May 1, 2025
May 1, 2025
Many organisations today prioritise streamlining and enhancing security operations. With cyber threats increasing in complexity and sophistication, the need for efficient, automated security measures has never been greater. This guide explores how to connect the SecQube portal to Microsoft Sentinel, leveraging Azure Lighthouse for a seamless integration that enhances security operations through the Azure portal.
SecQube offers an AI-powered multi-tenant platform for Microsoft Sentinel that simplifies security operations through conversational AI and automated workflows. The connection between your Sentinel environment and the SecQube portal relies on Azure Lighthouse. This Microsoft service provides providers a single control plane to manage Azure across multiple customers. This approach enhances your unified security operations platform by providing a comprehensive view of all connected entities.
Azure Lighthouse provides several key advantages for Managed Security Service Providers (MSSPs):
In terms of security, Azure Lighthouse improves the security posture by enabling centralised management of security policies and providing visibility into security incidents across multiple Azure tenants. This ensures a cost-effective solution for managing extensive security measures.
The Lighthouse script used for integrating SecQube with Microsoft Sentinel requires the following permissions:
The script, generated through the Microsoft Azure Lighthouse wizard, simplifies the setup process. Unlike other MSSPs, SecQube adds an App Registration service to the created groups, enabling the SecQube portal to securely access Sentinel and Log Analytics. This ensures no users can directly access Log Analytics or Microsoft Sentinel, enhancing security. Integrating with Azure subscription ID and defender components raw event data ensures streamlined security data management.
The deployment process involves two main steps:
Once the script execution is complete, you can verify the added groups by navigating to Log Analytics workspaces, checking your workspace for Sentinel, and searching for Log Analytics reader/contributor and Sentinel reader/contributor groups.
If the Lighthouse script is successful, the necessary fields will be automatically populated, and no further action will be required. Allow 15 to 20 minutes for the portal to propagate the changes. This facilitates incident integration and synchronising incidents, improving the response efficacy.
SecQube's security approach aims to complement your existing security policies, providing an expanded framework to enhance your security posture. By connecting the SecQube portal to Microsoft Sentinel, organisations can leverage AI-driven automation, user-centric simplicity, and proactive security measures. With the power of Azure Lighthouse and the advanced capabilities of SecQube, you can ensure that your security operations are efficient and robust. This integration amplifies the functionality of the unified security operations platform, enabling detailed management of user entities and security alerts.
A client with Global Administrator or Security Administrator rights can connect the SecQube portal to Microsoft Sentinel, allowing you to control your security environment when shared externally fully.
Embrace the seamless integration and elevated security management that SecQube and Sentinel deliver, and take your cybersecurity operations to the next level.