Prerequisites
Before starting, ensure you have the following:Global Administrator
Workspace Owner
Subscription Owner
Additional Requirements
| Requirement | Details |
|---|---|
| Microsoft Sentinel | Active Sentinel workspace in your Azure subscription |
| Log Analytics Workspace | The workspace linked to your Sentinel deployment |
| Resource Group Access | Ability to create resources in the subscription |
| No Conflicting Policies | Azure Policy must allow Lighthouse delegations |
What Gets Deployed
The Sentinel module deploys several Azure resources to enable integration:| Component | Purpose |
|---|---|
| Azure Lighthouse | Cross-tenant delegation for multi-tenant management |
| Apollo Resource Group | Infrastructure for incident streaming |
| Logic App | Streams Sentinel incidents to ContraForce in real-time |
| Automation Rule | Triggers the Logic App when incidents are created/updated |
| Role Assignments | Grants ContraForce service principals access to Sentinel |
Azure Resources Reference
Step 1: Navigate to Sentinel Configuration
Open Your Workspace
Go to Settings
Select Modules Tab
Click Configure on Microsoft Sentinel

Step 2: Verify Prerequisites
The configuration screen displays prerequisite checks. Ensure all items show a green checkmark:| Prerequisite | Required Value |
|---|---|
| Azure Role for Microsoft Tenant | Global Admin |
| ContraForce Workspace Role | Owner |
| Microsoft Subscription Permission | Owner |
Step 3: Provide Configuration Information
Enter your Azure environment details:Select Azure Subscription
Select Resource Group
Select Log Analytics Workspace
Configuration Fields
| Field | Description | Example |
|---|---|---|
| Azure Subscription | The subscription containing Sentinel | ”Production-Security” |
| Resource Group | Resource group with your Sentinel workspace | ”rg-sentinel-prod” |
| Log Analytics Workspace | Your Sentinel/Log Analytics workspace | ”la-sentinel-workspace” |
Step 4: Configure and Save
Review Your Selections
Click Configure and Save
Authenticate if Prompted
Wait for Deployment
Step 5: Deploy Azure Lighthouse
After the initial configuration, you’ll need to deploy Azure Lighthouse for cross-tenant management.Navigate to Lighthouse Deployment
Click Deploy Lighthouse
Authorize in Azure
Verify Delegation
What Lighthouse Enables
| Capability | Description |
|---|---|
| Cross-tenant visibility | View and manage Sentinel from the ContraForce portal |
| Incident access | Read and update incidents across tenants |
| Query execution | Run Log Analytics queries for threat hunting |
| Rule deployment | Deploy detection rules via CMS |
Step 6: Deploy Apollo Infrastructure
Apollo is the incident streaming infrastructure that enables real-time incident notifications.Navigate to Apollo Deployment
Click Deploy Apollo
Wait for Resources
Verify Deployment
Apollo Resources Created
| Resource | Type | Purpose |
|---|---|---|
| cf-apollo-[workspace] | Resource Group | Container for streaming resources |
| cf-incident-stream | Logic App | Processes and forwards incidents |
| cf-sentinel-connection | API Connection | Authenticates to Sentinel |
| cf-incident-trigger | Automation Rule | Triggers on incident changes |
Step 7: Consent Sentinel Enterprise Applications
The Sentinel module requires additional enterprise application consent.Navigate to Enterprise Apps Section
Consent ContraForce Sentinel Hunting
Authenticate as Global Admin
Accept Permissions
Sentinel Application Permissions
| Application | Permissions | Purpose |
|---|---|---|
| ContraForce Sentinel Hunting | Log Analytics Reader | Execute KQL queries for threat hunting |
Step 8: Verify Module Status
Confirm the Sentinel module is fully configured:Module Status Checklist
- Microsoft Sentinel module shows Active
- Azure Lighthouse shows Active
- Apollo shows Active
- ContraForce Sentinel Hunting shows Consented
Test Incident Sync
Open Command Page
Check for Sentinel Incidents
Verify Incident Details
Post-Configuration Steps
Configure Notifications
With the Sentinel module active, you can now configure email notifications:Go to Notifications Settings
Enable Severity Filters
Save Settings
Notifications Configuration
Deploy Detection Rules
Use the Content Management System to deploy detection rules to your Sentinel workspace:Navigate to CMS
Select Your Workspace
Browse and Deploy Rules
CMS Onboarding
Troubleshooting
Common Issues
| Issue | Cause | Solution |
|---|---|---|
| Subscription not visible | Insufficient permissions | Sign in with Subscription Owner account |
| Deployment fails | Azure Policy restrictions | Check for policies blocking Lighthouse or resource creation |
| Lighthouse deployment fails | Existing delegation | Remove existing Lighthouse delegation and retry |
| No incidents appearing | No incidents in Sentinel | Verify incidents exist in the Sentinel portal |
| Apollo Logic App disabled | Deployment issue | Manually enable the Logic App in Azure portal |
| Consent popup blocked | Browser settings | Allow popups from portal.contraforce.com |
Verifying Azure Resources
To verify resources deployed correctly:Open Azure Portal
Check Resource Group
Verify Logic App
Check Automation Rule
Lighthouse Troubleshooting
If Lighthouse delegation fails:- Check Azure Policy — Some organizations restrict Lighthouse delegations
- Remove existing delegations — Conflicting delegations can cause failures
- Verify permissions — Subscription Owner is required
- Check tenant settings — Ensure cross-tenant access isn’t blocked
How to remove existing Lighthouse delegation
How to remove existing Lighthouse delegation
- Go to Azure Portal → Service providers
- Find any existing ContraForce delegations
- Click on the delegation and select Delete
- Wait for deletion to complete
- Retry the deployment in ContraForce
How to enable Logic App manually
How to enable Logic App manually
- Go to Azure Portal → Resource Groups
- Open the cf-apollo-[workspace] resource group
- Click on the Logic App resource
- Click Enable if the Logic App is disabled
- Verify the Logic App shows “Enabled” status