Procedures
The following steps summarize the deployment steps of the Microsoft Sentinel and Entrust KeyControl:
This integration will require the Log Forwarder setup showcased here: https://learn.microsoft.com/en-us/azure/sentinel/cef-syslog-ama-overview?tabs=forwarder.
See Microsoft’s recommendations on network best practices at https://learn.microsoft.com/en-us/azure/security/fundamentals/network-best-practices.
Deploy a Entrust KeyControl Vault cluster
Microsoft Sentinel supports a deployment of a KeyControl cluster on Microsoft Azure or on an on prem deployment. An Azure deployment of KeyControl was tested for this integration.
For the steps on deploying a KeyControl cluster on Azure, see Entrust KeyControl Azure Installation.
For the steps on deploying a KeyControl cluster on prem, see Entrust KeyControl OVA Installation.
Install the log forwarder machine
The data connectors cannot directly be connected to KeyControl. A log forwarder machine is required to act as a Syslog server for KeyControl and will forward the log to Microsoft Sentinel.
For more information on Log Forwarder machine requirements, see the Log forwarder prerequisites section at https://learn.microsoft.com/en-us/azure/sentinel/connect-cef-syslog-ama?tabs=syslog%2Cportal.
Set up /etc/hosts
on the Linux forwarder VM.
Edit /etc/hosts
and add the hostname and IP address of the Linux forwarder machine.
Enable Syslog Server on KeyControl
-
Sign in to the Entrust KeyControl Vault Server web user interface:
-
Use your browser to access the IP address of the server.
-
Sign in with Security Admin privileges.
-
-
Navigate to Appliance Management.
-
In the top menu bar, select Settings.
-
In the System Settings section, select Syslog Server.
-
On the Syslog Server Settings page, specify the options you want to use.
State |
ENABLED |
Protocol |
TCP or UDP |
TLS Authentication List |
One of the options |
Log Format |
CEF |
Server List |
Hostname of the Linux forwarder machine and port 514 |
CA Certificate |
Upload a CA certificate if you are using x509/certvalid or x509/name |
Client Certificate |
Upload a client certificate if you are using x509/certvalid, x509/name, or x509/fingerprint |
See Entrust KeyControl documentation on Syslog Server Settings for more information: https://docs.hytrust.com/DataControl/10.2/Online/Content/Books/Admin-Guide/KC-System-Config/Syslog-Server.html.
Set up Microsoft Sentinel
To install and configure Microsoft Sentinel on Azure, follow the installation and setup instructions at Microsoft online documentation.
Set up data connectors
To set up the connection to the log forwarder through Syslog via AMA or Common Event Format (CEF) via AMA, or both, follow https://learn.microsoft.com/en-us/azure/sentinel/connect-cef-syslog-ama?tabs=syslog%2Cportal.
Test Microsoft Sentinel
At this point, Microsoft Sentinel should be monitoring logs that are forwarded from KeyControl through the Log Forwarder machine. These logs can be viewed by running simple queries.
-
Go to Microsoft Sentinel.
-
Select your instance.
-
Under General, select Logs.
-
Run the following queries to get the logs from each Data connector source.
-
For a list of the CEF logs:
CommonSecurityLog
-
For a list of the Syslogs:
Syslog
It can take up to 30 minutes for KeyControl logs to appear in Log Analytics after setting up the Data connectors.
-