SC‑300 Study Portal Path 5

Unit 4: Exercise – Connect data from Microsoft Entra ID to Microsoft Sentinel

This unit focuses on connecting Microsoft Entra ID logs to Microsoft Sentinel so that identity-related security events can be monitored, correlated, and investigated centrally.

What is Microsoft Sentinel?

Microsoft Sentinel is a cloud-native security solution that combines:

Why Microsoft Sentinel matters for identity monitoring

Microsoft Sentinel provides a centralized, real-time security view across the enterprise by enabling you to:

When Microsoft Entra ID logs are streamed into Sentinel, identity activity becomes a first-class security signal.

Prerequisites

Before connecting Microsoft Entra ID to Microsoft Sentinel, ensure the following requirements are met.

Licensing requirements

Required roles

Your account must have:

Step 1: Create and add a Microsoft Sentinel workspace

If you do not already have a Log Analytics workspace connected to Sentinel, create one.

Create a new workspace

Configure the Log Analytics workspace

Use the following settings:

SettingValue
SubscriptionYour current subscription
Resource groupExisting or new resource group
NameLab-workspace-<yourinitials>-<date> (must be globally unique)
Pricing tierPay-as-you-go

Step 2: Connect Microsoft Entra ID to Microsoft Sentinel

Microsoft Sentinel includes a built-in data connector for Microsoft Entra ID.

Open the Entra ID data connector

Step 3: Configure log ingestion

The Microsoft Entra ID connector allows you to stream identity logs directly into Sentinel.

Select logs to collect

These logs are now streamed continuously into the Log Analytics workspace.

Step 4: Validate the connection

At this point:

…are all available for querying, alerting, and investigation in Sentinel.

What data is now available in Sentinel?

Once connected, Microsoft Sentinel can analyze:

This data can be used in:

Exam-focused summary (Unit 4)