Azure Security Center

Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud.

Integration with LogicHub

Connecting with Azure Security Center

To connect with Azure Security Center following details are required:

  • Label: Connection name.
  • Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
  • Tenant ID: Tenant/directory id for Azure Security Center.
  • Client ID: Client Id of the app created in Azure Active Directory.
  • Client Secret: Client secret of the app created in Azure Active Directory.

Actions with Azure Security Center

List security alerts

List all security alerts.

Inputs to this Action

  • Connection: Choose a connection that you have created.
  • Subscription ID: Column name from parent table that contains subscription ID.
  • Start Time (Optional): Enter the value for start time (default is Batch start time). Example: 2020-09-01T22:02:24-07:00.
  • End Time (Optional): Enter the value for end time (default is Batch end time). Example: 2020-10-01T22:02:24-07:00.
  • Maximum Results (Optional): The maximum number of results to return per call (default is 10000).

Output of Action
JSON containing following items:

  • has_error: True/False
  • error: message/null
  • result: List of alerts.
  "id": "/subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/myRg1/providers/Microsoft.Security/locations/westeurope/alerts/2518770965529163669_F144EE95-A3E5-42DA-A279-967D115809AA",
  "name": "2518298467986649999_4d25bfef-2d77-4a08-adc0-3e35715cc92a",
  "type": "Microsoft.Security/Locations/alerts",
  "properties": {
    "alertType": "VM_EICAR",
    "systemAlertId": "2518298467986649999_4d25bfef-2d77-4a08-adc0-3e35715cc92a",
    "productComponentName": "",
    "alertDisplayName": "Azure Security Center test alert (not a threat)",
    "description": "This is a test alert generated by Azure Security Center. No further action is needed.",
    "severity": "High",
    "intent": "Execution",
    "startTimeUtc": "2020-02-22T00:00:00.0000000Z",
    "endTimeUtc": "2020-02-22T00:00:00.0000000Z",
    "resourceIdentifiers": [
        "azureResourceId": "/subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/myRg1/providers/Microsoft.Compute/virtualMachines/vm1",
        "type": "AzureResource"
        "workspaceId": "f419f624-acad-4d89-b86d-f62fa387f019",
        "workspaceSubscriptionId": "20ff7fc3-e762-44dd-bd96-b71116dcdc23",
        "workspaceResourceGroup": "myRg1",
        "agentId": "75724a01-f021-4aa8-9ec2-329792373e6e",
        "type": "LogAnalytics"
    "remediationSteps": [
      "No further action is needed."
    "vendorName": "Microsoft",
    "status": "New",
    "extendedLinks": [
        "Category": "threat_reports",
        "Label": "Report: RDP Brute Forcing",
        "Href": "",
        "Type": "webLink"
    "alertUri": "",
    "timeGeneratedUtc": "2020-02-23T13:47:58.0000000Z",
    "productName": "Azure Security Center",
    "processingEndTimeUtc": "2020-02-23T13:47:58.9205584Z",
    "entities": [
        "address": "",
        "location": {
          "countryCode": "gb",
          "state": "wokingham",
          "city": "sonning",
          "longitude": -0.909,
          "latitude": 51.468,
          "asn": 6584
        "type": "ip"
    "isIncident": true,
    "correlationKey": "kso0LFWxzCll5tqrk5hmrBJ+MY1BX806W6q6+0s9Lk=",
    "extendedProperties": {
      "Property1": "Property1 information"
    "compromisedEntity": "vm1"

Did this page help you?