Overview
TOTAL ingests security event data from your Microsoft Sentinel workspace via the Azure Monitor Logs API. We poll your Log Analytics tables using KQL (Kusto Query Language) on a configurable interval to collect, normalize, and correlate events across your environment.Prerequisites
- Azure Active Directory (Entra ID) access with permission to create App Registrations
- Microsoft Sentinel or a Log Analytics workspace with data flowing into it
- Reader or Log Analytics Reader role on the target workspace
- Approximately 15 minutes to complete setup
Step 1: Locate Your Log Analytics Workspace
- Sign in to the Azure Portal
- Navigate to Microsoft Sentinel (or Log Analytics workspaces)
- Select your workspace
- In the Overview pane, copy the Workspace ID and paste it into the TruU Portal
The Workspace ID is a GUID that looks like 07bdbc78-aaef-410a-a8d9-aa2f54a8c5b0.
Step 2: Register an Application in Entra ID
TOTAL authenticates to your workspace using an Entra ID (Azure AD) service principal. You’ll create a dedicated App Registration for this.- In the Azure Portal, navigate to Microsoft Entra ID → App registrations
- Click New registration
- Enter:
- Name:
TruU TOTAL - Log Analytics Reader - Supported account types: Accounts in this organizational directory only
- Redirect URI: Leave blank
- Name:
- Click Register
- On the app’s Overview page, copy:
- Application (client) ID
- Directory (tenant) ID
- Paste the Client ID and Tenant ID into the TruU Portal
Step 3: Create a Client Secret
- In your new App Registration, go to Certificates & secrets
- Click New client secret
- Enter:
- Description:
TOTAL integration - Expires: Choose your organization’s preferred expiry
- Description:
- Click Add
- Immediately copy the secret Value — it will only be shown once
- Paste the Client Secret value into the TruU Portal
Step 4: Grant Workspace Permissions
The App Registration needs read access to your Log Analytics workspace.- Navigate to your Log Analytics workspace in the Azure Portal
- Go to Access control (IAM)
- Click Add → Add role assignment
- Select the Log Analytics Reader role
- Under Members, click Select members and search for
TruU TOTAL - Log Analytics Reader - Select it and click Review + assign
Log Analytics Reader is a read-only role. It cannot modify workspace configuration, create alerts, or write data.
Step 6: Custom Tables
If you have custom Log Analytics tables (e.g., tables ending in_CL) or want to ingest data from a table not in the predefined list above, TOTAL supports custom table mapping.
The purpose of custom table mapping is to define the field mappings between your integration’s data and the TOTAL Event Schema — so TOTAL knows what data is coming into the data layer from these tables. Specifically, TOTAL needs to understand:
- Column names and paths — which columns (and nested JSON paths within those columns) correspond to core TOTAL fields like user ID, timestamp, IP address, device, and status
- Categorical values — what distinct values exist in fields like status, action type, or severity, and how they map to TOTAL’s normalized categories
- Event type classification — how records in your table should be categorized into TOTAL event types (authentication, endpoint, admin, alert, etc.)
How It Works
The Custom Log Mapping interface in the TruU portal will guide you through a series of KQL queries against your Sentinel workspace to discover your table’s schema, sample data, and distinct field values. Using that information, the interface walks you through mapping your custom events to TOTAL events by event type. Follow the instructions in the console to complete the mapping — no manual configuration files are needed.Security & Privacy
What We Access
- Read-only access to Log Analytics data via the Azure Monitor Logs API
- Queries are scoped to the specific tables you authorize
- All queries use
TimeGeneratedfiltering — we only fetch new data since the last poll - If configured, TOTAL will run a historical data pull on initial setup to seed user personas before live monitoring begins
What We Don’t Have Access To
- Write access to your workspace
- Ability to create, modify, or delete alerts, rules, or workbooks
- Access to Azure resource management APIs
- Access to tables you haven’t authorized
Updating or Rotating Credentials
Rotate Client Secret (Recommended: Before expiry)
- In Azure Portal, go to Entra ID → App registrations →
TruU TOTAL - Log Analytics Reader - Go to Certificates & secrets
- Click New client secret (create the new one before deleting the old one)
- Copy the new secret value
- Paste the new secret in the Sentinel section in the TruU Portal
- After TOTAL confirms the new secret is active, delete the old secret
Revoke Access
To immediately remove TOTAL’s access:- Option A — Disable in the TruU portal:
- Go to the TruU Portal → Settings → Connectors
- Find the Sentinel connector and click Disable
- Option B — Remove the role assignment:
- Go to your Log Analytics workspace → Access control (IAM)
- Find the
TruU TOTAL - Log Analytics Readerassignment and click Remove
- Option C — Delete the App Registration:
- Go to Entra ID → App registrations →
TruU TOTAL - Log Analytics Reader - Click Delete
- Go to Entra ID → App registrations →

