Introduction
In today's cloud-centric security landscape, Microsoft Entra ID serves as the backbone for identity and access management in Microsoft ecosystems.
It tracks critical events like user sign-ins, audits, and provisioning activities that are essential for detecting threats such as unauthorized access or risky behaviors. Microsoft Sentinel, Microsoft's cloud-native SIEM and SOAR solution, empowers security teams to ingest, analyze, and respond to these events at scale.
Connecting Entra ID logs to Sentinel unlocks powerful capabilities: real-time threat detection, automated incident response, and enriched investigations using Kusto Query Language (KQL). This integration streams diagnostic data directly into Sentinel's Log Analytics workspace, enabling you to build analytics rules, workbooks, and playbooks tailored to identity-based attacks. Whether you're hunting for anomalous sign-ins or monitoring service principal risks, this setup is a must for modern SecOps.
Prerequisites
Licensing
Microsoft Entra ID P1 or P2 license for sign-in logs (Free or O365 suffices for audit and provisioning logs).
Microsoft Entra Workload ID Premium for advanced risk logs like AADRiskyServicePrincipals and AADServicePrincipalRiskEvents.
Note: per-GB ingestion costs in Azure Monitor and Sentinel.
Permissions and Roles
Microsoft Sentinel Contributor role on the target Log Analytics workspace.
Security Administrator role (or equivalent) on the Entra ID tenant.
Read/write access to Entra ID diagnostic settings.
Steps to create a Log Analytics Workspace and add to Sentinel
Create a Resource Group
Create a Log Analytics Workspace
![zxc]()
Go to Microsoft Sentinel and assign the created Workspace
![xcv]()
The Microsoft Entra ID solution for Microsoft Sentinel enables you to ingest Microsoft Entra ID Audit, Sign-in, Provisioning, Risk Events, and Risky User/Service Principal logs using Diagnostic Settings into Microsoft Sentinel.
Steps to Connect Entra Logs to Sentinel
Go to Sentinel Workspace --> Content Hub
![cvb]()
Search for Microsoft Entra ID
![vbn]()
Click Install
![bnm]()
![asd]()
![sdf]()
Fulfill all prerequisites
![dfg]()
Select all log types that need to be injected to Sentinel
![fgh]()
Check Entra Logs in Microsoft Sentinel
In Sentinel, go to Logs.
Run a KQL query
Ex
SigninLogs
| take 10
| project TimeGenerated, UserPrincipalName, AppDisplayName, ResultType
![ghj]()
Troubleshooting Common Issues
No Data Ingested: Double-check licenses (e.g., P1 for sign-ins) and permissions. Ensure the workspace is correctly linked.
Access Errors: Reassign Security Administrator role—it's non-delegable.
High Costs: Monitor ingestion via Azure Monitor > Logs and optimize by deselecting unused log types.
Preview Logs Missing: Confirm your subscription supports previews; contact Microsoft support if needed.