跳至正文

Azure AD / Entra ID Integration

Overview

Azure Active Directory (now Microsoft Entra ID) provides identity and access management for cloud and hybrid environments. KYRA MDR collects Azure AD sign-in logs, audit logs, and risk events for identity threat detection.

Prerequisites

  • A KYRA MDR Collector installed and running
  • Azure AD tenant with Global Reader or Security Reader role
  • Azure AD application registration with API permissions
  • Azure AD P1 or P2 license (for sign-in and risk event logs)

Configuration

Configure Azure AD log collection:

  1. Register an application in Azure Portal > App Registrations
  2. Grant the following API permissions:
    • AuditLog.Read.All
    • Directory.Read.All
    • IdentityRiskyUser.Read.All (P2)
  3. Grant admin consent for the permissions
  4. Configure the KYRA MDR collector:
collector-config.yaml
sources:
- type: azure-ad
tenant_id: <tenant-id>
client_id: <client-id>
client_secret: <client-secret>
poll_interval: 120s
  1. Restart the collector service

Collected Log Types

Log TypeDescriptionSecurity Use
Sign-in LogsUser authentication eventsBrute force, impossible travel detection
Audit LogsDirectory change eventsPrivilege escalation, policy changes
Risk EventsIdentity risk detections (P2)Compromised account detection
ProvisioningUser provisioning eventsAccount lifecycle monitoring
Service PrincipalApp authentication eventsService account monitoring
MFAMulti-factor authentication eventsMFA bypass detection

Troubleshooting

No sign-in logs: Azure AD sign-in logs require an Azure AD P1 or P2 license.

Permission denied: Ensure the app registration has admin consent granted for all required permissions.

Delayed data: Azure AD sign-in logs may have a delay of 5-15 minutes. This is a Microsoft-side limitation.

Contact kyra@seekerslab.com for support.