Azure Sentinel

Version: 1.0.7

Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.

Connect Azure Sentinel with LogicHub

  1. Navigate to Automations > Integrations.
  2. Search for Azure Sentinel.
  3. Click Details, then the + icon. Enter the required information in the following fields.
    • Label: Enter a connection name.
    • Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
    • Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
    • Remote Agent: Run this integration using the LogicHub Remote Agent.
    • Tenant ID: Tenant/directory ID for Azure Sentinel.
    • Client ID: Client id for Azure Sentinel.
    • Client Secret: Client secret for Azure Sentinel.
  4. After you've entered all the details, click Connect.

Actions for Azure Sentinel

Execute Query

Executes an analytics query for data.

Input Field

Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.

Input Name



Workspace Id

Column name from the parent table that contains the ID of the workspace.



Column name from the parent table that contains the query to execute. Example: Usage | take 10.


Start Date

Column name from the parent table that contains start date. Example: YYYY-MM-DD (default is last 30 Days).


End Date

Column name from the parent table that contains end date. Example: YYYY-MM-DD (default is the last 30 days).



A JSON object containing multiple rows of result:

  • has_error: True/False
  • error: message/null
  • result: Query Result

Did this page help you?