Skip to main content
The Microsoft Sentinel module connects ContraForce to your Microsoft Sentinel workspace, enabling centralized monitoring, real-time incident streaming, and the ability to act on Sentinel security data directly from the ContraForce platform.
What this module adds: Sentinel incident ingestion, Content Management System (CMS) for detection rules, email notifications, log search, and Azure Lighthouse cross-tenant management.

Prerequisites

Before starting, ensure you have the following:

Global Administrator

Azure Role for Microsoft Tenant: Global Admin or Security Admin

Workspace Owner

ContraForce Workspace Role: Owner or Admin

Subscription Owner

Microsoft Subscription Permission: Owner

Additional Requirements

RequirementDetails
Microsoft SentinelActive Sentinel workspace in your Azure subscription
Log Analytics WorkspaceThe workspace linked to your Sentinel deployment
Resource Group AccessAbility to create resources in the subscription
No Conflicting PoliciesAzure Policy must allow Lighthouse delegations
If you don’t have Subscription Owner permissions, the Azure deployment step will fail. Contact your Azure administrator to obtain the necessary access or have them complete the deployment steps with you.

What Gets Deployed

The Sentinel module deploys several Azure resources to enable integration:
ComponentPurpose
Azure LighthouseCross-tenant delegation for multi-tenant management
Apollo Resource GroupInfrastructure for incident streaming
Logic AppStreams Sentinel incidents to ContraForce in real-time
Automation RuleTriggers the Logic App when incidents are created/updated
Role AssignmentsGrants ContraForce service principals access to Sentinel

Azure Resources Reference

Complete list of all deployed resources with details

Step 1: Navigate to Sentinel Configuration

1

Open Your Workspace

From the ContraForce portal, navigate to Workspaces and select the workspace you want to configure
2

Go to Settings

Click the gear icon to open workspace settings
3

Select Modules Tab

Click the Modules tab in the settings panel
4

Click Configure on Microsoft Sentinel

Find the Microsoft Sentinel module and click Configure
You’ll see the Microsoft Sentinel Configuration screen:
Microsoft Sentinel Configuration screen

Step 2: Verify Prerequisites

The configuration screen displays prerequisite checks. Ensure all items show a green checkmark:
PrerequisiteRequired Value
Azure Role for Microsoft TenantGlobal Admin
ContraForce Workspace RoleOwner
Microsoft Subscription PermissionOwner
If any prerequisite shows a red X, you’ll need to obtain the required permissions before proceeding. The deployment will fail without proper access.

Step 3: Provide Configuration Information

Enter your Azure environment details:
1

Select Azure Subscription

From the Azure Subscription dropdown, select the subscription containing your Sentinel workspace
If you don’t see your subscription, ensure you’re signed in with an account that has Owner permissions on the subscription.
2

Select Resource Group

From the Resource Group dropdown, select the resource group containing your Sentinel/Log Analytics workspace
3

Select Log Analytics Workspace

From the Log Analytics Workspace dropdown, select your Sentinel workspace
Select the correct workspace—this is where ContraForce will read incidents from and where Lighthouse delegation will be established.

Configuration Fields

FieldDescriptionExample
Azure SubscriptionThe subscription containing Sentinel”Production-Security”
Resource GroupResource group with your Sentinel workspace”rg-sentinel-prod”
Log Analytics WorkspaceYour Sentinel/Log Analytics workspace”la-sentinel-workspace”

Step 4: Configure and Save

1

Review Your Selections

Double-check the subscription, resource group, and workspace selections
2

Click Configure and Save

Click the CONFIGURE AND SAVE button to begin deployment
3

Authenticate if Prompted

You may be prompted to sign in with your Azure credentials. Use an account with Subscription Owner permissions.
4

Wait for Deployment

Deployment typically takes 2-5 minutes. Do not close the browser window.

Step 5: Deploy Azure Lighthouse

After the initial configuration, you’ll need to deploy Azure Lighthouse for cross-tenant management.
1

Navigate to Lighthouse Deployment

The wizard will automatically proceed to the Lighthouse deployment step, or you can find it in the Modules tab
2

Click Deploy Lighthouse

Click Deploy to initiate the Azure Lighthouse delegation
3

Authorize in Azure

A new window will open to the Azure portal. Review the delegation details and click Create
4

Verify Delegation

Return to ContraForce and verify the Lighthouse status shows Active

What Lighthouse Enables

CapabilityDescription
Cross-tenant visibilityView and manage Sentinel from the ContraForce portal
Incident accessRead and update incidents across tenants
Query executionRun Log Analytics queries for threat hunting
Rule deploymentDeploy detection rules via CMS

Step 6: Deploy Apollo Infrastructure

Apollo is the incident streaming infrastructure that enables real-time incident notifications.
1

Navigate to Apollo Deployment

In the Modules tab, find the Apollo deployment section
2

Click Deploy Apollo

Click Deploy to provision the Apollo resource group and Logic App
3

Wait for Resources

Deployment takes 2-3 minutes. Resources are created in your Azure subscription.
4

Verify Deployment

Confirm Apollo shows Active status in the ContraForce portal

Apollo Resources Created

ResourceTypePurpose
cf-apollo-[workspace]Resource GroupContainer for streaming resources
cf-incident-streamLogic AppProcesses and forwards incidents
cf-sentinel-connectionAPI ConnectionAuthenticates to Sentinel
cf-incident-triggerAutomation RuleTriggers on incident changes
Apollo resources are created in the customer’s Azure subscription. Standard Azure charges may apply for Logic App executions.

