directly to your Microsoft Sentinel environment using the Azure Monitor HTTP Data Collector API. This guide walks you through the steps to configure Azure and connect it with SlashID.
Step 1: Locate Your Log Analytics Workspace
- Log in to the Azure Portal.
- Navigate to Log Analytics workspaces.
- Select the workspace that is connected to your Microsoft Sentinel instance.
If you don't have a Log Analytics workspace connected to Sentinel yet, create one first by going to Microsoft Sentinel > Create and following the setup wizard.
Step 2: Collect Workspace ID and Shared Key
- In your Log Analytics workspace, go to Settings > Agents.
- Expand Log Analytics agent instructions.
- Note down the following values:
| Field | Description |
|---|---|
| Workspace ID | A unique identifier for your Log Analytics workspace (GUID format) |
| Primary Key or Secondary Key | The shared key used for authentication |
Keep your shared key secure. Anyone with this key can send data to your workspace. You can use either the Primary or Secondary key - both work identically.
Step 3: Choose a Log Type Name
Decide on a Log Type name for your SlashID detections. This name will be used to create a custom log table in your Log Analytics workspace.
Recommendations:
- Use a descriptive name like
SlashIDDetectionsorIdentitySecurityFindings - Use only alphanumeric characters (no spaces or special characters)
- The table will appear in Sentinel with a
_CLsuffix (e.g.,SlashIDDetections_CL)
Step 4: Configure SlashID to Send Detections
- In the SlashID Console, go to Identity Protection > Configuration > Integrations.
- Click Add Integration and select Microsoft Sentinel from the list.
- Fill in the integration details:
| SlashID Console Field | Description |
|---|---|
| Workspace ID | The Log Analytics Workspace ID from Step 2 |
| Shared Key | The Primary or Secondary key from Step 2 |
| Log Type | Your chosen log type name (e.g., SlashIDDetections) |
- Select which types of detections (Risk Category) and severity levels you want to sync.
- Click Connect to save and activate the integration.
Step 5: Verify Data in Microsoft Sentinel
Once configured, SlashID will stream detection events to your Sentinel instance. To verify the integration is working:
- In the Azure Portal, navigate to your Log Analytics workspace.
- Go to Logs and run the following query (replace with your log type name):
SlashIDDetections_CL
| take 10
It may take a few minutes for the first events to appear. Custom log tables are created automatically when the first data is received.
Data Format
SlashID sends detections in the OCSF Detection Finding format. Each event includes:
| Field | Description |
|---|---|
TimeGenerated | Timestamp of when the detection was generated |
Data | The full detection payload in OCSF format |
The Data field contains detailed information about the detection, including:
- Detection type and category
- Severity and confidence score
- Affected entities and resources
- Remediation recommendations
Troubleshooting
Events not appearing in Sentinel
- Verify your Workspace ID is correct (it should be a GUID)
- Check that your Shared Key hasn't been rotated
- Ensure your Log Analytics workspace has sufficient capacity
- Wait at least 5 minutes for initial data ingestion
Authentication errors
If you see authentication errors in SlashID:
- Regenerate your Shared Key in the Azure Portal
- Update the key in the SlashID Console
- Verify the Workspace ID matches exactly (case-sensitive)
Need Help?
If you run into issues during setup or need assistance with custom configurations, reach out to support@slashid.dev.