Secure Access Getting Started Guide
- Cloud Edge Secure Access
- Welcome to SonicWall Cloud Edge!
- Prerequisites
- Installation
- Networks
- Groups and Members
- Securing the Platform
- Monitoring
- Compliance
- SonicWall Support
Azure Sentinel
This article describes how to set up and use Azure Sentinel. It is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that integrates with the SonicWall Cloud Edge platform. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. You can configure your SonicWall Cloud Edge data stream to Azure Sentinel to have full visibility of your SonicWall Cloud Edge activity.
- Setting up a Log Analytics workspace
- Linking the Log Analytics Workspace to Azure Sentinel
- Finding your Log Analytics Workspace ID and Primary Key
- Configuring the integration in the Management Platform
-
Handling possible error codes
Setting up a Log Analytics workspace
If you are using an existing log analytics workspace, you may skip this part.
-
Open the Azure portal and select Azure Sentinel.
-
Select +Add.
-
Select Create a new workspace.
-
Fill in the following information:
-
Subscription: Choose a subscription according to your business's needs.
-
Resource group: Associate the log analytics workspace with the appropriate business unit.
-
Name: Choose an indicative name of your own choice. The workspace name should include 4-63 letters, digits, or '-'. The '-' shouldn't be the first or the last symbol.
-
Region: The physical location of the server generating the event collector. Choose according to pricing and business needs.
-
(Optional) Review the pricing tiers and set appropriate tags for the workspace.
-
Select Review + Create.
-
Linking the Logs Analytics workspace to Azure Sentinel
-
Open the Azure portal and select Azure Sentinel.
-
Select +Add.
-
Select the Logs Analytics Workspace that you've just created or an existing one you'd like to utilize.
Finding your Log Analytics workspace ID and primary key
-
Open Log Analytics Workspace.
-
Select the workspace you've just connected to Azure Sentinel.
-
Select Advanced settings.
-
Select Connected Sources, then Linux Servers. Copy the Workspace ID as well as the Primary key.
Configuring the integration at the Management Platform
-
Log in to your Management Platform, and navigate to Settings/Integrations, and select Add at the Azure Sentinel row.
-
Fill in according to the values copied in the previous steps (the primary key will use as your workspace key).
-
Select Validate.
Handling possible error codes
Status Message | Action Required |
Success | None |
SENTINEL_INACTIVE_CUSTOMER | The workspace has been deactivated. |
SENTINEL_INVALID_CUSTOMER_ID | Please make sure you inserted the correct customer ID. |
SENTINEL_INVALID_AUTHORIZATION | The service failed to authenticate the request. Verify that the workspace ID and connection key are valid. |
Was This Article Helpful?
Help us to improve our support portal