A cloud-native SIEM solution that provides intelligent security analytics and threat detection across systems
Hello @Divya Mohan P,
I understand the confusion caused by the recent inconsistency with the RoleSessionName used by Microsoft Sentinel when assuming the AWS role.
According to the official Microsoft documentation, the session name should start with MicrosoftSentinel_. This had been working consistently until around March 27, 2025, when it was observed that the session name changed to MicrosoftDefenderForClouds_, which led to integration failures for some users.
The value of the sts:RoleSessionName parameter must have the exact prefix MicrosoftSentinel_
As confirmed by @Pauline Mbabu, this change was later reverted, and MicrosoftSentinel_ is the correct and supported session name prefix. We will find the cause of the change made.
For consistency and reliability, it is recommended to continue using MicrosoftSentinel_ in the AWS IAM trust policy.Hope this helps!
If this answer was helpful, please click "Accept the answer" and mark Yes, as this can help other community members.
If you have any other questions or are still experiencing issues, feel free to ask in the "comments" section, and I'd be happy to help.