Learn how to configure an application from the Microsoft Azure portal to be able to use the Microsoft Graph REST API. In this section you will find:
In order to know how the Wazuh Azure module works in conjunction with the Microsoft Graph REST API, it is important to understand first what are the Azure AD activity reports and what kind of information they provide. Wazuh can process the logs from the following Azure AD activity reports, each one of them requiring a different query to be executed:
This section explains the creation of an application that will use the Azure Log Analytics REST API. It is also possible to configure an existing application. If this is the case, skip this step.
In the Azure Active Directory panel, select the option App registrations. Then, select New registration.
Go to the Overview section and save the Application (client) ID for later authentication.
Go to the API permissions section and select the Add a permission option.
Select the API by searching for "Microsoft Graph".
Select the permissions in Applications permissions that adapt to our infrastructure. In this case, AuditLog permissions will be granted. Then, click Add permissions.
Grant admin consent for the tenant domain used for the permission added in the previous step. This must be done by an admin user.
Select Certificates & secrets and fill in the Description and Expires fields. Copy the value once the key is saved. This is required to authenticate the application in order to use the Log Analytics API.
Proceed with configuring the
azure-logs module in the local configuration (
ossec.conf). The key and ID of the application saved during the previous steps will be used here. In this case, both fields were saved in a file for authentication.
Here is an example of how to get the audit log of the Azure Active Directory using Microsoft Graph. This example configuration includes a representative
tag and is scheduled for every Monday at 02:00, using an offset of one day, which means only the log data from the last day is parsed:
<wodle name="azure-logs"> <disabled>no</disabled> <wday>Monday</wday> <time>2:00</time> <run_on_start>no</run_on_start> <graph> <auth_path>/var/ossec/wodles/azure/credentials</auth_path> <tenantdomain>wazuh.onmicrosoft.com</tenantdomain> <request> <tag>azure-active_directory</tag> <query>auditLogs/directoryAudits</query> <time_offset>1d</time_offset> </request> </graph> </wodle>
Check the azure-logs module reference for more information about how to use the different parameters available.
If an authentication file is used, as in this example, its content must follow the format
field = value. Here is an example of this format:
application_id = 317...764 application_key = wUj...9cj
tenantdomain is mandatory. It can be obtain from the Overview section in the Azure Active Directory.
Here is an example of monitoring the Azure AD activity using the configuration described above.
In this example, the records are in
.json format. The following rules are already included in Wazuh which means alerts will be generated for the logs in this example.
<rule id="87802" level="3"> <decoded_as>json</decoded_as> <field name="azure_tag">azure-ad-graph</field> <description>Azure: AD $(activity)</description> </rule>
Create a new user in Azure. If the creation is successful, a log will be written to reflect it. This log can be retrieved using the
The resulting log from the user creation can be checked in the Audit logs section of Azure Active Directory.
Once the integration is running, the results will be available in the Wazuh dashboard.