Azure Sentinel Integration
Overview
Microsoft Sentinel is a cloud-native SIEM and SOAR solution built on Azure. It provides intelligent security analytics and threat intelligence across the enterprise, with a single solution for alert detection, threat visibility, proactive hunting, and threat response.
This guide walks you through integrating Microsoft Sentinel with the alert management platform. Since Sentinel does not natively support outbound HTTP webhooks, the integration is implemented using Azure Logic Apps (Playbooks) as middleware. When a Sentinel incident is created, an Automation Rule triggers a Logic App playbook that formats and forwards the incident payload via HTTP POST to the platform webhook.
Integration Flow
A security event or custom Analytics rule triggers a new Incident in Microsoft Sentinel.
The Sentinel Automation Rule detects the incident creation and runs the configured Logic App playbook.
The Logic App sends an HTTP POST request to the platform webhook with the structured incident payload.
The platform receives the payload, validates the schema, and creates an alert with the appropriate severity.
Webhook Payload Schema
The payload is sent by the Logic App as a custom-structured JSON object built from the Sentinel incident trigger output.
Field
Type
Required
Description
IncidentName
string
Yes
Display name of the Sentinel incident
IncidentNumber
integer
Yes
Auto-incremented incident identifier in the workspace
Severity
string
Yes
Incident severity: High, Medium, Low, or Informational
Status
string
Yes
Current lifecycle status: New, Active, or Closed
Description
string
No
Optional description of the incident (may be null)
WorkspaceId
string
Yes
Unique identifier of the Log Analytics workspace
CreatedTime
string
Yes
ISO 8601 timestamp of when the incident was created
LastModifiedTime
string
Yes
ISO 8601 timestamp of the last modification
Severity / Status Mapping
Sentinel's Severity field maps directly to platform priority:
Sentinel Severity
Platform Priority
Description
High
CRITICAL
High severity incident, immediate response required
Medium
HIGH
Medium severity incident, prompt investigation needed
Low
MEDIUM
Low severity incident, investigate when possible
Informational
LOW
Informational event, no immediate action required
Sentinel Status maps to platform alert lifecycle:
Sentinel Status
Platform Status
Description
New
PROBLEM
New incident created, not yet investigated
Active
PROBLEM
Incident is currently being investigated
Closed
RECOVERY
Incident has been resolved and closed
Alert Payload Examples
Raised (New Incident)
This payload is sent when a new Sentinel incident is created and the automation rule triggers the Logic App. The Status field is "New" and Severity reflects the analytics rule configuration.
JSON

Installation & Configuration
Step 1: Create an Alert Source in the Platform
Log in to the alert management platform.
Navigate to Integrations → Add Integration.
Select Microsoft Sentinel (or Custom Webhook) as the provider.
Name the integration (e.g.,
Production Sentinel Alerts).Save and copy the generated Webhook URL.
Step 2: Create a Log Analytics Workspace & Add Sentinel
Microsoft Sentinel requires a Log Analytics workspace. If you already have one, skip to Step 3.
In the Azure Portal, search for Log Analytics workspaces and click + Create.
Create a new Resource Group (e.g.,
sentinel-rg) and name your workspace (e.g.,sentinel-workspace). Complete the deployment.


Search for Microsoft Sentinel in the Azure Portal, click + Create, select your newly created workspace, and click Add.
Step 3: Create a Logic App (Playbook)
CRITICAL: To avoid trigger recognition bugs, always create the Playbook directly from within Sentinel, NOT from the general Azure Logic Apps menu.
In the Azure Portal, go to Microsoft Sentinel and select your workspace.
In the left sidebar, under Configuration, click Automation.
Click + Create at the top and select Playbook with incident trigger.

Select your Resource Group (
sentinel-rg) and name your playbook (e.g.,SentinelWebhookPlaybook). Click Review + create and complete the deployment.
Step 4: Configure the Logic App Workflow
Open your newly created Logic App (
SentinelWebhookPlaybook) and go to Logic app designer.The trigger Microsoft Sentinel incident will already be there. Click the + button below it and select Add an action.

Search for HTTP and add the green HTTP action. Configure it exactly as follows:
Method:
POSTURI: Your platform webhook URL (from Step 1)
Headers: Key =
Content-Type, Value =application/json(⚠️ Ensure there are NO trailing spaces in the value).Body: Compose the JSON payload using the Dynamic content menu to map Sentinel incident fields:
JSON
Click Save.

Step 5: Grant Permissions to Azure Security Insights (CRITICAL)
For Sentinel to automatically trigger your playbook, its background service (Azure Security Insights) must have explicit permission on the resource group.
In the Azure Portal search bar, type Resource groups and open
sentinel-rg.Click Access control (IAM) in the left menu.
Click + Add → Add role assignment.
Search for and select the Microsoft Sentinel Automation Contributor role. Click Next.

Under "Assign access to", select User, group, or service principal.
Click + Select members, search for Azure Security Insights, and select it.

Click Review + assign. (Note: If you get a "Role assignment already exists" error, you can safely skip this step).

Step 6: Create a Sentinel Automation Rule
Return to the Microsoft Sentinel console → Automation.
Click + Create → Automation rule.
Configure the rule:
Trigger:
When incident is createdActions:
Run playbookOpen the playbook dropdown and select your Logic App (
SentinelWebhookPlaybook).
Click Apply.

Testing
To verify the integration end-to-end, create a scheduled analytics rule to generate a test incident.
In Sentinel, navigate to Analytics. Click + Create → Scheduled query rule.
Set Name to
OnCall Webhook Test Alarmıand Severity toMedium.In the Set rule logic tab, use the following KQL query:
Code snippet:
Set query scheduling to run every 5 Minutes and ensure "Create incidents from alerts" is Enabled. Save the rule.

Wait up to 5 minutes. Check the Incidents page in Sentinel to confirm the incident was created.

Verify your webhook endpoint to ensure the JSON payload was received successfully. You can also check the Logic App's Run history for a
Succeededstatus.

Troubleshooting
Issue
Possible Cause
Resolution
Logic App run history shows Failed (Bad Request)
Format error in HTTP Headers.
Edit the Logic App HTTP action and ensure the Content-Type value is exactly application/json without any trailing spaces.
Playbook does not appear in Automation Rule dropdown
Incorrect Playbook creation or missing IAM roles.
Ensure you created the Playbook from within Sentinel, NOT the general Logic Apps menu. Verify that Azure Security Insights has the Microsoft Sentinel Automation Contributor role on the Resource Group.
Incidents are created but Playbook does not trigger
Automation rule misconfigured.
Verify the Automation Rule trigger is set to "When incident is created" (not Alert) and the rule is "Enabled".
Empty fields in the received alert
Dynamic content mismatch.
Open the Logic app designer and ensure the dynamic content tokens in your JSON body match the specific Sentinel incident schema fields.
Last updated
Was this helpful?