The Sentinel module requires additional enterprise application consent.
1

Navigate to Enterprise Apps Section

In the onboarding wizard, proceed to the enterprise application consent step
2

Consent ContraForce Sentinel Hunting

Click Consent next to “ContraForce Sentinel Hunting”
3

Authenticate as Global Admin

Sign in with Global Administrator credentials
4

Accept Permissions

Review the permissions and click Accept to consent on behalf of your organization

Sentinel Application Permissions

ApplicationPermissionsPurpose
ContraForce Sentinel HuntingLog Analytics ReaderExecute KQL queries for threat hunting

Step 8: Verify Module Status

Confirm the Sentinel module is fully configured:

Module Status Checklist

  • Microsoft Sentinel module shows Active
  • Azure Lighthouse shows Active
  • Apollo shows Active
  • ContraForce Sentinel Hunting shows Consented

Test Incident Sync

1

Open Command Page

Navigate to the Command Page in ContraForce
2

Check for Sentinel Incidents

Look for incidents with the Sentinel source indicator
3

Verify Incident Details

Click an incident to confirm entity enrichment and details are loading
Incidents may take 5-15 minutes to appear initially. If you have existing incidents in Sentinel, they should sync automatically.

Post-Configuration Steps

Configure Notifications

With the Sentinel module active, you can now configure email notifications:
1

Go to Notifications Settings

Navigate to workspace Settings → Notifications
2

Enable Severity Filters

Select which severity levels should trigger notifications
3

Save Settings

Click Save to apply your notification preferences

Notifications Configuration

Complete guide to notification setup

Deploy Detection Rules

Use the Content Management System to deploy detection rules to your Sentinel workspace:
1

Navigate to CMS

Go to Content Management System in the left navigation
2

Select Your Workspace

Choose the workspace you just configured
3

Browse and Deploy Rules

Review available detection rules and enable those matching your data sources

CMS Onboarding

Deploy detection rules to your Sentinel workspace

Troubleshooting

Common Issues

IssueCauseSolution
Subscription not visibleInsufficient permissionsSign in with Subscription Owner account
Deployment failsAzure Policy restrictionsCheck for policies blocking Lighthouse or resource creation
Lighthouse deployment failsExisting delegationRemove existing Lighthouse delegation and retry
No incidents appearingNo incidents in SentinelVerify incidents exist in the Sentinel portal
Apollo Logic App disabledDeployment issueManually enable the Logic App in Azure portal
Consent popup blockedBrowser settingsAllow popups from portal.contraforce.com

Verifying Azure Resources

To verify resources deployed correctly:
1

Open Azure Portal

Navigate to portal.azure.com
2

Check Resource Group

Search for the Apollo resource group (cf-apollo-[workspace])
3

Verify Logic App

Confirm the Logic App exists and is Enabled
4

Check Automation Rule

In Sentinel, go to Automation → Automation Rules and verify the ContraForce rule exists

Lighthouse Troubleshooting

If Lighthouse delegation fails:
  1. Check Azure Policy — Some organizations restrict Lighthouse delegations
  2. Remove existing delegations — Conflicting delegations can cause failures
  3. Verify permissions — Subscription Owner is required
  4. Check tenant settings — Ensure cross-tenant access isn’t blocked
  1. Go to Azure Portal → Service providers
  2. Find any existing ContraForce delegations
  3. Click on the delegation and select Delete
  4. Wait for deletion to complete
  5. Retry the deployment in ContraForce
  1. Go to Azure Portal → Resource Groups
  2. Open the cf-apollo-[workspace] resource group
  3. Click on the Logic App resource
  4. Click Enable if the Logic App is disabled
  5. Verify the Logic App shows “Enabled” status

Module Capabilities Unlocked

With the Sentinel module configured, you now have access to:

Sentinel Incidents

Real-time incident ingestion from Microsoft Sentinel

Email Notifications

Instant alerts when new incidents are created

Content Management System

Deploy and manage detection rules at scale

Log Search

Query Log Analytics for threat hunting

Cross-Tenant Management

Manage multiple Sentinel workspaces from one portal

Advanced Threat Hunting

Execute KQL queries across customer environments

Next Steps



Need help with Sentinel module deployment? Contact us at [email protected].