

- #Difference between azure sentinel and azure security center how to#
- #Difference between azure sentinel and azure security center pro#
- #Difference between azure sentinel and azure security center code#
Of course it’s a good practice to check the output of the commands and log the necessary information about the status.
#Difference between azure sentinel and azure security center code#
Note: the code snippets are simplified for reading purposes and do not contain error handling/checking! They also parse more output response than needed for the snippets. You can find some documentation at, but in this blogpost I’m covering an in-depth how-to get the incident information, including the entity information via the Sentinel Management API. But it’s possible to do almost everything with Azure Sentinel via the API. The Azure Sentinel Management API is, sadly enough, a not (yet) well/completly documented feature of Azure Sentinel.

You can use any format you want, the format in the screenshot below is the format our processor understands, so we didn’t need an extra translation.īecause pictures say more than words the playbook we used:

For the ease of use, we’ve added some other actions to gather some entity data (“Alert – Get… “-actions), however this isn’t strictly necessary for sending the information to another systemĪfter we gathered all the data, we send that event to our Azure Event Hub namespace. When creating an Azure Sentinel Playbook, just create a Logic App with the trigger “When a response to an Azure Sentinel alert is triggered”.
#Difference between azure sentinel and azure security center how to#
NOTE: I will not cover the how to use/setup of these Playbooks in-depth, in this blogpost. After the trigger, you can send your data to almost anything you want. A Playbook is in fact an Azure Logic App with an Azure Sentinel function as trigger. Nice! PlaybooksĪzure Sentinel gives you the option to trigger a Playbook when an analytics-rule is hit. However, with the Azure Sentinel Management API approach, we can query all incidents including the ones that are triggered by Azure Security Center Alerts. Hence: if you only need to trigger an action with custom rules, you can use the Sentinel Playbook approach off course. This time, we focussed on using the Azure Sentinel Management API to extract the needed information from Azure Sentinel. We hit a big con: you can’t use Playbooks with Microsoft’s predefined Azure Sentinel rules, one of which was a rule that generates incidents from an Azure Security Center alarm.
#Difference between azure sentinel and azure security center pro#
A big pro for this method was that most of this solution was already made available by Azure and our SIEM vendor. Our first angle of approach, was to use a Playbook to send the incident information to an Azure Event Hub, and a connector to connect the Event Hub to our SIEM. To achieve this, we had to create a connection between Azure Sentinel and our SIEM, with only the needed information of the incidents. To achieve our requirement, we just want to get incident notifications from Azure Sentinel only to our on-prem SIEM. Because keeping an eye at lots of dashboards at once is not feasible, we had one strong requirement: We need a single dashboard, for all the alerts occurring in any of the monitored environments, ours, and those of our customers.īecause we use our own SIEM to monitor our own environment, we do not want all the logs from the Azure-resources of our customers in our on-prem SIEM (the key component of a SIEM is log-correllation, which would not benefit us anyway). We also use Azure Sentinel as Cloud SIEM for a few customers, to further monitor their resources in Azure. At Info Support, we use an on-premise SIEM in our security monitoring setup.
