Overview
Defense.com SIEM can ingest Azure Activity Logs to track administrative, security, alert, and policy events in your Azure subscription. This setup provides your analysts with visibility into critical activities.
Prerequisites
Before starting, ensure:
You have Azure portal access with permissions to manage subscriptions and resources.
The
Microsoft.OperationalInsights
resource provider is registered for your subscription. To check:Go to Subscriptions in the Azure portal.
Select your subscription, then click Resource Providers.
Verify
Microsoft.OperationalInsights
is registered. If not, register it.
Step 1: Create a resource group
A resource group is a logical collection of Azure resources. All resources are deployed and managed in a resource group. To create a resource group:
Sign in to the Azure portal.
In the left navigation, select Resource groups, and then select Create.
For Subscription, select the name of the Azure subscription in which you want to create the resource group.
Type a unique name for the resource group. The system immediately checks to see if the name is available in the selected Azure subscription.
Select a region for the resource group.
Select Review + Create.
On the Review + Create page, select Create.
Step 2: Create an Event Hub Namespace
Set up an Event Hub Namespace to stream Azure Activity Logs.
In the Azure portal, navigate to Event Hubs and click Create.
Configure the namespace with these settings:
Name: (e.g CustomerName>-Defensecom-SIEM)
Pricing Tier: Basic
Subscription: Your subscription (e.g., Pay-As-You-Go)
Resource Group: Your resource group (e.g., siem)
Location: Your region (e.g., UK South)
Throughput Units: 1
Disable Auto-Inflate and Make this namespace zone redundant unless needed.
Click Create and wait for the namespace to deploy.
In the new namespace, go to Shared Access Policies and create a policy:
Name: activitylogs
Permissions: Select Manage (includes Send and Listen).
Save the policy.
Step 3: Configure Activity Log Diagnostic Settings
Stream Activity Logs to the Event Hub Namespace.
In the Azure portal, go to Activity Log.
Click Diagnostic settings, then Add diagnostic setting.
Set up the diagnostic setting:
Name: Defense.com SIEM
Check Stream to an event hub.
Subscription: Select your subscription.
Event Hub Namespace: Choose the namespace from Step 1
Event Hub Name: Select Create in selected namespace.
Event Hub Policy Name: Choose the activitylogs policy.
Enable logging for these event types:
Administrative
Security
Alert
Policy
Click Save. This creates an event hub named
insights-activity-logs
in your namespace. Note: This may take up to 30 minutes.
Step 4: Set Up Event Hub Access for Defense.com
Create a policy to allow Defense.com to retrieve logs.
In the Azure portal, go to the Event Hubs Namespace from Step 1.
Find the
insights-activity-logs
event hub.Select Shared Access Policies and create a new policy:
Name: DefenseActivityLogs
Permissions: Select Listen.
Copy the Primary Connection String for this policy.
Securely share the Primary Connection String and Event Hub Name with Defense.com via ticket at https://my.defense.com/support/tickets, we recommend providing the credentials via a https://www.onetimesecret.com link.
That's it! 🎉Defense.com will start ingesting your Azure Activity Logs.