Microsoft Sentinel is a cloud-native Security Information and Event Management (SIEM) solution from Microsoft that provides intelligent security analytics and threat intelligence across the enterprise. Sentinel collects and correlates security logs and alerts from multiple sources, enabling real-time threat detection, investigation, and automated response using built-in analytics and playbooks.
By integrating Applications Manager with Microsoft Sentinel using syslog, you can forward real-time audit logs, access logs, and alert events for centralized security monitoring and incident analysis. This integration enhances operational security by combining application performance events with Sentinel’s analytics and threat intelligence. Forwarded logs and events can be analyzed, correlated, and acted upon within the Sentinel portal, enhancing overall security visibility and operational response.
Before configuring Applications Manager, Microsoft Sentinel must be set up to receive syslog messages from the Applications Manager server. This usually involves creating a Log Analytics Workspace and enabling syslog data collection settings so that events sent from the Applications Manager server can be accepted and processed correctly. To enable Microsoft Sentinel to receive syslog events from Applications Manager:
Note: Ensure that UDP port 514 (or the particular port configured for receiving syslog) is reachable and not blocked by firewalls. Refer to Microsoft Sentinel documentation for detailed steps.
After configuring Microsoft Sentinel to receive syslog events, you need to configure Applications Manager to forward the required logs and alarms events. This involves configuring the SIEM integration for Microsoft Sentinel and associating an action profile to ensure that relevant data is transmitted to Microsoft Sentinel in the appropriate format.
To forward audit and access logs to Microsoft Sentinel, you need to first configure the SIEM (UDP/Syslog) integration settings in Applications Manager to allow selected audit modules and user access logs to be transmitted to the specified Microsoft Sentinel server. Follow the steps below to configure SIEM integration for Microsoft Sentinel:
Once done, audit logs and access logs event will now be forwarded to Microsoft Sentinel.
To forward alarm events to Microsoft Sentinel, the next step is to create and configure an SIEM Action profile. The SIEM Action profile defines the destination host, syslog format, severity mapping, and message structure for alarm notifications. Follow the steps below to create and configure the SIEM Action profile for Microsoft Sentinel:
After creating the SIEM Action Profile, associate it with the required alarm actions to ensure that monitoring alerts are forwarded to Microsoft Sentinel in real time.
Once both Applications Manager and Microsoft Sentinel are configured:
Once integrated, Microsoft Sentinel will continuously receive event data from Applications Manager, providing enriched insight into application-level behaviour alongside infrastructure and application logs.
It allows us to track crucial metrics such as response times, resource utilization, error rates, and transaction performance. The real-time monitoring alerts promptly notify us of any issues or anomalies, enabling us to take immediate action.
Reviewer Role: Research and Development