# Microsoft Sentinel with Azure Marketplace

### Overview

This guide walks you through the step-by-step installation and configuration process for the Keeper Security SIEM integration with Microsoft Sentinel. Keeper Security is available in the Content Hub section of Microsoft Sentinel as an out-of-the-box integration in the Commercial and Government regions.

Commercial:\
<https://portal.azure.com/#create/keepersecurity.keeper-security-integrationkeeper-security-sentinel-1>

Azure Government:\
<https://portal.azure.us/#create/keepersecurity.keeper-security-integrationkeeper-security-sentinel-1>&#x20;

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FdAavdzojvCqW2v9PKj0T%2FScreenshot%202025-07-31%20at%2012.48.05%E2%80%AFPM.png?alt=media&#x26;token=34527792-4aee-46f2-b242-2c323ae4e4bd" alt=""><figcaption></figcaption></figure>

### 1. Select Subscription and Plan

* Choose your Azure Subscription.
* Select the plan: Keeper Security Integration.
* Click the Create button.

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FA6M8S3NQvEe7Ts1bPngJ%2Fimage.png?alt=media&#x26;token=70627c4f-6d4b-45ef-8d93-4e585c6ceb20" alt=""><figcaption></figcaption></figure>

***

### 2. Configure Basic Project Details

* Select the Resource Group where the solution should be deployed.
* Choose the Log Analytics Workspace where the logs will be ingested.
* Ensure the subscription is correctly selected.

***

### 3. Review and Create

* Review your selections including:
  * Name
  * Preferred email and phone number
  * Subscription
  * Resource group
  * Workspace
* Click Create to proceed with deployment.

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2F6tz1OrAFbbtoPHDM9YFM%2Fimage.png?alt=media&#x26;token=001bc49d-1ad1-4e01-a63f-59a722513b40" alt=""><figcaption></figcaption></figure>

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FCAXtlInMYo4X2IYuGp3p%2Fimage.png?alt=media&#x26;token=74bed378-6f62-4c27-bdf9-fe373388f6af" alt=""><figcaption></figcaption></figure>

***

### 4. Access Content Hub in Microsoft Sentinel

* Open **Microsoft Sentinel**.
* Select your workspace (e.g., Keeper301-final).
* Go to **Content Management** > **Content Hub**.
* Locate Keeper Security and confirm it’s installed.

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2F5mHc0BVlICPhUl9QNZNZ%2Fimage.png?alt=media&#x26;token=1fb7d372-60e4-404e-9027-a8ee9395c7f3" alt=""><figcaption></figcaption></figure>

***

### 5. Manage Installed Content

* Click the Keeper Security row.
* On the right panel, click Manage to see content details.

***

### 6. View Installed Content Items

You will find the following components:

* Keeper Security Push Connector (Data Connector)
* Password Changed (Analytics Rule)
* User MFA Changed (Analytics Rule)
* Keeper Security Dashboard (Workbook)<br>

Click on **Keeper Security Push Connector** to configure Entra integration.

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FQQnYaP2f9O7yBNRk0nEi%2Fimage.png?alt=media&#x26;token=4ebbde65-fce6-4ab2-a21b-f172f0f3c78b" alt=""><figcaption></figcaption></figure>

***

### 7. Generate Entra Configuration

* Click the button: Deploy push connector to set the App Registration Secret.
* This automatically generates:
  * Tenant ID (Directory ID)
  * Application (Client) ID
  * Client Secret
  * Data Collection Endpoint URL
  * Data Collection Immutable ID (DCR ID)

{% hint style="warning" %}
Copy these values — you’ll need them to configure log forwarding from Keeper.
{% endhint %}

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FPbGWGO4npEcYYcbuTwQY%2Fimage.png?alt=media&#x26;token=e83e8e81-fd1c-4266-9326-9c3744d8ec4a" alt=""><figcaption></figcaption></figure>

***

### 8. Configure Keeper Admin Console

Navigate to the **Keeper Admin Console** → **Reporting & Alerts** → **Azure Monitor Logs** and input the details from [Step 7](#id-7.-generate-entra-configuration):

* **Azure Tenant ID**
* **Application (Client) ID**
* **Client Secret Value**
* **Endpoint URL (assembled as shown below)**

#### Logs Ingestion URL Format Example:

{% code overflow="wrap" %}

```
https://<Collection_URL>/dataCollectionRules/<DCR_ID>/streams/Custom-KeeperSecurityEventNewLogs?api-version=2023-01-01
```

{% endcode %}

* DCR\_ID: Use the Immutable ID from the Data Collector Rule.
* Custom-KeeperSecurityEventNewLogs: This is the table created by Azure.

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FT2B4WKHL4MONctdpZgaY%2Fsentinel_setup.png?alt=media&#x26;token=947200b5-4f93-4dfe-8032-49535fc09577" alt="Sync Settings for Microsoft Sentinel"><figcaption></figcaption></figure>

***

### 9. Optional: Enable Analytics Rule - Master Password Changed

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FMeryOBF6DZ5Poz59sJ3Y%2FScreenshot%20at%20Sep%2008%2017-01-58.png?alt=media&#x26;token=a2e1e396-284a-4377-a826-c7417e0f6924" alt=""><figcaption></figcaption></figure>

You can optionally enable an Analytics Rule in Microsoft Sentinel to automatically detect when a Keeper user changes their Master Password.

#### Step 1. Access Installed Content

* In Microsoft Sentinel, go to Content Hub → Keeper Security SIEM Integration.
* Under *Installed content items*, locate Keeper Security – Password Changed (Analytics Rule).
* Click on it to start configuration.

