Integrating Keeper SIEM event pushes to Azure Sentinel and Log Analytics
Microsoft is deprecating this logging method sometime in 2025. Please see the Azure Monitor setup.
Overview
Keeper supports event streaming into Azure Sentinel / Log Analytics environments. External logging is real-time, and new events will appear almost immediately. Setup instructions are below.
In Azure, go to Log Analytics workspaces > Select Workspace > Classic "Agents Management". From here you can retrieve a Workspace ID and Key. Provide these two fields to Keeper to start streaming logs to your selected workspace.
Workspace ID and Key
Azure Sentinel Integration Settings
Keeper will immediately start sending event data to the designated Azure Log Analytics workspace, under a custom table named Keeper_CL.
To view the logs, open the Log Analytics Workspace > Logs > select the Keeper_CL table.
Log Analytics Workspace Logs
Troubleshooting
If you need to troubleshoot the event log APIs, the below Python script will simulate the Keeper backend system sending event logs to your Azure environment. Replace the Workspace ID and Workspace Key before testing it.