Automatically ingest SOCRadar threat intelligence and incidents into Microsoft Sentinel.
- Pulls SOCRadar incidents every 5 minutes
- Writes data to
SOCRadarIncidents_CLtable in Sentinel - Uses managed API connection for Log Analytics (automatic authentication)
- Azure Subscription with Microsoft Sentinel
- Log Analytics Workspace (where Sentinel is configured)
- Workspace Credentials:
- Workspace ID
- Primary Key
- SOCRadar Credentials:
- Company ID
- API Key
Option 1: Azure Portal
1. Go to Log Analytics Workspace
2. Settings → Agents
3. Copy Workspace ID and Primary Key
Option 2: Cloud Shell
az monitor log-analytics workspace get-shared-keys \
--resource-group YOUR_RG \
--workspace-name YOUR_WORKSPACE \
--query primarySharedKey -o tsv- Click Deploy to Azure button above
- Fill required parameters
- Click Review + create → Create
- Wait 2-3 minutes for deployment
Run these queries in Microsoft Sentinel → Logs to view your SOCRadar incidents.
SOCRadarIncidents_CL
| extend ParsedData = todynamic(data_s)
| mv-expand alarm = ParsedData.data
| extend
alarm_id = tolong(alarm.alarm_id),
status = tostring(alarm.status),
risk_level = tostring(alarm.alarm_risk_level),
alarm_text = tostring(alarm.alarm_text),
alarm_type = tostring(alarm.alarm_type_details),
date = todatetime(alarm.date)
| project TimeGenerated, alarm_id, status, risk_level, alarm_type, date, alarm_text
| sort by TimeGenerated desc
| take 50SOCRadarIncidents_CL
| extend ParsedData = todynamic(data_s)
| mv-expand alarm = ParsedData.data
| extend risk_level = tostring(alarm.alarm_risk_level)
| summarize count() by risk_level
| sort by count_ descSOCRadarIncidents_CL
| extend ParsedData = todynamic(data_s)
| mv-expand alarm = ParsedData.data
| extend
alarm_id = tolong(alarm.alarm_id),
status = tostring(alarm.status),
risk_level = tostring(alarm.alarm_risk_level),
alarm_text = tostring(alarm.alarm_text)
| where status == "OPEN" and risk_level in ("HIGH", "CRITICAL")
| project TimeGenerated, alarm_id, status, risk_level, alarm_text
| sort by TimeGenerated descSOCRadarIncidents_CL
| extend ParsedData = todynamic(data_s)
| mv-expand alarm = ParsedData.data
| extend status = tostring(alarm.status)
| summarize count() by status
| render columnchartNote: First data appears within 10-15 minutes after deployment.
Logic App fails:
- Check SOCRadar API key and Company ID
- Verify credentials in Logic App designer
No data in Sentinel:
- Wait 15 minutes (initial ingestion delay)
- Check Logic App run history shows "Succeeded"
- Verify Workspace ID/Key are correct
SOCRadar API → Logic App (5min) → Log Analytics → Sentinel
- Issues: GitHub Issues
- SOCRadar: [email protected]