Skip to main content
Skip table of contents

Microsoft Sentinel

Overview

The integration of HYAS Protect with Microsoft Sentinel offers a powerful enhancement to your security operations by seamlessly delivering HYAS Protect logs into the Sentinel SIEM environment. This setup lets you leverage Sentinel’s capabilities for advanced security insights, threat detection, and incident response with the enriched visibility that HYAS Protect provides on your DNS traffic.

By routing your HYAS Protect logs directly into Sentinel, you can access, analyze, and correlate data within your centralized Sentinel workspace. This enables SOC analysts and security teams to:

  • Enhanced Threat Detection and Correlation: HYAS Protect’s DNS-layer data, fed into Sentinel, allows you to see malicious traffic patterns and DNS-based threats as they emerge, which enhances Sentinel’s AI-driven detection capabilities. You’ll be able to use Sentinel’s native correlation with other logs (network, endpoint, identity, etc.) to uncover threats that span different attack surfaces.

  • Advanced Threat Hunting: With HYAS Protect logs in Sentinel, you can use custom KQL (Kusto Query Language) searches to perform deeper, more granular analysis of DNS traffic patterns. This visibility helps uncover stealthy activities such as data exfiltration or C2 communications that would otherwise go undetected in a single-solution environment.

  • Automated Incident Response: Sentinel’s built-in SOAR (Security Orchestration, Automation, and Response) capabilities can use HYAS Protect logs to trigger automated responses. For example, Sentinel can quarantine affected devices, block IP addresses, or initiate alerts to key personnel when a DNS-based threat is detected, enabling faster containment.

  • Customized Dashboards and Reporting: Sentinel’s flexibility allows you to build dashboards and reports that visualize HYAS Protect data in ways tailored to your organization’s needs. By doing so, you can showcase critical DNS security metrics, track performance, and report on trends in real time, ultimately improving visibility and communication with stakeholders.

Getting Started

Follow the steps below to deploy the HYAS Protect Integration with Microsoft Sentinel

Application Installation

  1. Login to the Microsoft Azure Platform.

  2. Navigate to Microsoft Sentinel.

  3. Select your Workspace.

  4. Go to "Content Hub" under "Content Management".

  5. Search for "HYAS Protect" and click "Install".

A screenshot of a computer  Description automatically generated

Application Configuration

  1. Once installed, click on the “Manage” option.

  2. Select “HYAS Protect (using Azure Functions)” and click on “Open Connector Page” as shown below.

    1. A screenshot of a computer  Description automatically generated

  3. Next, click on, “Deploy To Azure” button as shown below.

  4. On the configuration setup page, enter the following values:

    1. Workspace ID

      1. Obtaining from Workspace ID: Navigate to Microsoft Sentinel and select your Workspace then: Settings>Workspace settings>Settings>Agents>Log Analytics agent instructions

    2. Workspace Key

      1. See last step to acquire the Workspace Key.

    3. HYAS Protect API Key

      1. This value was given to you at initial set up of your account. If you need a new one, please reach out to your administrator and they can reset your API via the Manage User Accounts feature.

    4. App Insights Workspace Resource ID (FQDN)

      1. Obtaining your Workspace Resource ID (FDQN): Navigate to Microsoft Sentinel and select your desired Workspace. Then: Configuration>Settings>Workspace settings>Settings>Properties. Your Resource ID will be stored here and look similar to /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}

  5. Click "Review + Create". This will deploy a function that fetches logs from HYAS Protect and saves them into the Microsoft Sentinel platform.

Log Viewing, Analysis

  1. Navigate to Microsoft Sentinel.

  2. Select your workspace and click "Logs" under "General".

  3. This will open a table where you can find the logs under "Custom Logs" with the table name provided during the configuration setup (e.g., "HYASProtectDnsSecurityLogs").

It may take a few minutes to begin see logs and for the data connecter to show as connected.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.