Customer is a leading Threat Intelligence solution provider.

They provide a platform for companies to aggregate and act upon Threat Intelligence.


Customer requested for the integration of their product with the Azure Active Directory logs

Sacumen-case studies

Technology Solution

Azure Monitor collects logs for Azure Active Directory, and streams the data to an Azure Event Hub. The Event Hub streams the logs collected by Azure Monitor to the Connector supported HTTP Source through an Azure function

The Connector receives the events data and parses response data and writes in the LEEF format

API Test methods and Selenium automation scripts were used to generate the Azure Active Directory events for testing

Do you need free Consultation for your security product integration?

    There are no reviews yet.

    Be the first to review “Azure Active Directory with Threat Intelligence Platform”