***

#### Step 2. Open the Rule Template

* Select the rule template Keeper Security – Password Changed.
* On the right panel, click Create rule.
* This will launch the Analytics Rule Wizard.

***

#### Step 3. Configure General Settings

* Name: *Keeper Security – Password Changed* (default).
* Description: Creates an informational incident when a Keeper Security Password Changed event is detected.
* Severity: Informational.
* MITRE ATT\&CK: Select Persistence (T1556).
* Status: Keep Enabled.
* Click Next: Set rule logic.

***

#### Step 4. Define Rule Logic

* Use the following query:

```kusto
KeeperSecurityEventNewLogs_CL
| where AuditEvent == "change_master_password"
```

⚠️ Note: Ensure that the table KeeperSecurityEventNewLogs\_CL exists (it is created automatically when Keeper logs start flowing into Sentinel). If logs are not yet ingested, the query may return an error during validation.

* Under *Event grouping*, select Trigger an alert for each event.
* Click Next: Incident settings.

***

#### Step 5. Configure Incident Settings

* Enable: Create incidents from alerts triggered by this rule.
* Alert grouping: Disabled (recommended for password events to capture each one individually).
* Click Next: Automated response.

***

#### Step 6. Optional – Add Automated Response

* You may attach a Logic App playbook if you want automated response actions (e.g., notify security team via Teams or email).
* Otherwise, leave automation rules empty.
* Click Next: Review + create.

***

#### Step 7. Review and Create

* Confirm all details:
  * Rule Name
  * Query
  * Severity
  * Entity mapping: Username → Account, RemoteAddress → IP
* Click Create to finalize.

***

### 10. Optional: Enable Analytics Rule – User MFA Changed

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FjbCOq5OOt2G7nBDkZdhA%2FScreenshot%20at%20Sep%2008%2017-10-14.png?alt=media&#x26;token=a268d5d2-ffae-42e4-ac4f-d4a8388e29ee" alt=""><figcaption></figcaption></figure>

You can optionally enable an Analytics Rule in Microsoft Sentinel to automatically detect when a Keeper user changes their multi-factor authentication (MFA) settings. This provides visibility whenever users enable or disable two-factor authentication.

***

#### Step 1. Access Installed Content

* In Microsoft Sentinel, go to Content Hub → Keeper Security SIEM Integration.
* Under *Installed content items*, select Keeper Security – User MFA Changed.
* Click on it to view the details.

***

#### Step 2. Open the Rule Template

* Select Keeper Security – User MFA Changed.
* On the right panel, click Create rule.
* This will launch the Analytics Rule Wizard.

***

#### Step 3. Configure General Settings

* Name: *Keeper Security – User MFA Changed* (default).
* Description: Creates an informational incident when MFA settings change in Keeper Security.
* Severity: Informational.
* MITRE ATT\&CK: Select Persistence (T1556).
* Status: Keep Enabled.
* Click Next: Set rule logic.

***

#### Step 4. Define Rule Logic

Use the following query:

```kusto
KeeperSecurityEventNewLogs_CL
| where AuditEvent in ("set_two_factor_off", "set_two_factor_on")
```

* Under *Event grouping*, select Trigger an alert for each event.
* Click Next: Incident settings.

***

#### Step 5. Configure Incident Settings

* Enable: Create incidents from alerts triggered by this rule.
* Alert grouping: Disabled (each MFA change will create a separate incident).
* Click Next: Automated response.

***

#### Step 6. Optional – Add Automated Response

* You may attach a Logic App playbook if you want automated response actions (e.g., notify the SOC team in Teams, Slack, or email).
* Otherwise, leave automation rules empty.
* Click Next: Review + create.

***

#### Step 7. Review and Create

* Confirm all details:
  * Rule Name
  * Query
  * Severity
  * Entity mappings (Username → Account, RemoteAddress → IP)
* Click Create to finalize.

***

### 11. Optional: Enable Workbook – Keeper Security Dashboard

<figure><img src="https://4290574019-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LO5CAzpxoaEquZJBpYz%2Fuploads%2FB4LLVh4h6bXnVG8LSwUc%2FScreenshot%20at%20Sep%2008%2017-12-54.png?alt=media&#x26;token=c99e5dfb-3110-4485-aa5a-42e40e842898" alt=""><figcaption></figcaption></figure>

You can optionally enable the Keeper Security Dashboard workbook in Microsoft Sentinel to visualize Keeper event data. The dashboard provides insights into password changes, MFA events, privileged activity, and overall Keeper usage trends.

***

#### Step 1. Access Installed Content

* In Microsoft Sentinel, navigate to Content Hub → Keeper Security SIEM Integration.
* Under *Installed content items*, select Keeper Security Dashboard.

***

#### Step 2. Save the Workbook Template

* From the Workbook view, select Keeper Security Dashboard.
* In the right-hand panel, click Save.
* The template will now be added to your personal workbooks list.

***

#### Step 3. Open the Saved Workbook

* Once saved, go to Workbooks.
* Select Keeper Security Dashboard from the list.
* Click View saved workbook to open it.

***

#### Step 4. Visualize Keeper Events

The Keeper Security Dashboard includes prebuilt charts and insights, such as:

* Password Changes (audit trail of users changing their master password).
* MFA Events (tracking when MFA is turned on/off).
* User Activity (logins, session usage, record access).
* Security Alerts (policy changes, privileged actions, anomaly patterns).

***

### ✅ Success

Once configured properly, you should see logs appearing in Microsoft Sentinel under the table:

```
KeeperSecurityEventNewLogs_CL
```

You have now successfully integrated Keeper with Microsoft Sentinel using the Azure Monitor Logs ingestion method.
