Azure Log Analytics aggregates and provides search capabilities over data in an Azure deployment. Azure Log Analytics functions as a data store for Azure applications, but can also be queried manually.
Depending on policy and configuration, Azure Log Analytics can contain all kinds of data relevant to a security team. Most notably, after security audit policies are enabled on Azure VMs, they feed log data to Azure Log Analytics where it can be queried in the Analytics Portal.
Connecting your device to Workbench allows Workbench to ingest the data. Azure Log Analytics data include a great deal of information that can take hours to manually review.
Step 1: Enable console access
-
Sign into the Azure portal as a user who is assigned a limited administrator directory role or the Guest Inviter role.
-
In the navigation pane, click Azure Active Directory.
-
Under Manage, select Users.
-
Select New guest user.
-
On the New user page, click Invite user, fill out the email address (expel_analyst@expel.io), and optionally include a message.
-
Under roles, add the role Global Reader role.
-
Click Invite to automatically send the invitation to the guest user. After you send the invitation, the user account is automatically added to the directory as a guest.
Step 2: Enable Azure application access
-
As an Azure administrator, log in to the Azure portal.
-
Navigate to Azure Active Directory > App registrations and click +New registration.
-
Fill in the application details. You can fill these in however you want, but we recommend this:
-
Name: Expel - Log Analytics API
-
Supported account types: Accounts in this organizational directory only (1st option).
-
-
After you fill out the fields, click Register to create the new application.
-
You should be navigated automatically to the settings page for the Expel Cloud Service app you just created. If not, navigate to Azure Active Directory > App Registrations > View all applications (if you don’t see the new app) > Expel - Log Analytics API.
-
Make a note of the Application (client) ID, Application secret, and the Directory (tenant) ID for use in later steps.
-
Open API permissions. Click + Add a permission.
-
Head over to Log Analytic Workspace > Access Control (IAM) > + Add and assign the Log Analytics Reader role to the application and user created in above steps.
Step 3: Configure Azure Log Analytics in Workbench
-
In a new browser tab, login to https://workbench.expel.io/settings/security-devices?setupIntegration=azure_log_analytics.
-
Fill in the fields like this:
-
For Name type the host name of the Azure Log Analytics device.
-
For Location type Cloud.
-
For Directory ID, type the ID of the AzureActive Directory (tenant) in the cloud instance.
-
For Application ID, type the ID of the application with access to Azure Log Analytics.
-
For Application secret, type the key used to authenticate the application.
-
For Workspace ID, type the ID of the workspace within Azure Log Analytics.
-
Comments
1 comment
Customer reported that the links from step 2 are apparently defunct. I followed them myself and receive a DNS error as though they are unreachable.
Please sign in to leave a comment.