Sep 6, 2022
Configure security analytics for Azure Active Directory B2C data with Microsoft Sentinel
You can further secure your Azure Active Directory B2C (Azure AD B2C) environment by routing logs and audit information to Microsoft Sentinel. Microsoft Sentinel is a cloud-native SIEM (security information and event management) and SOAR (security orchestration, automation, and response) solution. Microsoft Sentinel provides alert detection, threat visibility, proactive hunting, and threat response for Azure AD B2C.
By using Microsoft Sentinel with Azure AD B2C, you can:
- Detect previously undetected threats and minimize false positives by using Microsoft's analytics and threat intelligence.
- Investigate threats with AI. Hunt for suspicious activities at scale, and tap into years of cybersecurity-related work at Microsoft.
- Respond to incidents rapidly with built-in orchestration and automation of common tasks.
- Meet security and compliance requirements for your organization.
In this tutorial, you'll learn how to:
- Transfer Azure AD B2C logs to a Log Analytics workspace.
- Enable Microsoft Sentinel in a Log Analytics workspace.
- Create a sample rule in Microsoft Sentinel that will trigger an incident.
- Configure an automated response.
Read more
Secure Azure AD B2C with Microsoft Sentinel - Azure AD B2C | Microsoft Docs