Quick setup instructions for integrating Keeper SIEM events with Microsoft Sentinel through the Azure Marketplace
This guide walks you through the step-by-step installation and configuration process for the Keeper Security SIEM integration with Microsoft Sentinel. Keeper Security is available in the Content Hub section of Microsoft Sentinel as an out-of-the-box integration in the Commercial and Government regions.
Commercial: https://portal.azure.com/#create/keepersecurity.keeper-security-integrationkeeper-security-sentinel-1
Azure Government: https://portal.azure.us/#create/keepersecurity.keeper-security-integrationkeeper-security-sentinel-1
Choose your Azure Subscription.
Select the plan: Keeper Security Integration.
Click the Create button.
Select the Resource Group where the solution should be deployed.
Choose the Log Analytics Workspace where the logs will be ingested.
Ensure the subscription is correctly selected.
Review your selections including:
Name
Preferred email and phone number
Subscription
Open Microsoft Sentinel.
Select your workspace (e.g., Keeper301-final).
Go to Content Management > Content Hub.
Locate Keeper Security and confirm it’s installed.
Click the Keeper Security row.
On the right panel, click Manage to see content details.
You will find the following components:
Keeper Security Push Connector (Data Connector)
Password Changed (Analytics Rule)
User MFA Changed (Analytics Rule)
Keeper Security Dashboard (Workbook)
Click on Keeper Security Push Connector to configure Entra integration.
Click the button: Deploy push connector to set the App Registration Secret.
This automatically generates:
Tenant ID (Directory ID)
Application (Client) ID
Copy these values — you’ll need them to configure log forwarding from Keeper.
Navigate to the Keeper Admin Console → Reporting & Alerts → Azure Monitor Logs and input the details from :
Azure Tenant ID
Application (Client) ID
Client Secret Value
Endpoint URL (assembled as shown below)
DCR_ID: Use the Immutable ID from the Data Collector Rule.
Custom-KeeperSecurityEventNewLogs: This is the table created by Azure.
You can optionally enable an Analytics Rule in Microsoft Sentinel to automatically detect when a Keeper user changes their Master Password.
In Microsoft Sentinel, go to Content Hub → Keeper Security SIEM Integration.
Under Installed content items, locate Keeper Security – Password Changed (Analytics Rule).
Click on it to start configuration.
Select the rule template Keeper Security – Password Changed.
On the right panel, click Create rule.
This will launch the Analytics Rule Wizard.
Name: Keeper Security – Password Changed (default).
Description: Creates an informational incident when a Keeper Security Password Changed event is detected.
Severity: Informational.
MITRE ATT&CK: Select Persistence (T1556).
Use the following query:
⚠️ Note: Ensure that the table KeeperSecurityEventNewLogs_CL exists (it is created automatically when Keeper logs start flowing into Sentinel). If logs are not yet ingested, the query may return an error during validation.
Under Event grouping, select Trigger an alert for each event.
Click Next: Incident settings.
Enable: Create incidents from alerts triggered by this rule.
Alert grouping: Disabled (recommended for password events to capture each one individually).
Click Next: Automated response.
You may attach a Logic App playbook if you want automated response actions (e.g., notify security team via Teams or email).
Otherwise, leave automation rules empty.
Click Next: Review + create.
Confirm all details:
Rule Name
Query
Severity
You can optionally enable an Analytics Rule in Microsoft Sentinel to automatically detect when a Keeper user changes their multi-factor authentication (MFA) settings. This provides visibility whenever users enable or disable two-factor authentication.
In Microsoft Sentinel, go to Content Hub → Keeper Security SIEM Integration.
Under Installed content items, select Keeper Security – User MFA Changed.
Click on it to view the details.
Select Keeper Security – User MFA Changed.
On the right panel, click Create rule.
This will launch the Analytics Rule Wizard.
Name: Keeper Security – User MFA Changed (default).
Description: Creates an informational incident when MFA settings change in Keeper Security.
Severity: Informational.
MITRE ATT&CK: Select Persistence (T1556).
Use the following query:
Under Event grouping, select Trigger an alert for each event.
Click Next: Incident settings.
Enable: Create incidents from alerts triggered by this rule.
Alert grouping: Disabled (each MFA change will create a separate incident).
Click Next: Automated response.
You may attach a Logic App playbook if you want automated response actions (e.g., notify the SOC team in Teams, Slack, or email).
Otherwise, leave automation rules empty.
Click Next: Review + create.
Confirm all details:
Rule Name
Query
Severity
You can optionally enable the Keeper Security Dashboard workbook in Microsoft Sentinel to visualize Keeper event data. The dashboard provides insights into password changes, MFA events, privileged activity, and overall Keeper usage trends.
In Microsoft Sentinel, navigate to Content Hub → Keeper Security SIEM Integration.
Under Installed content items, select Keeper Security Dashboard.
From the Workbook view, select Keeper Security Dashboard.
In the right-hand panel, click Save.
The template will now be added to your personal workbooks list.
Once saved, go to Workbooks.
Select Keeper Security Dashboard from the list.
Click View saved workbook to open it.
The Keeper Security Dashboard includes prebuilt charts and insights, such as:
Password Changes (audit trail of users changing their master password).
MFA Events (tracking when MFA is turned on/off).
User Activity (logins, session usage, record access).
Security Alerts (policy changes, privileged actions, anomaly patterns).
Once configured properly, you should see logs appearing in Microsoft Sentinel under the table:
You have now successfully integrated Keeper with Microsoft Sentinel using the Azure Monitor Logs ingestion method.
Resource group
Workspace
Click Create to proceed with deployment.
Client Secret
Data Collection Endpoint URL
Data Collection Immutable ID (DCR ID)
Status: Keep Enabled.
Click Next: Set rule logic.
Entity mapping: Username → Account, RemoteAddress → IP
Click Create to finalize.
Status: Keep Enabled.
Click Next: Set rule logic.
Entity mappings (Username → Account, RemoteAddress → IP)
Click Create to finalize.

https://<Collection_URL>/dataCollectionRules/<DCR_ID>/streams/Custom-KeeperSecurityEventNewLogs?api-version=2023-01-01KeeperSecurityEventNewLogs_CL
| where AuditEvent == "change_master_password"KeeperSecurityEventNewLogs_CL
| where AuditEvent in ("set_two_factor_off", "set_two_factor_on")KeeperSecurityEventNewLogs_CL








