Azure Activities

Onboard the Azure Activities data feed.

In this guide, you will set up Azure Activity to forward subscription-level events to Radiant. These events are used to facilitate threat detection and incident response by enabling correlation with other security solutions.

At the end of this configuration, you will provide Radiant with the following values:

  • Application (client) ID

  • Directory (tenant) ID

  • Client Secret Value

  • Subscription ID (One for each subscription)

Prerequisites

Register the application with Azure AD

In this step, you'll register a new application with Azure AD. The application will pull user and group data on a semi-regular basis.

Note: Make sure to save the Application (client) ID and Directory (tenant) ID values. You will need to provide them to Radiant Security at the end of the configuration.

  1. Log in to the Microsoft Azure Portal.

  2. From the left side menu, navigate to Microsoft Entra ID.

  3. From the left menu, navigate to App Registrations.

  4. Click + New Registration.

  5. Update the application Name to radiantsecurity-connector and leave all default settings unchanged.

  6. Click Register to save the changes.

  7. On the newly registered application page, copy the following values:

    • Application (client) ID

    • Directory (tenant) ID

  8. On the same page, click the link for Add a certificate or secret.

  9. In the Add a client window, click + New Client Secret.

  10. Set the client secret as:

    • Description: Radiant Security Connector

    • Expires: 12 months

  1. Click Add.

  2. The client secrets page will automatically open.

  3. Copy the Value (not the Secret ID field).

Grant the newly registered application the appropriate permissions

  1. On the left sidebar menu, click API Permissions.

  2. Click + Add a permission.

  3. From the pop-out menu, select Azure Service Management.

  4. Select the permission user_impersonation.

  5. Click the Add Permission button.

The pop-out menu should now retreat and the selected permission should appear on the Configured permissions list.

Assign Reader Role for each subscription

Radiant allow for each subscription to be monitored independently. So, you can repeat these steps for each desired subscription.

  1. Access the Subscriptions page and select the desired subscription.

  1. From the left menu, click Access control (IAM).

  2. Click + Add and select Add role assignment.

  1. On the Role page, in the search bar, search for and select Reader. Click Next.

  1. On the Members page, click + Select members and search for <app_name>.

  1. Click on the application and click Select on the bottom of the page.

  2. Click Next and Review + Assign to confirm the role.

  3. Repeat steps 1 to 7 for each subscription.

Add the data connector in Radiant Security

  1. Log in to Radiant Security.

  2. From the navigation menu, click Settings > Data Connectors and click + Add Connector.

  3. Search for and select the Microsoft O365 option and then click Data Feeds.

  4. Select the Azure Activities data feed.

  5. Add the following values you saved from the previous steps:

    • Application (client) ID

    • Directory (tenant) ID

    • Client Secret Value

    • Subscription IDs (separated by commas, with no spaces after the commas)

  6. Click Add Connector to save the connector configuration.

Enable the Azure Activities data feed

  1. Log in to Radiant Security.

  2. From the navigation menu, click Settings > Data Connectors and find the Microsoft O365 connectors.

  3. Scroll down until you can see the Disabled data feeds.

  4. Hover your cursor over the Azure Activities data feed and click the Enable button on the right side.

Last updated