# Azure Activities

In this guide, you will set up Azure Activity to forward subscription-level events to Radiant. These events are used to facilitate threat detection and incident response by enabling correlation with other security solutions.

At the end of this configuration, you will provide Radiant with the following values:

* **Application (client) ID**
* **Directory (tenant) ID**
* **Client Secret Value**
* **Subscription ID (One for each subscription)**

### Prerequisites

* [ ] Admin access in your Azure tenant.

### Register the application with Azure AD

In this step, you'll register a new application with Azure AD. The application will pull user and group data on a semi-regular basis.

{% hint style="info" %}
**Note**: Make sure to save the **Application (client) ID** and **Directory (tenant) ID** values. You will need to provide them to Radiant Security at the end of the configuration.
{% endhint %}

1. Log in to the [Microsoft Azure Portal](https://portal.azure.com/#home).
2. From the left side menu, navigate to **Microsoft Entra ID**.
3. From the left menu, navigate to **App Registrations**.
4. Click **+** **New Registration**.\
   &#x20;

   <figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FogEMv9rPR6Q1q9XIIP9c%2FMicrosoft%20O365_01.png?alt=media&#x26;token=312e87d3-4569-4e22-9f40-0a5a0dd9531c" alt=""><figcaption></figcaption></figure>
5. Update the application **Name** to `radiantsecurity-connector` and leave all default settings unchanged.\
   &#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FanLQ7LdB4iO6rIZFH243%2FMicrosoft%20O365_02.png?alt=media&#x26;token=3113ced1-ee53-4bef-ae97-43b155d2d251" alt="" width="375"><figcaption></figcaption></figure></div>
6. Click **Register** to save the changes.
7. On the newly registered application page, copy the following values:

   * **Application (client) ID**
   * **Directory (tenant) ID**

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FSh73eCenCkQ2aQwunJEE%2FMicrosoft%20O365_03.png?alt=media&#x26;token=dbaf7dff-8641-4e93-8d52-f957d6288c35" alt="" width="563"><figcaption></figcaption></figure></div>
8. On the same page, click the link for **Add a certificate or secret**.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F6tUi4cRYlGdVqDdn3hB8%2FMicrosoft%20O365_04.png?alt=media&#x26;token=893100fc-4653-42ef-a09a-109d52917d03" alt="" width="552"><figcaption></figcaption></figure></div>
9. In the **Add a client** window, click **+ New Client Secret**.
10. Set the client secret as:
    * **Description**: `Radiant Security Connector`
    * **Expires**: `12 months`

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F8v5mIQGBicCjRTmszymO%2FMicrosoft%20O365_05.png?alt=media&#x26;token=e6c5a82e-efb5-4aa1-afb3-96d1ab6a1939" alt="" width="563"><figcaption></figcaption></figure></div>

11. Click **Add**.
12. The client secrets page will automatically open.
13. Copy the **Value** (*not* the **Secret ID** field).\
    &#x20;

    <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FXPY8ww8cDTmYlHcq1xHr%2FMicrosoft%20O365_06.png?alt=media&#x26;token=5b629d99-2dcb-4e70-a638-7e7d1f8ecbc2" alt=""><figcaption></figcaption></figure></div>

{% hint style="warning" %}
**Important note:** Ensure you copy the **Client secret** value now as you won't be able to look it up again later. You will need to provide it to Radiant Security at the end of the configuration.
{% endhint %}

### Grant the newly registered application the appropriate permissions

1. On the left sidebar menu, click **API Permissions.**
2. Click + **Add a permission**.
3. From the pop-out menu, select **Azure Service Management**.&#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2Fke4HuvapcSjRSFkJ5WDz%2FMicrosoft%20O365_11.jpg?alt=media&#x26;token=6e86a6c8-b27f-41a9-a480-93e36537a1c0" alt="" width="563"><figcaption></figcaption></figure></div>
4. Select the permission **user\_impersonation.**\
   &#x20;

   <div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FQFTaWUZVj1w6Mo14HsRf%2FMicrosoft%20O365_12.png?alt=media&#x26;token=2bee6c26-5eac-4a80-af37-3ec8a866ca3c" alt=""><figcaption></figcaption></figure></div>
5. Click the **Add Permission** button.

The pop-out menu should now retreat and the selected permission should appear on the **Configured permissions** list.

### Assign Reader Role for each subscription

Radiant allow for each subscription to be monitored independently. So, you can repeat these steps for each desired subscription.

1. Access the **Subscriptions** page and select the desired subscription.

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FwW1GOWwoLUbdzPUEjjYm%2FAzure_Activities_01.png?alt=media&#x26;token=2025dcd2-1634-4353-8fc0-965513c8cd45" alt=""><figcaption></figcaption></figure></div>

2. From the left menu, click **Access control (IAM)**.
3. Click **+ Add** and select **Add role assignment.**&#x20;

<div align="left"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FvNOZvYHERg4AiFBLDs7v%2FAzure_Activities_02.png?alt=media&#x26;token=eae0db57-7ece-4032-8d69-999bc4c21a5d" alt=""><figcaption></figcaption></figure></div>

4. On the **Role** page, in the search bar, search for and select **Reader**. Click **Next**.

<div align="center"><figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FP2m0FJrEFAglN1XcyEwZ%2FAzure_Activities_03.png?alt=media&#x26;token=0c16b378-f16a-48c2-90f3-5fe60aeee09e" alt=""><figcaption></figcaption></figure></div>

5. On the **Members** page, click **+ Select members** and search for **\<app\_name>**.&#x20;

<figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2FD7E89REWNOTjVgDcVOW8%2FAzure%20Activities_11.png?alt=media&#x26;token=c020f863-449b-4b17-8eb5-4885997fbcf8" alt=""><figcaption></figcaption></figure>

5. Click on the application and click **Select** on the bottom of the page.
6. Click **Next** and **Review + Assign** to confirm the role.
7. Repeat steps 1 to 7 for each subscription.

{% hint style="warning" %}
**Important note:** If you already have the **Microsoft O365** connector enabled, skip the next step and go straight to [Enable the Azure Activities data feed](#enable-the-azure-activities-data-feed).
{% endhint %}

### Add the data connector in Radiant Security

1. Log in to [Radiant Security](https://app.radiantsecurity.ai/).
2. From the navigation menu, click **Settings** > **Data Connectors** and click **+ Add Connector**.
3. Search for and select the **Microsoft O365** option and then click **Data Feeds**.
4. Select the **Azure Activities** data feed.
5. Add the following values you saved from the previous steps:
   * Application (client) ID
   * Directory (tenant) ID
   * Client Secret Value
   * Subscription IDs (separated by commas, with no spaces after the commas)
6. Click **Add Connector** to save the connector configuration.

### Enable the Azure Activities data feed

1. Log in to [Radiant Security](https://app.radiantsecurity.ai/).
2. From the navigation menu, click **Settings** > **Data Connectors** and find the Microsoft O365 connectors.
3. Scroll down until you can see the **Disabled** data feeds.
4. Hover your cursor over the **Azure Activities** data feed and click the **Enable** button on the right side.

<figure><img src="https://2439665791-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPsFulb2ZOtSPcRSc2rXE%2Fuploads%2F8Q0ZAPGhFOU5JRY6lSNg%2FAzure_Activities_05.png?alt=media&#x26;token=437d13ea-531e-4f88-b6a4-b5d7d2f50cd7" alt=""><figcaption></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.radiantsecurity.ai/radiant-connectors/data-connectors/azure-activities.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
